Search alternatives:
like » life (Expand Search)
Showing 81 - 100 results of 2,301 for search 'like of code', query time: 0.12s Refine Results
  1. 81
  2. 82

    Learning probability distributions of sensory inputs with Monte Carlo predictive coding. by Gaspard Oliviers, Rafal Bogacz, Alexander Meulemans

    Published 2024-10-01
    “…These frameworks were brought together by variational filtering that introduced neural sampling to predictive coding. Here, we consider a variant of variational filtering for static inputs, to which we refer as Monte Carlo predictive coding (MCPC). …”
    Get full text
    Article
  3. 83
  4. 84
  5. 85

    Timing and Speculative Execution Attacks: Defeating State-of-the-Art Code-Reuse Defenses by Zhang Tianning, Cai Miao, Zhang Diming, Huang Hao

    Published 2025-01-01
    “…Recently, numerous effective defensive strategies like ASLR and execute-no-read have been put forward to counter code-reuse attacks in software systems. …”
    Get full text
    Article
  6. 86

    Security protocol code analysis method combining model learning and symbolic execution by Xieli ZHANG, Yuefei ZHU, Chunxiang GU, Xi CHEN

    Published 2021-10-01
    “…Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path constraints.According to the characteristics of security protocol program, a method to guide the symbolic execution of security protocol code by using protocol state machine information obtained from model learning was proposed.At the same time, by separating cryptographic logic from protocol interaction logic, the problem that path constraints cannot be solved caused by the complexity of cryptographic logic is avoided.The feasibility of the method is demonstrated by the practice on the SSH open source project Dropbear.Compared with Dropbear's test suite, the proposed method has advantages in code coverage and error point discovery.…”
    Get full text
    Article
  7. 87
  8. 88

    SUBSALS: a subchannel thermal-hydraulic code for IRT type fuel analysis by Tomáš Adámek

    Published 2022-12-01
    “…Detailed calculation of such flow patterns is beyond capabilities of standard system codes used for the thermal hydraulic safety analysis. …”
    Get full text
    Article
  9. 89
  10. 90
  11. 91

    Primordial Biochemicals Within Coacervate-Like Droplets and the Origins of Life by George B. Stefano, Richard M. Kream

    Published 2025-01-01
    “…To explain this phenomenon, we hypothesize that early viral prototype species evolved from ubiquitous environmental DNA and gained the capacity for self-replication within coacervate-like liquid droplets. The high mutation rates experienced in this environment streamlined their acquisition of standard genetic codes and adaptation to a diverse set of host environments. …”
    Get full text
    Article
  12. 92
  13. 93

    Incontestability Provisions in Life Insurance in the Context of Article 1498 of the Turkish Commercial Code by Damla Küçük

    Published 2025-05-01
    “…Incontestability provisions, like in Article 1498 of the Turkish Commercial Code, are one of the regulations included in the insurance laws of almost all modern countries. …”
    Get full text
    Article
  14. 94

    Monte Carlo code Serpent calculation of the parameters of the stationary nuclear fission wave by V. M. Khotyayintsev, V. I. Gulik, O. M. Khotyayintseva, A. V. Aksonov, V. M. Pavlovych

    Published 2017-12-01
    “…n this work, propagation of the stationary nuclear fission wave was simulated for series of fixed power values using Monte Carlo code Serpent. The wave moved in the axial direction in 5 m long cylindrical core of fast reactor with pure 238U raw fuel. …”
    Get full text
    Article
  15. 95

    Evaluation of Generative AI Models in Python Code Generation: A Comparative Study by Dominik Palla, Antonin Slaby

    Published 2025-01-01
    “…Gemini models showed limitations in handling complex code. Cost-effective options like Claude 3 Haiku and Gemini 1.5 Flash were budget-friendly and maintained good accuracy on simpler problems. …”
    Get full text
    Article
  16. 96
  17. 97

    Epsilon negative dynamic coded THz metamaterial beamformer for digital information encryption by Eistiak Ahamed, Rasool Keshavarz, Negin Shariati

    Published 2024-11-01
    “…The proposed MC lens offers applicability like image encryption, security scanning, conveyor systems, hyperlenses and modern cryptography.…”
    Get full text
    Article
  18. 98

    Assessing Compliance: Violations of WHO Code in Breast Milk Substitute Marketing, Ecuador by Betzabé Tello, Silva‐Jaramillo Katherine, Tutasi‐Lozada Angélica, Caicedo‐Borrás Rocío, Valencia Luz María, Rodríguez Estefanía

    Published 2025-04-01
    “…ABSTRACT Breast milk substitute (BMS) marketing significantly influences global infant feeding practices. Ecuador, like many countries, seeks to regulate these promotions under the WHO's International Code of Marketing of Breast‐Milk Substitutes. …”
    Get full text
    Article
  19. 99

    A GPT-Based Code Review System With Accurate Feedback for Programming Education by Dong-Kyu Lee, Inwhee Joe

    Published 2025-01-01
    “…However, integrating Large Language Models (LLMs) like ChatGPT in introductory programming courses raises concerns about AI-assisted cheating. …”
    Get full text
    Article
  20. 100

    Exosomal non-coding RNAs: key regulators of inflammation-related cardiovascular disorders by Mohamed J. Saadh, Faris Anad Muhammad, Rafid Jihad Albadr, Gaurav Sanghvi, Suhas Ballal, Piyus Kumar Pathak, Lakshay Bareja, Zafar Aminov, Waam Mohammed Taher, Mariem Alwan, Mahmood Jasem Jawad, Ali M. Ali Al-Nuaimi

    Published 2025-05-01
    “…They can transport substances like non-coding RNAs, lipids, and proteins between cells, influencing immune responses and inflammation to elicit harmful or healing effects. …”
    Get full text
    Article