3,130 Hits in 2.7 sec

Error Invariants for Concurrent Traces [article]

Andreas Holzer, Daniel Schwartz-Narbonne, Mitra Tabaei Befrouei, Georg Weissenbacher, Thomas Wies
2016 arXiv   pre-print
We generalize error invariants to concurrent traces by augmenting them with additional information about hazards such as write-after-write events, which are often involved in race conditions and atomicity  ...  Hazard-sensitive slicing significantly reduced the length of the considered traces and still maintained the root causes of the concurrency bugs.  ...  ] they are classified as concurrency bugs).  ... 
arXiv:1608.08584v1 fatcat:5hwc67qno5fodc5by34kqpiot4

Semivariogram models for rice stem bug population densities estimated by ordinary kriging

Mauricio Paulo Batistella Pasini, Eduardo Engel, Alessandro Dal'Col Lúcio, Rafael Pivotto Bortolotto
2020 Acta Scientiarum: Agronomy  
This study aimed to select semivariogram models to estimate rice stem bug population densities by ordinary kriging. Two fields were used to survey the T. limbativentris population in Oryza sativa.  ...  counts, the results were input into circular, spherical, pentaspherical, exponential, Gaussian, rational quadratic, cardinal sine, K-Bessel, J-Bessel, and stable semivariogram models via ordinary kriging interpolation  ...  The SDI is estimated with the expression . The spatial dependence can be classified as strong (SDI > 75%), medium (25 < SDI ≤ 75%), and low (SDI ≤ 25%).  ... 
doi:10.4025/actasciagron.v43i1.48310 fatcat:ierrs7hasbgxbcprzm6ww3lil4

Spatial Distribution of Stink Bugs (Hemiptera: Pentatomidae) in Wheat

Francis P. F. Reay-Jones
2014 Journal of Insect Science  
Acknowledgements The author thanks William Griggs and Terry Teal (Clemson University) for help with data collection.  ...  Figure 5 . 5 Spatial interpolation of SADIE gaps and clusters of stink bug local aggregation indices in field C, Lee County, S.C, 2011.  ...  Figure 4 . 4 Spatial interpolation of SADIE gaps and clusters of stink bug local aggregation indices in field B, Lee County, SC, 2010.  ... 
doi:10.1673/031.014.98 pmid:25205358 pmcid:PMC4212873 fatcat:3upu5flf4jdtpbncis4milwyqm

Review: Gold for the Sultan: Western Bankers and Ottoman Finance, 1856–1881 Christopher Clay

Kate Fleet
2003 Journal of Islamic Studies  
Seasonal counts of stink bugs were spatially associated with spike counts at least once for each species across the four fields.  ...  Adult stink bug counts adjacent to fallow fields were 2.1-fold greater for all species combined compared with counts adjacent to woods.  ...  Acknowledgements The author thanks William Griggs and Terry Teal (Clemson University) for help with data collection.  ... 
doi:10.1093/jis/14.1.98 fatcat:22ir3r5gt5dwvkip6rtyquy34q

Fast and adaptive semantic object extraction from video

Ju Guo, JongWon Kim, C.-C. Jay Kuo, Bhaskaran Vasudev, T. Russell Hsing, Andrew G. Tescher, Robert L. Stevenson
2000 Image and Video Communications and Processing 2000  
Temporal skipping and interpolation procedures are applied to objects that have a slow motion activity. This system can extract simple semantic objects in real time with pixel-wise accuracy.  ...  Fast, accurate and consistent results are obtained in the experiment when the system is evaluated with several MPEG-4 test sequences.  ...  With this algorithm, the bug traces the contour in a clock-wise direction as shown in Fig. 4(a) .  ... 
doi:10.1117/12.382977 fatcat:h3st5d443rhw3ejcg2dsgujwoe

Feature-based detection of bugs in clones

Daniela Steidl, Nils Gode
2013 2013 7th International Workshop on Software Clones (IWSC)  
Clones bear the risk of incomplete bugfixes when the bug is fixed in one code fragment but at least one of its copies is not changed and remains faulty.  ...  In total, the classifier labels 300 instances correctly (54% of all data), 62 clones with incomplete bugfixes and 238 clones without bug.  ...  is to identify clones with bugs.  ... 
doi:10.1109/iwsc.2013.6613047 dblp:conf/iwsc/SteidlG13 fatcat:3h2buf45dverzidtu7glihbffa

Impact of environmental variables on Dubas bug infestation rate: A case study from the Sultanate of Oman

Khalifa M. Al-Kindi, Paul Kwan, Nigel Andrew, Mitchell Welch, Raul Narciso Carvalho Guedes
2017 PLoS ONE  
Firstly, we considered individual environmental variables and their correlations with infestation locations.  ...  Date palm cultivation is economically important in the Sultanate of Oman, with significant financial investment coming from both the government and from private individuals.  ...  Acknowledgments We thank the Plant Protection Research Centre of the Ministry of Agriculture and Fisheries in the Sultanate of Oman for providing the annual data of Dubas Bug infestations.  ... 
doi:10.1371/journal.pone.0178109 pmid:28558069 pmcid:PMC5448759 fatcat:r7p7cuz6qrdczguvbw3ry4ikxy

