نتایج جستجو برای: minute pirate bug

تعداد نتایج: 66771  

Journal: :دانش گیاه پزشکی ایران 0
سمیرا قربانیان دانشجوی سابق کارشناسی ارشد پردیس ابوریحان، دانشگاه تهران حسین رنجبر اقدم استادیار، مؤسسۀ تحقیقات گیاه پزشکی کشور حمید قاجاریه استادیار گروه گیاه پزشکی، پردیس ابوریحان، دانشگاه تهران

citrus mealy bug, planococcus citri (risso)is one of the most common and well knownpest insects of ornamentals. coleus, solenostemon scutellarioides (l.)codd is a suitable host ofthe mealybugs. mealybug destroyer, cryptolaemus montrouzieri mulsant (coleoptera:coccinellidae) is a polyphagous predatory coccinellid, employed in biological controlprograms against citrusmealy bug. the present work w...

Journal: :Archéologie médiévale 2015

2014
Swati Sen Anita Ganpati Aman Kumar Sharma

Open Source Software (OSS) uses open bug repository during development and maintenance, so that both developer and user can reports bugs that they have found. These systems are generally called as bug tracking system or bug repositories. Bug tracking system is open bug repository that is maintained by open source software organizations to track their bugs. In OSS bug reports from all over the w...

2001
Aggelos Kiayias Moti Yung

We present a new generic black-box traitor tracing model in which the pirate-decoder employs a self-protection technique. This mechanism is simple, easy to implement in any (software or hardware) device and is a natural way by which a pirate (an adversary) which is black-box accessible, may try to evade detection. We present a necessary combinatorial condition for black-box traitor tracing of s...

2004
DEAN E. FLETCHER ELIZABETH E. DAKIN BRADY A. PORTER JOHN C. AVISE

We describe for the first time reproductive behaviors in the Pirate Perch (Aphredoderus sayanus), a secretive nocturnal fish whose urogenital opening is positioned far anteriorally, under its throat. Some naturalists had speculated that this peculiar morphological condition might serve to promote egg transfer to the fish’s branchial chamber for gill-brooding; others hypothesized that Pirate Per...

Journal: :Information & Software Technology 2016
Wen Zhang Song Wang Qing Wang

Context: Bug report assignment, namely, to assign new bug reports to developers for timely and effective bug resolution, is crucial for software quality assurance. However, with the increasing size of software system, it is difficult to assign bugs to appropriate developers for bug managers. Objective: This paper propose an approach, called KSAP (K-nearest-neighbor search and heterogeneous prox...

2011
V. B. Singh Krishna Kumar Chaturvedi

Tracking of a reported bug for fixing is a fascinating area of research in software engineering. Many open source, free and commercial bug tracking tools have been developed and are currently under development. The industry needs criteria to select the best tool among the available set of tools that will help in fixing and tracking the progress of bug fixes. In this paper, we use BugZilla, Jira...

2004
Chadd C. Williams Jeffrey K. Hollingsworth

We describe a method of creating tools to find bugs in software that is driven by the analysis of previously fixed bugs. We present a study of bug databases and software repositories that characterize commonly occurring types of bugs. Based on the types of bugs that were commonly reported and fixed in the code, we determine what types of bug finding tools should be developed. We have implemente...

Journal: :IACR Cryptology ePrint Archive 2012
Duong Hieu Phan Viet Cuong Trinh

In the classical model of traitor tracing, one assumes that a traitor contributes its entire secret key to build a pirate decoder. However, new practical scenarios of pirate has been considered, namely Pirate Evolution Attacks at Crypto 2007 and Pirates 2.0 at Eurocrypt 2009, in which pirate decoders could be built from sub-keys of users. The key notion in Pirates 2.0 is the anonymity level of ...

2013
Elio Marchione Shane D. Johnson

OBJECTIVES To examine patterns in the timing and location of incidents of maritime piracy to see whether, like many urban crimes, attacks cluster in space and time. METHODS Data for all incidents of maritime piracy worldwide recorded by the National Geospatial Intelligence Agency are analyzed using time-series models and methods originally developed to detect disease contagion. RESULTS At t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید