-
81
Software Testing Techniques and Tools: A Review
Published 2023-06-01Subjects: Get full text
Article -
82
Accelerating Nested Conditionals on CGRA With Tag-Based Full Predication Method
Published 2020-01-01Subjects: Get full text
Article -
83
A Generalised Coordination Design Pattern for the EX-MAN Component Model
Published 2020-01-01Subjects: Get full text
Article -
84
Learning and Fusing Multi-View Code Representations for Function Vulnerability Detection
Published 2023-06-01Subjects: Get full text
Article -
85
-
86
Semantic Restoration and Automatic Transplant for ROP Exploit Script
Published 2022-11-01Subjects: “…exploit script|control flow hijack|return-orinted programming|transplanting…”
Get full text
Article -
87
Code Characterization With Graph Convolutions and Capsule Networks
Published 2020-01-01Subjects: Get full text
Article -
88
-
89
Mining of Probabilistic Controlling Behavior Model From Dynamic Software Execution Trace
Published 2019-01-01Subjects: Get full text
Article -
90
Design and Research of Climbing Mechanism based on Gear Rack Transmission
Published 2016-01-01Subjects: “…Gear rack transmission;Climbing mechanism;Mathematical model;Control flow…”
Get full text
Article -
91
Graph Mining for Software Fault Localization: An Edge Ranking based Approach
Published 2017-12-01Subjects: Get full text
Article -
92
A Decisional Collaborative System in Hydroelectric Domain
Published 2010-01-01Subjects: Get full text
Article -
93
-
94
The Influence of Alias and References Escape on Java Program Analysis
Published 2015-01-01Subjects: Get full text
Article -
95
Control of the Separation Flow in a Sudden Enlargement
Published 2012-01-01Subjects: “…Control flow…”
Get full text
Article -
96
Constructing method of opaque predicate based on type conversion and operation of floating point numbers
Published 2023-10-01Subjects: Get full text
Article -
97
Code vulnerability detection method based on graph neural network
Published 2021-06-01Subjects: Get full text
Article -
98
Layered object-oriented programming : advanced VTable reuse attacks on binary-level defense
Published 2021Subjects: Get full text
Journal Article -
99
INDUSTRIAL OPPORTUNITIES OF CONTROLLED MELT FLOW DURING GLASS MELTING, PART 1: MELT FLOW EVALUATION
Published 2014-06-01Subjects: Get full text
Article -
100
Stacy-static code analysis for enhanced vulnerability detection
Published 2017-01-01Subjects: Get full text
Article