Squash Bug Revision

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bug Localization Using Revision Log Analysis and Open Bug Repository Text Categorization

In this paper, we present a new approach to localize a bug in the software source file hierarchy. The proposed approach uses log files of the revision control system and bug reports information in open bug repository of open source projects to train a Support Vector Machine (SVM) classifier. Our approach employs textual information in summary and description of bugs reported to the bug reposito...

متن کامل

Functional Immunomics of the Squash Bug, Anasa tristis (De Geer) (Heteroptera: Coreidae)

The Squash bug, Anasa tristis (De Geer), is a major piercing/sucking pest of cucurbits, causing extensive damage to plants and fruits, and transmitting phytopathogens. No genomic resources to facilitate field and laboratory studies of this pest were available; therefore the first de novo exome for this destructive pest was assembled. RNA was extracted from insects challenged with bacterial and ...

متن کامل

Characterization of Resistance to Squash Silverleaf Disorder in Summer Squash

Feeding nymphs of the silverleaf whitefly, Bemisia argentifolii (formerly known as Bemisia tabaci Gennadius, B strain), cause a physiological disorder known as squash silverleaf (SSL) in summer squash (Cucurbita pepo L.). This disorder is characterized by a progressive silvering on the upper leaf surface caused by the development of large air spaces between the palisade mesophyll cells and the ...

متن کامل

Bug Driven Bug Finders

We describe a method of creating tools to find bugs in software that is driven by the analysis of previously fixed bugs. We present a study of bug databases and software repositories that characterize commonly occurring types of bugs. Based on the types of bugs that were commonly reported and fixed in the code, we determine what types of bug finding tools should be developed. We have implemente...

متن کامل

Smashing SQUASH-0

At the RFID Security Workshop 2007, Adi Shamir presented a new challenge-response protocol well suited for RFIDs, although based on the Rabin public-key cryptosystem. This protocol, which we call SQUASH-0, was using a linear mixing function which was subsequently withdrawn. Essentially, we mount an attack against SQUASH-0 with full window which could be used as a “known random coins attack” aga...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Bulletin of the Entomological Society of America

سال: 1987

ISSN: 0013-8754

DOI: 10.1093/besa/33.2.102