Results 71 to 80 of about 19,739 (264)
Obfuscation-Resilient Software Plagiarism Detection with JPlag
The rise of automated obfuscation techniques challenges the widespread assumption that evading a software plagiarism detector requires more effort than completing programming and modeling assignments in computer science education. This threatens plagiarism detectors without comprehensive obfuscation resilience and, ultimately, academic integrity.
Timur Sağlam +3 more
openaire +3 more sources
Stress‐Induced Melting Controlled Failure Mechanisms of Methane Hydrate
We study methane hydrate via nanoindentation and nuclear magnetic resonance (NMR), finding its regional melting and mechanical properties, challenging existing views on hydrogen‐bonded crystals. Abstract Methane hydrate, a kind of nonstoichiometric crystalline, attracted worldwide attentions as a promising substitute energy. Its Dissociation is thought
Yanlong Li +9 more
wiley +1 more source
5 nm HfO2 memristors exhibit a fully reversible, voltage‐controlled transition between filamentary and interfacial switching within the same device. At high voltages, a filament forms and dominates the conduction, whereas at lower voltages the device reversibly returns to interfacial mode without defect accumulation, implying a new reversible ...
Cuo Wu +8 more
wiley +1 more source
Software Homology Detection With Software Motifs Based on Function-Call Graph
Software homology plays an important role in intellectual property protection, malware analysis, and network attack traceback. Among many methods proposed by researchers, the structure-based method has been proved to have better detection and anti ...
Peng Wu, Junfeng Wang, Bin Tian
doaj +1 more source
ABSTRACT The Cordillera Administrative Region in the Philippines is home to terraced rice embedded in centuries of cultural heritage. However, weak market incentives threaten sustained production, jeopardizing indigenous communities' cultural heritage and the in situ biodiversity of rice genetic resources.
Kofi Britwum, Matty Demont
wiley +1 more source
Description of the approach to development of the obfuscating compiler
Nowadays protecting intellectual property rights for created software is very important because of many competing companies and ubiquitous piracy. The powerful technique for this protection is to obfuscate program code.
Sh. F. Kurmangaleev +2 more
doaj +1 more source
A Middleware for the Internet of Things
The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as things to the Internet, in an intelligent and pervasive fashion.
Cheung, Hon +2 more
core +2 more sources
Abstract We explored community‐based doulas' perspectives on the acceptability of using formal screening tools to address low rates of mental health screening, diagnosis, and treatment for perinatal anxiety and depression among Black women. Using thematic analysis, we analyzed interview data from 30 community‐based doulas who support Black families ...
Tamara Nelson +5 more
wiley +1 more source
Mapping Intimate Partner Financial Abuse Across Public and Private Systems
ABSTRACT This article maps the ways that intimate partner financial abuse presents, and the range of public and private entities involved in its perpetration. It reports on an analysis of submissions by individuals to the Australian parliamentary inquiry into the Financial Services Regulatory Framework in Relation to Financial Abuse.
Adrienne Byrt +3 more
wiley +1 more source
Objective Amyotrophic lateral sclerosis (ALS) has a very specific neuroimaging signature, but the molecular underpinnings of the strikingly selective anatomic involvement have not elucidated to date. Accordingly, a large neuroimaging study was conducted with 258 participants to evaluate associations between patterns of neurodegeneration and focal ...
Marlene Tahedl +10 more
wiley +1 more source

