نتایج جستجو برای: minute pirate bug
تعداد نتایج: 66771 فیلتر نتایج به سال:
BACKGROUND Stink bugs (Hemiptera: Pentatomidae) comprise a critically important insect pest complex affecting 12 major crops worldwide including cotton. In the US, stink bug damage to developing cotton bolls causes boll abscission, lint staining, reduced fiber quality, and reduced yields with estimated losses ranging from 10 to 60 million dollars annually. Unfortunately, scouting for stink bug ...
The bed bug, Cimex lectularius L., like other bed bug species, is difÞcult to visually locate because it is cryptic. Detector dogs are useful for locating bed bugs because they use olfaction rather than vision. Dogs were trained to detect the bed bug (as few as one adult male or female) and viable bed bug eggs (Þve, collected5Ð6dafter feeding)byusingamodiÞed foodandverbal reward system.Their ef...
classes that group together proteins with similar amino-acid subsequences and similar biological properties. We instigated Kbdock (Kb for “knowledge-based”) to address the problem of PPI modelling and classification at the domain level. In fact, as in many other complex scientific domains, big data approaches in the life sciences can only become viable by explicitly considering and making use o...
Pen-and-Paper interaction (PPI) has recently gained attention as a form of tangible interaction, where normal paper is used in combination with a digtial pen to allow interaction with computer systems. However, research regarding the application domains of PPI has yet been focussed on knowledge work, despite the highly mobile and casual nature of paper. We argue, that the overlooked domain of m...
The fingerprinting technique consists in making the copies of a digital object unique by embedding a different set of marks in each copy. However, a coalition of dishonest users can create pirate copies that try to disguise their identities. We show how equidistant, binary codes that can be used as fingerprinting codes.
Context: Bug fixing is an integral part of software development and maintenance. A large number of bugs often indicate poor software quality, since buggy behavior not only causes failures that may be costly but also has a detrimental effect on the user’s overall experience with the software product. The impact of long lived bugs can be even more critical since experiencing the same bug version ...
Sumner, William N. Ph.D., Purdue University, December 2013. Automated Failure Explanation through Execution Comparison. Major Professor: Xiangyu Zhang. When fixing a bug in software, developers must build an understanding or explanation of the bug and how the bug flows through a program. The effort that developers must put into building this explanation is costly and laborious. Thus, developers...
Empirical studies indicate that automating the bug assignment process (also known as bug triaging) has the potential to significantly reduce software evolution effort and costs. Prior work has used machine learning techniques to automate bug triaging but has employed a narrow band of tools which can be ineffective in large, long-lived software projects. To redress this situation, in this paper ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید