نتایج جستجو برای: wheat bug

تعداد نتایج: 72105  

2008
MARGIE PFIESTER PHILIP G. KOEHLER ROBERTO M. PEREIRA

The bed bug, Cimex lectularius L., like other bed bug species, is difÞcult to visually locate because it is cryptic. Detector dogs are useful for locating bed bugs because they use olfaction rather than vision. Dogs were trained to detect the bed bug (as few as one adult male or female) and viable bed bug eggs (Þve, collected5Ð6dafter feeding)byusingamodiÞed foodandverbal reward system.Their ef...

Journal: :Information & Software Technology 2015
Ripon K. Saha Sarfraz Khurshid Dewayne E. Perry

Context: Bug fixing is an integral part of software development and maintenance. A large number of bugs often indicate poor software quality, since buggy behavior not only causes failures that may be costly but also has a detrimental effect on the user’s overall experience with the software product. The impact of long lived bugs can be even more critical since experiencing the same bug version ...

2015
William Nicholas Sumner Xiangyu Zhang Jan Vitek Suresh Jagannathan Dongyan Xu Sunil Prabhakar William N. Sumner

Sumner, William N. Ph.D., Purdue University, December 2013. Automated Failure Explanation through Execution Comparison. Major Professor: Xiangyu Zhang. When fixing a bug in software, developers must build an understanding or explanation of the bug and how the bug flows through a program. The effort that developers must put into building this explanation is costly and laborious. Thus, developers...

2010
Pamela Bhattacharyaa Iulian Neamtiu Christian R. Shelton

Empirical studies indicate that automating the bug assignment process (also known as bug triaging) has the potential to significantly reduce software evolution effort and costs. Prior work has used machine learning techniques to automate bug triaging but has employed a narrow band of tools which can be ineffective in large, long-lived software projects. To redress this situation, in this paper ...

2017
James D. Hansen Robert S. Nowak

The interaction of feeding by a grass bug, Ir"bisia pacifica (Uhler), and drought stress on growth of Great Basin wildrye, Leymus cinereus (Scrih. & Merr.) Love, and intermediate wheatgrass, Thinopyrum intermedium (Host) Barkw. & D. R. Dewey, was studied in the greenhouse. At peak production, control plants of Great Basin wildrye had more than twice as much green leaf area per tiller than bug-i...

2017
Narinderpal Singh Changlu Wang Chen Zha Richard Cooper Mark Robson

We tested a threshold-based bed bug (Cimex lectularius L.) management approach with the goal of achieving elimination with minimal or no insecticide application. Thirty-two bed bug infested apartments were identified. These apartments were divided into four treatment groups based on apartment size and initial bed bug count, obtained through a combination of visual inspection and bed bug monitor...

Journal: :Journal of medical entomology 2009
Changlu Wang Timothy Gibb Gary W Bennett

The cost and effectiveness of two bed bug (Cimex lectularius L.) integrated pest management (IPM) programs were evaluated for 10 wk. Sixteen bed bug-infested apartments were chosen from a high-rise low-income apartment building. The apartments were randomly divided into two treatment groups: diatomaceous earth dust-based IPM (D-IPM) and chlorfenapyr spray-based IPM (S-IPM). The initial median (...

2016
Anh Hoang Tiffany M. Heng-Moss

In recent years, buffalograss, Buchloë dactyloides (Nuttall) Engelmann has gained popularity as a turfgrass because of its low maintenance requirement, drought tolerance, and limited pests and diseases. Within the last decade, however, the western chinch bug Blissus occiduus Barber has emerged as important pest of buffalograss. Considerable progress has been made toward identifying buffalograss...

2010
Tung M. Le Lachlan L. H. Andrew Hai L. Vu

This report describes a bug in the fragmentation code of the Madwifi driver for the Atheros chipset under the Linux kernel. The bug is due to incorrect locking of a data structure. Techniques for Linux kernel debugging are described, and a fix for the bug is presented.

2016
Mingyi Zhao Aron Laszka Thomas Maillart Jens Grossklags

Despite significant progress in software-engineering practices, software utilized for desktop and mobile computing remains insecure. At the same time, the consumer and business information handled by these programs is growing in its richness and monetization potential, which triggers significant privacy and security concerns. In response to these challenges, companies are increasingly harvestin...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید