منابع مشابه
Bug Localization Using Revision Log Analysis and Open Bug Repository Text Categorization
In this paper, we present a new approach to localize a bug in the software source file hierarchy. The proposed approach uses log files of the revision control system and bug reports information in open bug repository of open source projects to train a Support Vector Machine (SVM) classifier. Our approach employs textual information in summary and description of bugs reported to the bug reposito...
متن کاملFunctional Immunomics of the Squash Bug, Anasa tristis (De Geer) (Heteroptera: Coreidae)
The Squash bug, Anasa tristis (De Geer), is a major piercing/sucking pest of cucurbits, causing extensive damage to plants and fruits, and transmitting phytopathogens. No genomic resources to facilitate field and laboratory studies of this pest were available; therefore the first de novo exome for this destructive pest was assembled. RNA was extracted from insects challenged with bacterial and ...
متن کاملCharacterization of Resistance to Squash Silverleaf Disorder in Summer Squash
Feeding nymphs of the silverleaf whitefly, Bemisia argentifolii (formerly known as Bemisia tabaci Gennadius, B strain), cause a physiological disorder known as squash silverleaf (SSL) in summer squash (Cucurbita pepo L.). This disorder is characterized by a progressive silvering on the upper leaf surface caused by the development of large air spaces between the palisade mesophyll cells and the ...
متن کاملBug Driven Bug Finders
We describe a method of creating tools to find bugs in software that is driven by the analysis of previously fixed bugs. We present a study of bug databases and software repositories that characterize commonly occurring types of bugs. Based on the types of bugs that were commonly reported and fixed in the code, we determine what types of bug finding tools should be developed. We have implemente...
متن کاملSmashing SQUASH-0
At the RFID Security Workshop 2007, Adi Shamir presented a new challenge-response protocol well suited for RFIDs, although based on the Rabin public-key cryptosystem. This protocol, which we call SQUASH-0, was using a linear mixing function which was subsequently withdrawn. Essentially, we mount an attack against SQUASH-0 with full window which could be used as a “known random coins attack” aga...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bulletin of the Entomological Society of America
سال: 1987
ISSN: 0013-8754
DOI: 10.1093/besa/33.2.102