نتایج جستجو برای: minute pirate bug

تعداد نتایج: 66771  

2011
Jinjun Xia Adnan Mustafic Michael D Toews Mark A Haidekker

BACKGROUND Stink bugs (Hemiptera: Pentatomidae) comprise a critically important insect pest complex affecting 12 major crops worldwide including cotton. In the US, stink bug damage to developing cotton bolls causes boll abscission, lint staining, reduced fiber quality, and reduced yields with estimated losses ranging from 10 to 60 million dollars annually. Unfortunately, scouting for stink bug ...

2008
MARGIE PFIESTER PHILIP G. KOEHLER ROBERTO M. PEREIRA

The bed bug, Cimex lectularius L., like other bed bug species, is difÞcult to visually locate because it is cryptic. Detector dogs are useful for locating bed bugs because they use olfaction rather than vision. Dogs were trained to detect the bed bug (as few as one adult male or female) and viable bed bug eggs (Þve, collected5Ð6dafter feeding)byusingamodiÞed foodandverbal reward system.Their ef...

Journal: :Journal of Economic Behavior & Organization 2010

2016
Ales Prochazka Lynda Hardman Harald Øverby

classes that group together proteins with similar amino-acid subsequences and similar biological properties. We instigated Kbdock (Kb for “knowledge-based”) to address the problem of PPI modelling and classification at the domain level. In fact, as in many other complex scientific domains, big data approaches in the life sciences can only become viable by explicitly considering and making use o...

2010
Felix Heinrichs Daniel Schreiber Max Mühlhäuser

Pen-and-Paper interaction (PPI) has recently gained attention as a form of tangible interaction, where normal paper is used in combination with a digtial pen to allow interaction with computer systems. However, research regarding the application domains of PPI has yet been focussed on knowledge work, despite the highly mobile and casual nature of paper. We argue, that the overlooked domain of m...

2005
Marcel Fernandez Miguel Soriano Josep Cotrina Navau

The fingerprinting technique consists in making the copies of a digital object unique by embedding a different set of marks in each copy. However, a coalition of dishonest users can create pirate copies that try to disguise their identities. We show how equidistant, binary codes that can be used as fingerprinting codes.

Journal: :Information & Software Technology 2015
Ripon K. Saha Sarfraz Khurshid Dewayne E. Perry

Context: Bug fixing is an integral part of software development and maintenance. A large number of bugs often indicate poor software quality, since buggy behavior not only causes failures that may be costly but also has a detrimental effect on the user’s overall experience with the software product. The impact of long lived bugs can be even more critical since experiencing the same bug version ...

2015
William Nicholas Sumner Xiangyu Zhang Jan Vitek Suresh Jagannathan Dongyan Xu Sunil Prabhakar William N. Sumner

Sumner, William N. Ph.D., Purdue University, December 2013. Automated Failure Explanation through Execution Comparison. Major Professor: Xiangyu Zhang. When fixing a bug in software, developers must build an understanding or explanation of the bug and how the bug flows through a program. The effort that developers must put into building this explanation is costly and laborious. Thus, developers...

2010
Pamela Bhattacharyaa Iulian Neamtiu Christian R. Shelton

Empirical studies indicate that automating the bug assignment process (also known as bug triaging) has the potential to significantly reduce software evolution effort and costs. Prior work has used machine learning techniques to automate bug triaging but has employed a narrow band of tools which can be ineffective in large, long-lived software projects. To redress this situation, in this paper ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید