Results 71 to 80 of about 19,937 (276)

Outstanding TC Enhancement in 5d–3d Y2NiIrO6 by Compression

open access: yesAdvanced Science, EarlyView.
Double perovskite Y2NiIrO6 with half filed 3d eg–5d t2g configuration, exhibits first experimental example of pressure‐enhanced magnetic interaction in iridate and iridate‐related systems. Its Curie temperature increase from 192 to 243 K at 17 GPa. Herein, the orthogonal eg–t2g pathway remains robust even under compression‐induced lattice distortion ...
Zheng Deng   +18 more
wiley   +1 more source

Software Homology Detection With Software Motifs Based on Function-Call Graph

open access: yesIEEE Access, 2018
Software homology plays an important role in intellectual property protection, malware analysis, and network attack traceback. Among many methods proposed by researchers, the structure-based method has been proved to have better detection and anti ...
Peng Wu, Junfeng Wang, Bin Tian
doaj   +1 more source

Digital IP Protection Using Threshold Voltage Control

open access: yes, 2016
This paper proposes a method to completely hide the functionality of a digital standard cell. This is accomplished by a differential threshold logic gate (TLG).
Davis, Joseph   +4 more
core   +1 more source

Staging an Experience of Cultural Heritage Preservation: Consumers' Willingness to Pay for Heirloom Rice in the Philippines

open access: yesAgribusiness, EarlyView.
ABSTRACT The Cordillera Administrative Region in the Philippines is home to terraced rice embedded in centuries of cultural heritage. However, weak market incentives threaten sustained production, jeopardizing indigenous communities' cultural heritage and the in situ biodiversity of rice genetic resources.
Kofi Britwum, Matty Demont
wiley   +1 more source

Description of the approach to development of the obfuscating compiler

open access: yesТруды Института системного программирования РАН, 2018
Nowadays protecting intellectual property rights for created software is very important because of many competing companies and ubiquitous piracy. The powerful technique for this protection is to obfuscate program code.
Sh. F. Kurmangaleev   +2 more
doaj   +1 more source

OntoLogX: Ontology‐Guided Knowledge Graph Extraction From Cybersecurity Logs With Large Language Models

open access: yesAdvanced Intelligent Systems, EarlyView.
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti   +4 more
wiley   +1 more source

Obfuscation-Resilient Software Plagiarism Detection with JPlag

open access: yesProceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings
The rise of automated obfuscation techniques challenges the widespread assumption that evading a software plagiarism detector requires more effort than completing programming and modeling assignments in computer science education. This threatens plagiarism detectors without comprehensive obfuscation resilience and, ultimately, academic integrity.
Timur Saglam   +3 more
openaire   +3 more sources

“It's Not Deterministic and It Will Never Be Deterministic”: A Qualitative Study on Stakeholder Perspectives of Polygenic Risk Score Testing for Post‐Traumatic Stress Disorder

open access: yesAmerican Journal of Medical Genetics Part B: Neuropsychiatric Genetics, EarlyView.
ABSTRACT Post‐traumatic stress disorder (PTSD) causes significant mental and physical distress, yet only a small subset of individuals exposed to trauma develop the disorder. Scientists and clinicians are still unable to predict who will get the disorder or how it will manifest.
Brandy M. Fox
wiley   +1 more source

Expanded application to plant reproductive tissues of a branched DNA probe‐based in situ hybridization method

open access: yesApplications in Plant Sciences, EarlyView.
Abstract Premise Detecting clear tissue‐ and organ‐specific patterns of gene expression is key to understanding the genetic mechanisms that control plant development. In situ hybridization (ISH) of mRNA is one of the most precise, yet most challenging approaches to gene expression assays.
Brooklyn M. Anaya   +3 more
wiley   +1 more source

Eight years of rider measurement in the Android malware ecosystem: evolution and lessons learned [PDF]

open access: yes, 2018
Despite the growing threat posed by Android malware, the research community is still lacking a comprehensive view of common behaviors and trends exposed by malware families active on the platform.
Stringhini, Gianluca   +1 more
core  

Home - About - Disclaimer - Privacy