Results 171 to 180 of about 22,093 (250)
A graph attention network-based multi-agent reinforcement learning framework for robust detection of smart contract vulnerabilities. [PDF]
Adjei PK +7 more
europepmc +1 more source
Cumulative Testing for Learning Spoken Vocabulary
Abstract Cumulative testing is known to improve vocabulary learning by integrating both new and previously introduced words in weekly quizzes. While evidence for its benefits is promising, prior research has primarily focused on the written mode of vocabulary, with target words studied, practiced, and tested in the visual mode only.
Ryo Maie, Takumi Uchihara
wiley +1 more source
UnSafengine64: A Safengine Unpacker for 64-Bit Windows Environments and Detailed Analysis Results on Safengine 2.4.0. [PDF]
Choi S, Chang T, Park Y.
europepmc +1 more source
Abstract Current trends encouraging a move away from monolingual teaching have sparked a renewed interest in the role of translation in language instruction. Yet, there are few theoretically and empirically grounded proposals regarding specific uses of translation in the language classroom.
Monika Bader +2 more
wiley +1 more source
Real time identification of phishing attacks through machine learning enhanced browser extensions. [PDF]
Dandotiya M +3 more
europepmc +1 more source
Implementation of Software Source Code Obfuscation Tool for Weapon System Anti-Tampering
Gyuho Lee +3 more
openaire +1 more source
ABSTRACT The last few years have seen a reemergence in the awareness of virtual worlds among practitioners and academics. Driven by tech giants' investments, the Metaverse is considered by some as an unprecedented revolutionary technology with the potential to unlock an entire gamut of new unexplored opportunities for both companies and individuals ...
Giulio Ferrigno +2 more
wiley +1 more source
ABSTRACT This study examines how Intermediate Units (IUs) in multinational corporations gain the attention of corporate headquarters and subsidiaries. Using the Attention‐Based View, we show that attention depends on how visible and useful the IU's knowledge appears to other internal actors.
Jose Pla‐Barber +2 more
wiley +1 more source
Metadata driven malicious URL detection using RoBERTa large and multi source network threat intelligence. [PDF]
Chen L, Meng L.
europepmc +1 more source
Long‐term population monitoring is fundamental to wildlife population management. Furbearer populations are often surveyed using multiple methods, but many estimates of their abundance, especially abundance indices, do not account for detection error, and lead to conflicting interpretations of population trends.
Lauren C. Scopel +4 more
wiley +1 more source

