Results 31 to 40 of about 16,602 (259)
A Smart Contract Vulnerability Detection Model Based on Syntactic and Semantic Fusion Learning
As a trusted decentralized application, smart contracts manage a large number of digital assets on the blockchain. Vulnerability detection of smart contracts is an important part of ensuring the security of digital assets. At present, many researchers extract features of smart contract source code for vulnerability detection based on deep learning ...
Daojun Han +4 more
wiley +1 more source
Fostering the diversity of exploratory testing in web applications
Exploratory testing (ET) is an approach to software testing that relies on the expertise of testers. However, testers performing exploratory testing may miss anomalies or unusual interactions proposed by the system. Our approach monitors testers' interactions to suggest, in real time, interactions that increase the diversity of their explorations ...
Julien Leveau +4 more
wiley +1 more source
FOXS-GSC—Fast Offset Xpath Service with HexagonS Communication
Congestion in large cities is widely recognized as a problem that impacts various aspects of society, including the economy and public health. To support the urban traffic system and to mitigate traffic congestion and the damage it causes, in this ...
Celso A. R. L. Brennand +2 more
doaj +1 more source
Large‐scale semi‐automated migration of legacy C/C++ test code
Abstract This is an industrial experience report on a large semi‐automated migration of legacy test code in C and C++. The particular migration was enabled by automating most of the maintenance steps. Without automation this particular large‐scale migration would not have been conducted, due to the risks involved in manual maintenance (risk of ...
Mathijs T. W. Schuts +3 more
wiley +1 more source
Abstract Background Reporting standards, such as PRISMA aim to ensure that the methods and results of systematic reviews are described in sufficient detail to allow full transparency. Flow diagrams in evidence syntheses allow the reader to rapidly understand the core procedures used in a review and examine the attrition of irrelevant records throughout
Neal R. Haddaway +3 more
wiley +1 more source
Finding XPath Bugs in XML Document Processors via Differential Testing [PDF]
Extensible Markup Language (XML) is a widely used file format for data storage and transmission. Many XML processors support XPath, a query language that enables the extraction of elements from XML documents.
Shuxin Li, Manuel Rigger
semanticscholar +1 more source
Abstract Protein Data Bank Japan (PDBj), a founding member of the worldwide Protein Data Bank (wwPDB) has accepted, processed and distributed experimentally determined biological macromolecular structures for 20 years. During that time, we have continuously made major improvements to our query search interface of PDBj Mine 2, the BMRBj web interface ...
Gert‐Jan Bekker +9 more
wiley +1 more source
Pattern based processing of XPath queries [PDF]
As the popularity of areas including document storage and distributed systems continues to grow, the demand for high performance XML databases is increasingly evident.
Marks, Gerard, Roantree, Mark
core +2 more sources
Monitoring the internet media opinion information quickly triggered by the implementation of the “double reduction” policy, and identifying the hot spots, tendencies, communication trends, and characteristics of media opinion are of great significance to government departments to grasp the dynamics of media opinion in time and assist them in decision ...
Jiling Li +4 more
wiley +1 more source
Chrome Extension untuk Data Grabber Media Sosial Twitter dengan Metode XPath Selector
Kebutuhan dataset sebagai sumber penelitian untuk analisis oleh data scientist terus meningkat seiring dengan semakin meningkatnya rasa keingintahuan manusia.
Erinda Resha Astanti +2 more
doaj +1 more source