Symbooglix: A Symbolic Execution Engine for Boogie Programs

Daniel Liew, Cristian Cadar, Alastair F. Donaldson
2016 2016 IEEE International Conference on Software Testing, Verification and Validation (ICST)  
Symbooglix aims to find bugs in Boogie programs efficiently, providing bug-finding capabilities for any program analysis framework that uses Boogie as a target language.  ...  This empiricallydriven optimisation approach avoids over-fitting Symbooglix to our benchmarks, enabling a fair comparison with other tools.  ...  The Boogie verifier also find 35 bugs, but with a high false alarm rate (165 alarms); GPUVerify finds 34 bugs, with a lower false alarm rate (76 alarms).  ... 
doi:10.1109/icst.2016.11 dblp:conf/icst/LiewCD16 fatcat:dg2lmao6hfcwzdpuwdsnfydzou

The Devil is in the Details: Evaluating Limitations of Transformer-based Methods for Granular Tasks [article]

Brihi Joshi, Neil Shah, Francesco Barbieri, Leonardo Neves
2020 arXiv   pre-print
classifier.  ...  Note that best granular results are achieved by interpolating TF-IDF with TBM predictions (w = 0.7).  ...  Collection: With a list of pre-prepared news sources, we extract the links to the RSS feeds of these sources.  ... 
arXiv:2011.01196v1 fatcat:2fcy5jjmrjdgxmp3vy3o3o6b5e

Population density of Tibraca limbativentris on flood irrigated rice and alternative host plants

Mauricio Paulo Batistella Pasini, Alessandro Dal'Col Lúcio, Alberto Cargnelutti Filho, Ana Lúcia de Paula Ribeiro, João Fernando Zamberlan, Sidinei José Lopes
2018 Pesquisa Agropecuária Brasileira  
Andropogon bicornis plants have higher population densities than A. lateralis, and plants with larger diameters show higher population densities of the rice stem bug.  ...  In the cultivated areas, the population density of the rice stem bug increases according to the evolution of the rice phenological stages, with the highest densities concentrated in regions close to the  ...  (OK) interpolation.  ... 
doi:10.1590/s0100-204x2018000300001 fatcat:d2jba6ffu5f5rpld5oru5a334a

Exploring the Naturalness of Buggy Code with Recurrent Neural Networks [article]

Jack Lanchantin, Ji Gao
2018 arXiv   pre-print
In this work, we propose using a more advanced language modeling technique, Long Short-term Memory recurrent neural networks, to model source code and classify buggy lines based on entropy.  ...  ., 2015) showed that it is possible train an n-gram source code language mode, and use it to predict buggy lines in code by determining "unnatural" lines via entropy with respect to the language model.  ...  With the vast amount of archived repositories in websites containing bug reports, there are many opportunities for finding bugs in code. (2) Bug localization is concerned with exactly locating or classifying  ... 
arXiv:1803.08793v1 fatcat:5f6ycji2b5avpijqlvk67udjly

Impacts of climate change on infestations of Dubas bug (Ommatissus lybicus Bergevin) on date palms in Oman

Farzin Shabani, Lalit Kumar, Rashid Hamdan Saif al Shidi
2018 PeerJ  
We utilized the most commonly used threshold of maximum sensitivity + specificity for classifying outputs.  ...  The Dubas bug is a pest of date palm trees that can reduce the crop yield by 50% under future climate scenarios in Oman.  ...  INTRODUCTION Ommatissus lybicus, formerly classified as the "lybicus" variety of O. binotatus and commonly described as the "Old World date bug" or "Dubas bug", was elevated taxonomically to the status  ... 
doi:10.7717/peerj.5545 pmid:30202656 pmcid:PMC6129147 fatcat:vjt6a45fjzbmtkzc4uqorv3ily

Spatial variability in soybean seeds quality and in chemical attributes of the soil of a production field in the Brazilian Cerrado

Danielle Helena Müller, Elisangela Clarete Camili, Walcylene Lacerda Matos Pereira Scaramuzza, Maria Cristina de Figueiredo e Albuquerque
2018 Journal of Seed Science  
by stink bugs at the levels 1-8; Damages by stink bugs 2 -damages caused by stink bugs at the levels 6-8.  ...  which ranged from 4.60 to 9.70 cmol c dm -3 , being classified as low and high, respectively; and organic matter content, which varied from 16.20 to 41.00 g. dm -3 , therefore classified as medium and  ... 
doi:10.1590/2317-1545v40n1182375 fatcat:rl4d6ziafvbppfjmv5e3divjzi

What Gives? A Hybrid Algorithm for Error Trace Explanation [chapter]

Vijayaraghavan Murali, Nishant Sinha, Emina Torlak, Satish Chandra
2014 Lecture Notes in Computer Science  
We present a new technique for automatic error localization, which formally unifies prior approaches based on computing interpolants and minimal unsatisfiable cores of failing executions.  ...  Our technique works by automatically reducing an error trace to its essential components-a minimal set of statements that are responsible for the error, together with key predicates that explain how these  ...  The program's distributors seeded a bug, which sets the default priority (prio) of a process with no priority to be 1 (instead of -1).  ... 
doi:10.1007/978-3-319-12154-3_17 fatcat:a5qe5yitffgmdhzeyxf64mdgaa

Spline Based Intrusion Detection in Vehicular Ad Hoc Networks (VANET) [article]

David A. Schmidt, Mohamad S. Khan, Brian T. Bennett
2019 arXiv   pre-print
Of these systems, vehicular ad hoc networks (VANETs) are particularly difficult to protect due to the dynamic nature of their clients and their necessity for constant interaction with their respective  ...  With this expanded variation, cubic splines can further manipulate the manner in which they interpolate knots and further increasing its robustness when classifying data. D.  ...  DoS typically occurs when an attacker abuses a feature of a system by exploiting bugs or poor designs within the system.  ... 
arXiv:1903.08018v1 fatcat:fvtq2zjsjjf2blfrsbypjxpbq4
« Previous Showing results 1 — 15 out of 3,130 results