Results 81 to 90 of about 970,866 (376)

Lesion Location and Functional Connections Reveal Cognitive Impairment Networks in Multiple Sclerosis

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective Cognitive impairment, fatigue, and depression are common in multiple sclerosis (MS), potentially due to disruption of regional functional connectivity caused by white matter (WM) lesions. We explored whether WM lesions functionally connected to specific brain regions contribute to these MS‐related manifestations.
Alessandro Franceschini   +7 more
wiley   +1 more source

Combining dynamic symbolic execution, code static analysis and fuzzing

open access: yesТруды Института системного программирования РАН, 2019
This paper describes a new approach for dynamic code analysis. It combines dynamic symbolic execution and static code analysis with fuzzing to increase efficiency of each component.
A. Yu. Gerasimov   +5 more
doaj   +1 more source

SPOT: Testing Stream Processing Programs with Symbolic Execution and Stream Synthesizing

open access: yesApplied Sciences, 2021
Adoption of distributed stream processing (DSP) systems such as Apache Flink in real-time big data processing is increasing. However, DSP programs are prone to be buggy, especially when one programmer neglects some DSP features (e.g., source data ...
Qian Ye, Minyan Lu
doaj   +1 more source

Higher Amyloid and Tau Burden Is Associated With Faster Decline on a Digital Cognitive Test

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective A 2‐min digital clock‐drawing test (DCTclock) captures more granular features of the clock‐drawing process than the pencil‐and‐paper clock‐drawing test, revealing more subtle deficits at the preclinical stage of Alzheimer's disease (AD). A previous cross‐sectional study demonstrated that worse DCTclock performance was associated with
Jessie Fanglu Fu   +16 more
wiley   +1 more source

SYMBOLIC EXECUTION IN AUTOMATICALLY GENERATIONOF DATA OF SOFTWARE TESTING

open access: yesTạp chí Khoa học Đại học Đà Lạt, 2016
In software testing area, all test cases are often generated manually. It time-consumming and costly to complete such task. Symbolic execution is a well-known technique for automatically making the test cases that cover almost every testing criteria in ...
Tô Hữu Nguyên   +3 more
doaj   +1 more source

Statistical Symbolic Execution with Informed Sampling [PDF]

open access: yes, 2014
Symbolic execution techniques have been proposed recently for the probabilistic analysis of programs. These techniques seek to quantify the likelihood of reaching program events of interest, e.g., assert violations.
Filieri, Antonio   +3 more
core   +2 more sources

Autosomal Recessive Spastic Ataxia of Charlevoix‐Saguenay in Two Half‐Siblings

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Autosomal recessive spastic ataxia of Charlevoix‐Saguenay (ARSACS) is caused by biallelic pathogenic variants in the SACS gene. We report the clinical, radiologic and neurophysiologic features of a pair of half‐siblings who presented with progressive cerebellar ataxia, peripheral neuropathy and upper motor neuron signs.
Dennis Yeow   +6 more
wiley   +1 more source

Binary Analysis Using Symbolic Execution

open access: yesБезопасность информационных технологий, 2010
This paper presents a method of static analysis of executable code that combines abstract interpretation and symbolic execution, where the latter is used in order to refine results of the former.
I. O. Leoshkevich
doaj  

A DSL for Resource Checking Using Finite State Automaton-Driven Symbolic Execution

open access: yesOpen Computer Science, 2020
Static analysis is an essential way to find code smells and bugs. It checks the source code without execution and no test cases are required, therefore its cost is lower than testing.
Fülöp Endre, Pataki Norbert
doaj   +1 more source

A Logic for Constraint-based Security Protocol Analysis [PDF]

open access: yes, 2006
We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties.
Corin, R.J., Etalle, S., Saptawijaya, A.
core   +5 more sources

Home - About - Disclaimer - Privacy