Results 71 to 80 of about 19,937 (276)
Outstanding TC Enhancement in 5d–3d Y2NiIrO6 by Compression
Double perovskite Y2NiIrO6 with half filed 3d eg–5d t2g configuration, exhibits first experimental example of pressure‐enhanced magnetic interaction in iridate and iridate‐related systems. Its Curie temperature increase from 192 to 243 K at 17 GPa. Herein, the orthogonal eg–t2g pathway remains robust even under compression‐induced lattice distortion ...
Zheng Deng +18 more
wiley +1 more source
Software Homology Detection With Software Motifs Based on Function-Call Graph
Software homology plays an important role in intellectual property protection, malware analysis, and network attack traceback. Among many methods proposed by researchers, the structure-based method has been proved to have better detection and anti ...
Peng Wu, Junfeng Wang, Bin Tian
doaj +1 more source
Digital IP Protection Using Threshold Voltage Control
This paper proposes a method to completely hide the functionality of a digital standard cell. This is accomplished by a differential threshold logic gate (TLG).
Davis, Joseph +4 more
core +1 more source
ABSTRACT The Cordillera Administrative Region in the Philippines is home to terraced rice embedded in centuries of cultural heritage. However, weak market incentives threaten sustained production, jeopardizing indigenous communities' cultural heritage and the in situ biodiversity of rice genetic resources.
Kofi Britwum, Matty Demont
wiley +1 more source
Description of the approach to development of the obfuscating compiler
Nowadays protecting intellectual property rights for created software is very important because of many competing companies and ubiquitous piracy. The powerful technique for this protection is to obfuscate program code.
Sh. F. Kurmangaleev +2 more
doaj +1 more source
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti +4 more
wiley +1 more source
Obfuscation-Resilient Software Plagiarism Detection with JPlag
The rise of automated obfuscation techniques challenges the widespread assumption that evading a software plagiarism detector requires more effort than completing programming and modeling assignments in computer science education. This threatens plagiarism detectors without comprehensive obfuscation resilience and, ultimately, academic integrity.
Timur Saglam +3 more
openaire +3 more sources
ABSTRACT Post‐traumatic stress disorder (PTSD) causes significant mental and physical distress, yet only a small subset of individuals exposed to trauma develop the disorder. Scientists and clinicians are still unable to predict who will get the disorder or how it will manifest.
Brandy M. Fox
wiley +1 more source
Abstract Premise Detecting clear tissue‐ and organ‐specific patterns of gene expression is key to understanding the genetic mechanisms that control plant development. In situ hybridization (ISH) of mRNA is one of the most precise, yet most challenging approaches to gene expression assays.
Brooklyn M. Anaya +3 more
wiley +1 more source
Eight years of rider measurement in the Android malware ecosystem: evolution and lessons learned [PDF]
Despite the growing threat posed by Android malware, the research community is still lacking a comprehensive view of common behaviors and trends exposed by malware families active on the platform.
Stringhini, Gianluca +1 more
core

