Results 71 to 80 of about 19,739 (264)

Obfuscation-Resilient Software Plagiarism Detection with JPlag

open access: yesProceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings
The rise of automated obfuscation techniques challenges the widespread assumption that evading a software plagiarism detector requires more effort than completing programming and modeling assignments in computer science education. This threatens plagiarism detectors without comprehensive obfuscation resilience and, ultimately, academic integrity.
Timur Sağlam   +3 more
openaire   +3 more sources

Stress‐Induced Melting Controlled Failure Mechanisms of Methane Hydrate

open access: yesAdvanced Science, EarlyView.
We study methane hydrate via nanoindentation and nuclear magnetic resonance (NMR), finding its regional melting and mechanical properties, challenging existing views on hydrogen‐bonded crystals. Abstract Methane hydrate, a kind of nonstoichiometric crystalline, attracted worldwide attentions as a promising substitute energy. Its Dissociation is thought
Yanlong Li   +9 more
wiley   +1 more source

Reversible and Controllable Transition Between Filamentary and Interfacial Resistive Switching in HfO2‐Based Memristors

open access: yesAdvanced Electronic Materials, EarlyView.
5 nm HfO2 memristors exhibit a fully reversible, voltage‐controlled transition between filamentary and interfacial switching within the same device. At high voltages, a filament forms and dominates the conduction, whereas at lower voltages the device reversibly returns to interfacial mode without defect accumulation, implying a new reversible ...
Cuo Wu   +8 more
wiley   +1 more source

Software Homology Detection With Software Motifs Based on Function-Call Graph

open access: yesIEEE Access, 2018
Software homology plays an important role in intellectual property protection, malware analysis, and network attack traceback. Among many methods proposed by researchers, the structure-based method has been proved to have better detection and anti ...
Peng Wu, Junfeng Wang, Bin Tian
doaj   +1 more source

Staging an Experience of Cultural Heritage Preservation: Consumers' Willingness to Pay for Heirloom Rice in the Philippines

open access: yesAgribusiness, EarlyView.
ABSTRACT The Cordillera Administrative Region in the Philippines is home to terraced rice embedded in centuries of cultural heritage. However, weak market incentives threaten sustained production, jeopardizing indigenous communities' cultural heritage and the in situ biodiversity of rice genetic resources.
Kofi Britwum, Matty Demont
wiley   +1 more source

Description of the approach to development of the obfuscating compiler

open access: yesТруды Института системного программирования РАН, 2018
Nowadays protecting intellectual property rights for created software is very important because of many competing companies and ubiquitous piracy. The powerful technique for this protection is to obfuscate program code.
Sh. F. Kurmangaleev   +2 more
doaj   +1 more source

A Middleware for the Internet of Things

open access: yes, 2016
The Internet of Things (IoT) connects everyday objects including a vast array of sensors, actuators, and smart devices, referred to as things to the Internet, in an intelligent and pervasive fashion.
Cheung, Hon   +2 more
core   +2 more sources

“And in some cases, we're the best option:” A qualitative study of community‐based doula support for black perinatal mental health

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract We explored community‐based doulas' perspectives on the acceptability of using formal screening tools to address low rates of mental health screening, diagnosis, and treatment for perinatal anxiety and depression among Black women. Using thematic analysis, we analyzed interview data from 30 community‐based doulas who support Black families ...
Tamara Nelson   +5 more
wiley   +1 more source

Mapping Intimate Partner Financial Abuse Across Public and Private Systems

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This article maps the ways that intimate partner financial abuse presents, and the range of public and private entities involved in its perpetration. It reports on an analysis of submissions by individuals to the Australian parliamentary inquiry into the Financial Services Regulatory Framework in Relation to Financial Abuse.
Adrienne Byrt   +3 more
wiley   +1 more source

Anatomical Associations Between Focal Mitochondrial Metabolism and Patterns of Neurodegeneration in Amyotrophic Lateral Sclerosis

open access: yesAnnals of Neurology, EarlyView.
Objective Amyotrophic lateral sclerosis (ALS) has a very specific neuroimaging signature, but the molecular underpinnings of the strikingly selective anatomic involvement have not elucidated to date. Accordingly, a large neuroimaging study was conducted with 258 participants to evaluate associations between patterns of neurodegeneration and focal ...
Marlene Tahedl   +10 more
wiley   +1 more source

Home - About - Disclaimer - Privacy