Results 81 to 90 of about 21,953 (219)

Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name [PDF]

open access: yes, 2019
An `obfuscation' for encrypted computing is quantified exactly here, leading to an argument that security against polynomial-time attacks has been achieved for user data via the deliberately `chaotic' compilation required for security properties in that ...
Breuer, Peter T.
core   +1 more source

Civilising pedagogies: An ethnography of instructional and regulative discourses in government schools in Delhi, India

open access: yesBritish Educational Research Journal, EarlyView.
Abstract Over the years, surveys and data on learning outcomes have consistently shown inadequate levels of learning in schools in India, witnessing a further decline in recent years. Studies within the sociology of education have consistently highlighted the overarching role of class and caste on learning outcomes in schools. Neoliberal policy reforms
Akshita Rawat
wiley   +1 more source

Implementation of an Obfuscation Tool for C/C++ Source Code Protection on the XScale Architecture [PDF]

open access: yes, 2008
Obfuscation is one of the most effective methods to protect software against malicious reverse engineering intentionally making the code more complex and confusing. In this paper, we implement and evaluate an obfuscation tool, or obfuscatorfor protecting the intellectual property of C/C++ source code. That is, this paper presents an implementation of a
Seongje Cho, Hyeyoung Chang, Yookun Cho
openaire   +1 more source

“Bionopoly” as a Gamechanger? Effects of Gamification on Learning Success, Motivation and Activation Among Medical Students in a Biochemistry Course

open access: yesBiochemistry and Molecular Biology Education, EarlyView.
ABSTRACT Gamification is characterized by the use of gaming elements in a non‐gaming context. This concept is commonly applied in teaching to create a more meaningful and activating learning environment. The major aim of this study was to compare possible effects of gamification on a traditional interactive teaching concept in a biochemistry course on ...
Eva Stapfer   +3 more
wiley   +1 more source

Sentience in cephalopod molluscs: an updated assessment

open access: yesBiological Reviews, EarlyView.
ABSTRACT This article evaluates the evidence for sentience – the capacity to have feelings – in cephalopod molluscs: octopus, cuttlefish, squid, and nautilus. Our framework includes eight criteria, covering both whether the animal's nervous system could support sentience and whether their behaviour indicates sentience.
Alexandra K. Schnell   +4 more
wiley   +1 more source

Subterranean environments contribute to three‐quarters of classified ecosystem services

open access: yesBiological Reviews, EarlyView.
ABSTRACT Beneath the Earth's surface lies a network of interconnected caves, voids, and systems of fissures forming in rocks of sedimentary, igneous, or metamorphic origin. Although largely inaccessible to humans, this hidden realm supports and regulates services critical to ecological health and human well‐being.
Stefano Mammola   +30 more
wiley   +1 more source

Context2Name: A Deep Learning-Based Approach to Infer Natural Variable Names from Usage Contexts

open access: yes, 2017
Most of the JavaScript code deployed in the wild has been minified, a process in which identifier names are replaced with short, arbitrary and meaningless names.
Bavishi, Rohan   +2 more
core  

Loss, persistence and reversal of phenotypic traits

open access: yesBiological Reviews, EarlyView.
ABSTRACT The irreversibility of complex trait loss has long been a tenet of evolutionary biology. However, this idea is increasingly at odds with the numerous documented exceptions across the Tree of Life. We synthesise this growing body of evidence across a diverse array of taxa and traits, exploring the evolutionary conditions that enable ...
Giobbe Forni   +4 more
wiley   +1 more source

The Effectiveness Of Bytecode Decompilation [PDF]

open access: yes
High-level bytecodes used by object-oriented managed execution environments make it easy to decompile them. This paper studies the reasons that make bytecode decompilers such efficient and presents basic obfuscation techniques as an efficient protection ...
Robert Enyedi
core  

Home - About - Disclaimer - Privacy