Results 51 to 60 of about 3,402,194 (310)
Developing Hands-on Labs for Source Code Vulnerability Detection with AI [PDF]
As the role of information and communication technologies gradually increases in our lives, source code security becomes a significant issue to protect against malicious attempts Furthermore with the advent of data-driven techniques, there is now a growing interest in leveraging machine learning and natural language processing as a source code ...
arxiv
This is the author's version of a book published by Ravenglass Poetry Press ...
Stephenson, William
core
Social context prevents heat hormetic effects against mutagens during fish development
This study shows that sublethal heat stress protects fish embryos against ultraviolet radiation, a concept known as ‘hormesis’. However, chemical stress transmission between fish embryos negates this protective effect. By providing evidence for the mechanistic molecular basis of heat stress hormesis and interindividual stress communication, this study ...
Lauric Feugere+5 more
wiley +1 more source
miRNA‐29 regulates epidermal and mesenchymal functions in skin repair
miRNA‐29 inhibits cell‐to‐cell and cell‐to‐matrix adhesion by silencing mRNA targets. Adhesion is controlled by complex interactions between many types of molecules coded by mRNAs. This is crucial for keeping together the layers of the skin and for regenerating the skin after wounding.
Lalitha Thiagarajan+10 more
wiley +1 more source
Smell-Aware Bug Classification
Code smell indicates inadequacies in design and implementation choices. Code smells harm software maintainability including effects on components’ bug proneness and code quality has been demonstrated in previous studies.
Khyber+5 more
doaj +1 more source
L’écriture collective du code source informatique
This article analyzes the collective writing of software source code. Software source code is a set of textual documents that formally specify the behavior of software – its script. The article draws on work in the sociology of science and technology and
Stéphane Couture
doaj +1 more source
The Optimality of AIFV Codes in the Class of $2$-bit Delay Decodable Codes [PDF]
AIFV (almost instantaneous fixed-to-variable length) codes are noiseless source codes that can attain a shorter average codeword length than Huffman codes by allowing a time-variant encoder with two code tables and a decoding delay of at most 2 bits. First, we consider a general class of noiseless source codes, called k-bit delay decodable codes, in ...
arxiv
Coding Schemes for Achieving Strong Secrecy at Negligible Cost
We study the problem of achieving strong secrecy over wiretap channels at negligible cost, in the sense of maintaining the overall communication rate of the same channel without secrecy constraints. Specifically, we propose and analyze two source-channel
Bloch, Matthieu+3 more
core +2 more sources
We present the cellular transcription‐coupled Flp‐nick system allowing the introduction of a Top1‐mimicking cleavage complex (Flpcc) at a Flp recognition target site within a controllable LacZ gene. LacZ transcription leads to the collision of RNA polymerase II (RNAPII) with Flpcc, and this causes RNAPII stalling, ubiquitination, and degradation.
Petra Herring+6 more
wiley +1 more source
A Novel Method for Code Clone Detection Based on Minimally Random Kernel Convolutional Transform
Effectively detecting code clones is essential for maintaining and evolving software systems. This paper introduces a novel approach that leverages minimally random kernel convolutional transform (MiniRocket) to represent source code for clone detection.
Mostefai Abdelkader
doaj +1 more source