نتایج جستجو برای: bugs

تعداد نتایج: 6484  

Journal: :Neotropical entomology 2008
Maria C B Moraes Martín Pareja Raúl A Laumann Miguel Borges

In recent years the growing concern about environmental changes and how we are using the natural resources have triggered a search for natural products as alternatives to synthetic pesticides. The stink bugs produce a wide variety of chemical compounds (semiochemicals) that show potential to manage these insects. The stink bugs Chinavia impicticornis (Stål), C. ubica (Rolston), Dichelops melaca...

2013
Susan C. Jones Joshua L. Bryant Scott A. Harrison

ActiveGuard Mattress Liners have been used to control house dust mites, and they also are commercially available as an integrated pest management tool for use against bed bugs (Cimex lectularius). The aim of our study was to evaluate responses of numerous populations of the bed bug to the permethrin-impregnated fabric, with particular regard to contact toxicity, repellency, and feeding inhibiti...

2008
Julia L. Lawall Julien Brunel René Rydhof Hansen Henrik Stuart Gilles Muller

Although a number of approaches to finding bugs in systems code have been proposed, bugs still remain to be found. Current approaches have emphasized scalability more than usability, and as a result it is difficult to relate the results to particular patterns found in the source code and to control the tools to be able to find specific kinds of bugs. In this paper, we propose a declarative appr...

2012
David Strawn

Program maintenance and repair is one of the most time consuming and common jobs for software projects. Finding and repairing bugs in software is essential for the software to be stable, and correcting the bugs usually requires only small changes to the codebase. However, finding the bugs and seeing the correct solution is not always an obvious or easy task, even for the most trivial of softwar...

Introduction: Bed bugs are considered as public health nuisance insects, which can feed on humans and cause psychological distress, insomnia, anxiety, anemia, and skin itching in individuals. The aim of this study was to design and implement a mobile application "identification, prevention, and control of bed bug", and also to assess the satisfaction of mobile users with this application. Metho...

2005
Samuel T. King George W. Dunlap Peter M. Chen

Operating systems are difficult to debug with traditional cyclic debugging. They are non-deterministic; they run for long periods of time; they interact directly with hardware devices; and their state is easily perturbed by the act of debugging. This paper describes a time-traveling virtual machine that overcomes many of the difficulties associated with debugging operating systems. Time travel ...

Journal: :Journal of economic entomology 2015
Narinderpal Singh Changlu Wang Richard Cooper

Effective bed bug (Cimex lectularius L.) monitors have been actively sought in the past few years to help detect bed bugs and measure the effectiveness of treatments. Most of the available active monitors are either expensive or ineffective. We designed a simple and affordable active bed bug monitor that uses sugar-yeast fermentation and an experimental chemical lure to detect bed bugs. The sug...

2013
Patrick Francis Laurie A. Williams

Long-lived software products commonly have a large number of reported defects, some of which may not be fixed for a lengthy period of time, if ever. These so-called languishing bugs can incur various costs to project teams, such as wasted time in release planning and in defect analysis and inspection. They also result in an unrealistic view of the number of bugs still to be fixed at a given tim...

Journal: :CoRR 2017
Michael Schwarz Daniel Gruss Moritz Lipp Clémentine Maurice Thomas Schuster Anders Fogh Stefan Mangard

Double-fetch bugs are a special type of race condition, where an unprivileged execution thread is able to change a memory location between the time-of-check and time-of-use of a privileged execution thread. If an unprivileged attacker changes the value at the right time, the privileged operation becomes inconsistent, leading to a change in control flow, and thus an escalation of privileges for ...

2018
Peng Chen Hao Chen

Fuzzing is a popular technique for finding software bugs. However, the performance of the state-of-the-art fuzzers leaves a lot to be desired. Fuzzers based on symbolic execution produce quality inputs but run slow, while fuzzers based on random mutation run fast but have difficulty producing quality inputs. We propose Angora, a new mutation-based fuzzer that outperforms the state-of-the-art fu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید