Results 51 to 60 of about 3,402,194 (310)

Developing Hands-on Labs for Source Code Vulnerability Detection with AI [PDF]

open access: yesarXiv, 2023
As the role of information and communication technologies gradually increases in our lives, source code security becomes a significant issue to protect against malicious attempts Furthermore with the advent of data-driven techniques, there is now a growing interest in leveraging machine learning and natural language processing as a source code ...
arxiv  

Source Code [PDF]

open access: yes, 2013
This is the author's version of a book published by Ravenglass Poetry Press ...
Stephenson, William
core  

Social context prevents heat hormetic effects against mutagens during fish development

open access: yesFEBS Letters, EarlyView.
This study shows that sublethal heat stress protects fish embryos against ultraviolet radiation, a concept known as ‘hormesis’. However, chemical stress transmission between fish embryos negates this protective effect. By providing evidence for the mechanistic molecular basis of heat stress hormesis and interindividual stress communication, this study ...
Lauric Feugere   +5 more
wiley   +1 more source

miRNA‐29 regulates epidermal and mesenchymal functions in skin repair

open access: yesFEBS Letters, EarlyView.
miRNA‐29 inhibits cell‐to‐cell and cell‐to‐matrix adhesion by silencing mRNA targets. Adhesion is controlled by complex interactions between many types of molecules coded by mRNAs. This is crucial for keeping together the layers of the skin and for regenerating the skin after wounding.
Lalitha Thiagarajan   +10 more
wiley   +1 more source

Smell-Aware Bug Classification

open access: yesIEEE Access
Code smell indicates inadequacies in design and implementation choices. Code smells harm software maintainability including effects on components’ bug proneness and code quality has been demonstrated in previous studies.
Khyber   +5 more
doaj   +1 more source

L’écriture collective du code source informatique

open access: yesRevue d'anthropologie des connaissances, 2012
This article analyzes the collective writing of software source code. Software source code is a set of textual documents that formally specify the behavior of software – its script. The article draws on work in the sociology of science and technology and
Stéphane Couture
doaj   +1 more source

The Optimality of AIFV Codes in the Class of $2$-bit Delay Decodable Codes [PDF]

open access: yesarXiv, 2023
AIFV (almost instantaneous fixed-to-variable length) codes are noiseless source codes that can attain a shorter average codeword length than Huffman codes by allowing a time-variant encoder with two code tables and a decoding delay of at most 2 bits. First, we consider a general class of noiseless source codes, called k-bit delay decodable codes, in ...
arxiv  

Coding Schemes for Achieving Strong Secrecy at Negligible Cost

open access: yes, 2016
We study the problem of achieving strong secrecy over wiretap channels at negligible cost, in the sense of maintaining the overall communication rate of the same channel without secrecy constraints. Specifically, we propose and analyze two source-channel
Bloch, Matthieu   +3 more
core   +2 more sources

A cellular system to study responses to a collision between the transcription complex and a protein‐bound nick in the DNA template

open access: yesFEBS Letters, EarlyView.
We present the cellular transcription‐coupled Flp‐nick system allowing the introduction of a Top1‐mimicking cleavage complex (Flpcc) at a Flp recognition target site within a controllable LacZ gene. LacZ transcription leads to the collision of RNA polymerase II (RNAPII) with Flpcc, and this causes RNAPII stalling, ubiquitination, and degradation.
Petra Herring   +6 more
wiley   +1 more source

A Novel Method for Code Clone Detection Based on Minimally Random Kernel Convolutional Transform

open access: yesIEEE Access
Effectively detecting code clones is essential for maintaining and evolving software systems. This paper introduces a novel approach that leverages minimally random kernel convolutional transform (MiniRocket) to represent source code for clone detection.
Mostefai Abdelkader
doaj   +1 more source

Home - About - Disclaimer - Privacy