Results 31 to 40 of about 16,602 (259)

A Smart Contract Vulnerability Detection Model Based on Syntactic and Semantic Fusion Learning

open access: yesWireless Communications and Mobile Computing, Volume 2023, Issue 1, 2023., 2023
As a trusted decentralized application, smart contracts manage a large number of digital assets on the blockchain. Vulnerability detection of smart contracts is an important part of ensuring the security of digital assets. At present, many researchers extract features of smart contract source code for vulnerability detection based on deep learning ...
Daojun Han   +4 more
wiley   +1 more source

Fostering the diversity of exploratory testing in web applications

open access: yesSoftware Testing, Verification and Reliability, Volume 32, Issue 5, August 2022., 2022
Exploratory testing (ET) is an approach to software testing that relies on the expertise of testers. However, testers performing exploratory testing may miss anomalies or unusual interactions proposed by the system. Our approach monitors testers' interactions to suggest, in real time, interactions that increase the diversity of their explorations ...
Julien Leveau   +4 more
wiley   +1 more source

FOXS-GSC—Fast Offset Xpath Service with HexagonS Communication

open access: yesInformatics, 2023
Congestion in large cities is widely recognized as a problem that impacts various aspects of society, including the economy and public health. To support the urban traffic system and to mitigate traffic congestion and the damage it causes, in this ...
Celso A. R. L. Brennand   +2 more
doaj   +1 more source

Large‐scale semi‐automated migration of legacy C/C++ test code

open access: yesSoftware: Practice and Experience, Volume 52, Issue 7, Page 1543-1580, July 2022., 2022
Abstract This is an industrial experience report on a large semi‐automated migration of legacy test code in C and C++. The particular migration was enabled by automating most of the maintenance steps. Without automation this particular large‐scale migration would not have been conducted, due to the risks involved in manual maintenance (risk of ...
Mathijs T. W. Schuts   +3 more
wiley   +1 more source

PRISMA2020: An R package and Shiny app for producing PRISMA 2020‐compliant flow diagrams, with interactivity for optimised digital transparency and Open Synthesis

open access: yesCampbell Systematic Reviews, Volume 18, Issue 2, June 2022., 2022
Abstract Background Reporting standards, such as PRISMA aim to ensure that the methods and results of systematic reviews are described in sufficient detail to allow full transparency. Flow diagrams in evidence syntheses allow the reader to rapidly understand the core procedures used in a review and examine the attrition of irrelevant records throughout
Neal R. Haddaway   +3 more
wiley   +1 more source

Finding XPath Bugs in XML Document Processors via Differential Testing [PDF]

open access: yesInternational Conference on Software Engineering
Extensible Markup Language (XML) is a widely used file format for data storage and transmission. Many XML processors support XPath, a query language that enables the extraction of elements from XML documents.
Shuxin Li, Manuel Rigger
semanticscholar   +1 more source

Protein Data Bank Japan: Celebrating our 20th anniversary during a global pandemic as the Asian hub of three dimensional macromolecular structural data

open access: yesProtein Science, Volume 31, Issue 1, Page 173-186, January 2022., 2022
Abstract Protein Data Bank Japan (PDBj), a founding member of the worldwide Protein Data Bank (wwPDB) has accepted, processed and distributed experimentally determined biological macromolecular structures for 20 years. During that time, we have continuously made major improvements to our query search interface of PDBj Mine 2, the BMRBj web interface ...
Gert‐Jan Bekker   +9 more
wiley   +1 more source

Pattern based processing of XPath queries [PDF]

open access: yes, 2008
As the popularity of areas including document storage and distributed systems continues to grow, the demand for high performance XML databases is increasingly evident.
Marks, Gerard, Roantree, Mark
core   +2 more sources

[Retracted] The Media Public Opinion Analysis on the Implementation of “Double Reduction” Policy in Education Based on Big Data

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
Monitoring the internet media opinion information quickly triggered by the implementation of the “double reduction” policy, and identifying the hot spots, tendencies, communication trends, and characteristics of media opinion are of great significance to government departments to grasp the dynamics of media opinion in time and assist them in decision ...
Jiling Li   +4 more
wiley   +1 more source

Chrome Extension untuk Data Grabber Media Sosial Twitter dengan Metode XPath Selector

open access: yesTechno.Com, 2020
Kebutuhan dataset sebagai sumber penelitian untuk analisis oleh data scientist terus meningkat seiring dengan semakin meningkatnya rasa keingintahuan manusia.
Erinda Resha Astanti   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy