Academic literature on the topic 'Function calls sequence'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Function calls sequence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Function calls sequence"

1

Wang, Rongcun, Rubing Huang, Yansheng Lu, and Binbin Qu. "Clustering Analysis of Function Call Sequence for Regression Test Case Reduction." International Journal of Software Engineering and Knowledge Engineering 24, no. 08 (October 2014): 1197–223. http://dx.doi.org/10.1142/s0218194014500387.

Full text
Abstract:
Regression test case reduction aims at selecting a representative subset from the original test pool, while retaining the largest possible fault detection capability. Cluster analysis has been proposed and applied for selecting an effective test case subset in regression testing. It groups test cases into clusters based on the similarity of historical execution profiles. In previous studies, historical execution profiles are represented as binary or numeric function coverage vectors. The vector-based similarity approaches only consider which functions or statements are covered and the number of times they are executed. However, the vector-based approaches do not take the relations and sequential information between function calls into account. In this paper, we propose cluster analysis of function call sequences to attempt to improve the fault detection effectiveness of regression testing even further. A test is represented as a function call sequence that includes the relations and sequential information between function calls. The distance between function call sequences is measured not only by the Levenshtein distance but also the Euclidean distance. To assess the effectiveness of our approaches, we designed and conducted experimental studies on five subject programs. The experimental results indicate that our approaches are statistically superior to the approaches based on the similarity of vectors (i.e. binary vectors and numeric vectors), random and greedy function-coverage-based maximization test case reduction techniques in terms of fault detection effectiveness. With respective to the cost-effectiveness, cluster analysis of sequences measured using the Euclidean distance is more effective than using the Levenshtein distance.
APA, Harvard, Vancouver, ISO, and other styles
2

Fleury, Cécile, Jérôme Gracy, Marie-Françoise Gautier, Jean-Luc Pons, Jean-François Dufayard, Gilles Labesse, Manuel Ruiz, and Frédéric de Lamotte. "Comprehensive classification of the plant non-specific lipid transfer protein superfamily towards its sequence–structure–function analysis." PeerJ 7 (August 14, 2019): e7504. http://dx.doi.org/10.7717/peerj.7504.

Full text
Abstract:
Background Non-specific Lipid Transfer Proteins (nsLTPs) are widely distributed in the plant kingdom and constitute a superfamily of related proteins. Several hundreds of different nsLTP sequences—and counting—have been characterized so far, but their biological functions remain unclear. It has been clear for years that they present a certain interest for agronomic and nutritional issues. Deciphering their functions means collecting and analyzing a variety of data from gene sequence to protein structure, from cellular localization to the physiological role. As a huge and growing number of new protein sequences are available nowadays, extracting meaningful knowledge from sequence–structure–function relationships calls for the development of new tools and approaches. As nsLTPs show high evolutionary divergence, but a conserved common right handed superhelix structural fold, and as they are involved in a large number of key roles in plant development and defense, they are a stimulating case study for validating such an approach. Methods In this study, we comprehensively investigated 797 nsLTP protein sequences, including a phylogenetic analysis on canonical protein sequences, three-dimensional structure modeling and functional annotation using several well-established bioinformatics programs. Additionally, two integrative methodologies using original tools were developed. The first was a new method for the detection of (i) conserved amino acid residues involved in structure stabilization and (ii) residues potentially involved in ligand interaction. The second was a structure–function classification based on the evolutionary trace display method using a new tree visualization interface. We also present a new tool for visualizing phylogenetic trees. Results Following this new protocol, an updated classification of the nsLTP superfamily was established and a new functional hypothesis for key residues is suggested. Lastly, this work allows a better representation of the diversity of plant nsLTPs in terms of sequence, structure and function.
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Bing, Chun Shan, Munawar Hussain, Jiadong Ren, and Guoyan Huang. "Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence Patterns." International Journal of Software Engineering and Knowledge Engineering 30, no. 05 (May 2020): 695–719. http://dx.doi.org/10.1142/s0218194020500254.

Full text
Abstract:
Because of the sequence and number of calls of functions, software network cannot reflect the real execution of software. Thus, to detect crucial functions (DCF) based on software network is controversial. To address this issue, from the viewpoint of software dynamic execution, a novel approach to DCF is proposed in this paper. It firstly models, the dynamic execution process as an execution sequence by taking functions as nodes and tracing the stack changes occurring. Second, an algorithm for deleting repetitive patterns is designed to simplify execution sequence and construct software sequence pattern sets. Third, the crucial function detection algorithm is presented to identify the distribution law of the numbers of patterns at different levels and rank those functions so as to generate a decision-function-ranking-list (DFRL) by occurrence times. Finally, top-k discriminative functions in DFRL are chosen as crucial functions, and similarity the index of decision function sets is set up. Comparing with the results from Degree Centrality Ranking and Betweenness Centrality Ranking approaches, our approach can increase the node coverage to 80%, which is proven to be an effective and accurate one by combining advantages of the two classic algorithms in the experiments of different test cases on four open source software. The monitoring and protection on crucial functions can help increase the efficiency of software testing, strength software reliability and reduce software costs.
APA, Harvard, Vancouver, ISO, and other styles
4

Sievert, Volker, Sylvia Kuhn, Achim Paululat, and Walther Traut. "Sequence conservation and expression of the Sex-lethal homologue in the fly Megaselia scalaris." Genome 43, no. 2 (March 15, 2000): 382–90. http://dx.doi.org/10.1139/g99-132.

Full text
Abstract:
Sex-lethal (Sxl) is Drosophila melanogaster's key regulating gene in the sex-determining cascade. Its homologue in Megaselia scalaris, the chromosome 3 gene Megsxl, codes for a protein with an overall similarity of 77% with the corresponding D. melanogaster sequence. Expression in M. scalaris, however, is very unlike that in D. melanogaster. Megsxl transcripts with a long ORF occur in both sexes. Differential splicing is conserved but not sex-specific. There are several splice variants, among them one is common to gonads and somatic tissues of all developmental stages investigated, one is specific for ovaries and embryos, and a third one is not found in ovaries. In the ovary, Megsxl is heavily transcribed in nurse cells and transported into eggs. These results suggest a non-sex-determining function during early embryogenesis; the presence of Megsxl RNA in testes and somatic tissues calls for other (or more) functions. Key words: sex determination, RNA-binding domain, differential splicing, RNA in situ hybridization.
APA, Harvard, Vancouver, ISO, and other styles
5

Hansen, Per Krogh. "Tiden ødelægger alt. Om episodisk bagvendte fortællinger illustreret ved hjælp af Gaspar Noés Irréversible." K&K - Kultur og Klasse 39, no. 112 (December 25, 2011): 93–106. http://dx.doi.org/10.7146/kok.v39i112.15746.

Full text
Abstract:
TIME DESTROYS EVERYTHING | This article focuses on what Seymour Chatman calls ‘sustained episodic reversal’ of narrative progressionR– that is, narratives in which the sequential, chronological order of the events is reversed and thereby ‘de-’ or ‘unnaturalized’. The article opens with a short discussion of the project of ‘unnatural narratology,’ and it is claimed that if our experience of a given narrative as ‘natural’ is grounded on its confirmation of the conventions for the mode or genre the narrative belongs to, then the task for an ‘unnatural narratology’ is to investigate the exceptions, that is, cases where conventions are broken and perhaps reformulated. Sustained episodic reversals of event sequences belong to this field of interest insofar as one of the basic features of ‘natural narrative’ is that the sequence of clauses (or more generally, the sjuzhet or discourse) is typically matched to the sequence of the events being narrated (the fabulaor story). The denaturalizing function and effect of the sustained reversal is illustrated through analysis of Gaspar Noé’s Irréversible (2002). It is shown that the reversal has radical consequencesfor the spectator’s (re)construction of the narrative’s fabula, and that it engages the reader in a game of post hoc ergo propter hoc and of narrative construction and deconstruction.
APA, Harvard, Vancouver, ISO, and other styles
6

Nissen, P. E., J. Christensen-Dalsgaard, J. R. Mosumgaard, V. Silva Aguirre, E. Spitoni, and K. Verma. "High-precision abundances of elements in solar-type stars." Astronomy & Astrophysics 640 (August 2020): A81. http://dx.doi.org/10.1051/0004-6361/202038300.

Full text
Abstract:
Aims. Previous high-precision studies of abundances of elements in solar twin stars are extended to a wider metallicity range to see how the trends of element ratios with stellar age depend on [Fe/H]. Methods. HARPS spectra with signal-to-noise ratios S/N ≳ 600 at λ​ ∼ ​6000 Å were analysed with MARCS model atmospheres to obtain 1D LTE abundances of C, O, Na, Mg, Al, Si, Ca, Ti, Cr, Fe, Ni, Sr, and Y for 72 nearby solar-type stars with metallicities in the range of −0.3 ≲ [Fe/H] ≲ +0.3 and ASTEC stellar models were used to determine stellar ages from effective temperatures, luminosities obtained via Gaia DR2 parallaxes, and heavy element abundances. Results. The age-metallicity distribution appears to consist of the following two distinct populations: a sequence of old stars with a steep rise of [Fe/H] to ∼​ + 0.3 dex at an age of ∼​7 Gyr and a younger sequence with [Fe/H] increasing from about −0.3 dex to ∼​ + 0.2 dex over the last 6 Gyr. Furthermore, the trends of several abundance ratios, [O/Fe], [Na/Fe], [Ca/Fe], and [Ni/Fe], as a function of stellar age, split into two corresponding sequences. The [Y/Mg]-age relation, on the other hand, shows no offset between the two age sequences and has no significant dependence on [Fe/H], but the components of a visual binary star, ζ Reticuli, have a large and puzzling deviation. Conclusions. The split of the age-metallicity distribution into two sequences may be interpreted as evidence of two episodes of accretion of gas onto the Galactic disk with a quenching of star formation in between. Some of the [X/Fe]-age relations support this scenario but other relations are not so easy to explain, which calls for a deeper study of systematic errors in the derived abundances as a function of [Fe/H], in particular 3D non-LTE effects.
APA, Harvard, Vancouver, ISO, and other styles
7

Nie, Dan, and Yu Hui Wang. "Taint Graph of System Call Arguments for Intrusion Detection in Mobile Intelatrac." Advanced Materials Research 546-547 (July 2012): 1101–6. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1101.

Full text
Abstract:
The intended data-flow in a vulnerable program is subject to be subverted by attacks which exploit buffer overflows or format string vulnerabilities to write data to unintended location. In Mobile Telecommunication it is especially important on data safety. These attacks can be classified into two types: control-flow-attacks exploit buffer overflows or other vulnerabilities to overwrite a return address, a function pointer, or some other piece of control-data; non-control-data attacks exploit similar vulnerabilities to overwrite security critical data without subverting the intended control-flow in the program. The control-flow attacks are well studied and widely used, so there are several typical approaches to prevent them, which monitor the sequence of system calls emitted by the application being monitored and utilize control-flow information of the system calls for intrusion detection. However, the non-control-data attacks are rare for the reason that they rely on specific semantics of the target applications, and there are only few works that defend them to some extent. In order to prevent non-control-data attacks, we leverage dynamic taint technique to track the instruction level relationship between different system call arguments and construct taint graph which can represent behavior profile of a benign program in this paper..
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Hui, Zhengqiang Li, Qingshan Jiang, Abdur Rasool, and Lifei Chen. "A Hierarchical Approach for Android Malware Detection Using Authorization-Sensitive Features." Electronics 10, no. 4 (February 10, 2021): 432. http://dx.doi.org/10.3390/electronics10040432.

Full text
Abstract:
Android’s openness has made it a favorite for consumers and developers alike, driving strong app consumption growth. Meanwhile, its popularity also attracts attackers’ attention. Android malware is continually raising issues for the user’s privacy and security. Hence, it is of great practical value to develop a scientific and versatile system for Android malware detection. This paper presents a hierarchical approach to design a malware detection system for Android. It extracts four authorization-sensitive features: basic blocks, permissions, Application Programming Interfaces (APIs), and key functions, and layer-by-layer detects malware based on the similar module and the proposed deep learning model Convolutional Neural Network and eXtreme Gradient Boosting (CNNXGB). This detection approach focuses not only on classification but also on the details of the similarities between malware software. We serialize the key function in light of the sequence of API calls and pick up a similar module that captures the global semantics of malware. We propose a new method to convert the basic block into a multichannel picture and use Convolutional Neural Network (CNN) to learn features. We extract permissions and API calls based on their called frequency and train the classification model by XGBoost. A dynamic similar module feature library is created based on the extracted features to assess the sample’s behavior. The model is trained by utilizing 11,327 Android samples collected from Github, Google Play, Fdroid, and VirusShare. Promising experimental results demonstrate a higher accuracy of the proposed approach and its potential to detect Android malware attacks and reduce Android users’ security risks.
APA, Harvard, Vancouver, ISO, and other styles
9

Han, Yongman, Jongcheon Choi, Seong-Je Cho, Haeyoung Yoo, Jinwoon Woo, Yunmook Nah, and Minkyu Park. "A new detection scheme of software copyright infringement using software birthmark on windows systems." Computer Science and Information Systems 11, no. 3 (2014): 1055–69. http://dx.doi.org/10.2298/csis130918064h.

Full text
Abstract:
As software is getting more valuable, unauthorized users or malicious programmers illegally copies and distributes copyrighted software over online service provider (OSP) and P2P networks. To detect, block, and remove pirated software (illegal programs) on OSP and P2P networks, this paper proposes a new filtering approach using software birthmark, which is unique characteristics of program and can be used to identify each program. Software birthmark typically includes constant values, library information, sequence of function calls, and call graphs, etc. We target Microsoft Windows applications and utilize the numbers and names of DLLs and APIs stored in a Windows executable file. Using that information and each cryptographic hash value of the API sequence of programs, we construct software birthmark database. Whenever a program is uploaded or downloaded on OSP and P2P networks, we can identify the program by comparing software birthmark of the program with birthmarks in the database. It is possible to grasp to some extent whether software is an illegally copied one. The experiments show that the proposed software birthmark can effectively identify Windows applications. That is, our proposed technique can be employed to efficiently detect and block pirated programs on OSP and P2P networks.
APA, Harvard, Vancouver, ISO, and other styles
10

Yelensky, Roman, Kai Wang, Snjezana Dogan, Laetitia Borsu, Garrett Frampton, Doron Lipson, Philip Stephens, et al. "Next-generation sequencing of FFPE solid tumor specimens for clinical use." Journal of Clinical Oncology 30, no. 15_suppl (May 20, 2012): 10524. http://dx.doi.org/10.1200/jco.2012.30.15_suppl.10524.

Full text
Abstract:
10524 Background: As more therapies targeting genomic alterations become available, genotyping (e.g., by Sequenom) is increasingly performed in tumor types where mutational status may drive treatment choice. Next-generation sequencing (NGS) technology can expand on genotyping of individual base pairs because it can detect mutations across entire exons, copy changes and fusion genes. However, for NGS to be clinically viable, it must be made compatible with FFPE tissues and shown concordant with best current diagnostic methods. Methods: To explore a potential clinical role for NGS, we selected 120 FFPE specimens (68 NSCLC, 32 CRC, 20 melanoma) previously tested for 97 oncogenic mutations in 8 oncogenes by Sequenom, and sequenced all exons of 182 cancer genes. Genotyping and sequencing were both performed in CLIA compliant labs. DNA was extracted from 4x 10μ unstained sections from the diagnostic FFPE block, followed by library construction and hybridization capture of 3230 exons and 37 commonly rearranged introns. Average coverage of >900X uniquely-mapping reads was obtained. Sequence data were analyzed for all genomic alterations and examined for potentially actionable mutations. Results: High concordance was noted between Sequenom and NGS: 103 and 105 mutations were called by the two technologies, respectively, at mutually tested sites, with 97 mutation calls in common. Notably, mutant allele frequencies in concordant calls ranged as low as 2% by NGS, highlighting the sensitivity of detection enabled by both approaches. Furthermore, in 45/120 (38%) specimens, NGS revealed additional alterations that may confer sensitivity or resistance to approved or experimental targeted therapies and thus plausibly influence treatment decisions. These included 39 copy changes or loss-of-function variants best assayed by an NGS approach. Conclusions: Our results demonstrate technical feasibility and highlight potential benefits of comprehensive cancer gene characterization through next-generation sequencing of clinical FFPE specimens. As NGS is the most practical means to detect all classes of somatic alteration in a small, clinically relevant sample, we suggest that this type of testing will become an essential component of patient care.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Function calls sequence"

1

Harmim, Dominik. "Pokročilá statická analýza atomičnosti v paralelních programech v prostředí Facebook Infer." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445592.

Full text
Abstract:
Nástroj Atomer je statický analyzátor založený na myšlence, že pokud jsou některé sekvence funkcí vícevláknového programu prováděny v některých bězích pod zámky, je pravděpodobně zamýšleno, že mají být vždy provedeny atomicky. Analyzátor Atomer se tudíž snaží takové sekvence hledat a poté zjišťovat, pro které z nich může být v některých jiných bězích programu porušena atomicita. Autor této diplomové práce ve své bakalářské práci navrhl a implementoval první verzi nástroje Atomer jako zásuvný modul aplikačního rámce Facebook Infer. V této diplomové práci je navržena nová a výrazně vylepšená verze analyzátoru Atomer. Cílem vylepšení je zvýšení jak škálovatelnosti, tak přesnosti. Kromě toho byla přidána podpora pro několik původně nepodporovaných programovacích vlastností (včetně např. možnosti analyzovat programy napsané v jazycích C++ a Java nebo podpory pro reentrantní zámky nebo stráže zámků, tzv. "lock guards"). Prostřednictvím řady experimentů (včetně experimentů s reálnými programy a reálnými chybami) se ukázalo, že nová verze nástroje Atomer je skutečně mnohem obecnější, přesnější a lépe škáluje.
APA, Harvard, Vancouver, ISO, and other styles
2

Tseng, Chun-han, and 曾俊翰. "Intrusion Detection Using Function-based Sequences of System Calls." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/9u5t6d.

Full text
Abstract:
碩士
國立中央大學
資訊工程研究所
96
Computer and network security problems cause billions in damage every year. As the use of Internet, modern computer systems are plagued from security vulnerabilities. Security issues have become more and more important in such environment. Although the concept of buffer overflows had been known for years, modern computer systems suffered from these kinds of security weaknesses constantly. This article presents an improved method for intrusion detection, which detect abnormal behaviors of a process using function-based sequences of system calls. The method is especially effective in detecting Buffer Overflow Attacks. Our method also stored these sequences through a data structure called Suffix Tree, which improved our system performance a lot. Experiments show that our method has better effectiveness and performance than previous methods.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Function calls sequence"

1

Milstein, Sara J. Making a Case. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780190911805.001.0001.

Full text
Abstract:
Outside of the Bible, all of the known Near Eastern law collections were produced in the third to second millennia BCE, in cuneiform on clay tablets, and in major cities in Mesopotamia and in the Hittite Empire. None of the five major sites in Syria to have yielded cuneiform tablets has borne even a fragment of a law collection, despite the fact that several have yielded ample legal documentation. Excavations at Nuzi have turned up numerous legal documents, but again, no law collection. Even Egypt has not yielded a collection of laws. As such, the biblical blocks that scholars regularly identify as law collections would represent the only “western,” non-cuneiform expressions of the genre in the ancient Near East, produced by societies not known for their political clout, and separated in time from the “other” collections by centuries. Making a Case challenges the long-held notion that Israelite and Judahite scribes either made use of older law collections or set out to produce law collections in the Near Eastern sense of the genre. Rather, Milstein suggests that what we call “biblical law” is closer in form and function to a different and oft-neglected Mesopotamian genre: legal-pedagogical texts. In the course of their education, Mesopotamian scribes copied a variety of legal-oriented school texts: sample contracts, fictional cases, sequences of non-canonical law, and legal phrasebooks. When “biblical law” is viewed in the context of these legal-pedagogical texts, its practical roots in legal exercises begin to emerge.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Function calls sequence"

1

Ariola, Zena M., Paul Downen, Hugo Herbelin, Keiko Nakata, and Alexis Saurin. "Classical Call-by-Need Sequent Calculi: The Unity of Semantic Artifacts." In Functional and Logic Programming, 32–46. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29822-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Cui, Zhanqi, Xiang Chen, Yongmin Mu, Zhihua Zhang, and Xu Ma. "Mining Function Call Sequence Patterns Across Different Versions of the Project for Defect Detection." In Software Analysis, Testing, and Evolution, 154–69. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-04272-1_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bailey, Timothy L. "MEME, MAST, and Meta-MEME: New Tools for Motif Discovery in Protein Sequences." In Pattern Discovery in Biomolecular Data. Oxford University Press, 1999. http://dx.doi.org/10.1093/oso/9780195119404.003.0008.

Full text
Abstract:
We are in the midst of an explosive increase in the number of DNA and protein sequences available for study, as various genome projects come on line. This wealth of information offers important opportunities for understanding many biological processes and developing new plant and animal models, and ultimately drugs, for human diseases, in addition to other applications of modern biotechnology. Unfortunately, sequences are accumulating at a pace that strains present methods for extracting significant biological information from them. A consequence of this explosion in the sequence databases is that there is much interest and effort in developing tools that can efficiently and automatically extract the relevant biological information in sequence data and make it available for use in biology and medicine. In this chapter, we describe one such method that we have developed based on algorithms from artificial intelligence research. We call this software tool MEME (Multiple Expectation-maximization for Motif Elicitation). It has the attractive property that it is an “unsupervised” discovery tool: it can identify motifs, such as regulatory sites in DNA and functional domains in proteins, from large or small groups of unaligned sequences. As we show below, motifs are a rich source of information about a dataset; they can be used to discover other homologs in a database, to identify protein subsets that contain one or more motifs, and to provide information for mutagenesis studies to elucidate structure and function in the protein family as well as its evolution. Learning tools are used to extract higher level biological patterns from lower level DNA and protein sequence data. In contrast, search tools such as BLAST (Basic Local Alignment Search Tool) take a given higher level pattern and find all items in a database that possess the pattern. Searching for items that have a certain pattern is a problem intrinsically easier than discovering what the pattern is from items that possess it. The patterns considered here are motifs, which for DNA data can be subsequences that interact with transcription factors, polymerases, and other proteins.
APA, Harvard, Vancouver, ISO, and other styles
4

Bauer, Thomas, and Robert Eschbach. "Model-Based Testing of Distributed Functions." In Advanced Automated Software Testing, 151–81. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0089-8.ch008.

Full text
Abstract:
The standard-compliant development of component-based embedded systems calls for systematic coverage of product requirements and for testing component interactions at the system integration stage. System functionality is represented by a set of complex distributed functions, i.e., functions that are spread across several system components. This chapter presents a novel automated model-based testing approach for distributed functions that uses informal system requirements and component behavior models. The test modeling notation makes it possible to model component interactions and composite functions with defined pre- and post-conditions. Test cases are automatically generated as scenarios of distributed functions represented by sequences of component interactions.
APA, Harvard, Vancouver, ISO, and other styles
5

Smullyan, Raymond M. "Indexing." In Recursion Theory for Metamathematics. Oxford University Press, 1993. http://dx.doi.org/10.1093/oso/9780195082326.003.0007.

Full text
Abstract:
For the remaining chapters, we will need two basic theorems in recursive function theory—the enumeration theorem of Kleene and Post and the iteration theorem of Kleene. §1. Indexing. we wish to arrange all r.e. sets in an infinite sequence ω0, ω1, . . . ,ωn , . . . (allowing repetitions) in such a way that the relation xÎ ωy is r.e. we shall take the system (Q) as our basic formalism for recursive function theory. we know that (Q) is axiomatizable and that the representable sets of (Q) are precisely the r.e. sets. we define ωi - as the set of all numbers n such that Ei[ n̅ ] is provable in (Q). Equivalently, wi- is the set of all n such that r(i,n) Î P, where r(i,n) is the Gödel number of Ei[ n̅ ] and P is the set of Gödel numbers of the provable formulas of (Q). Since r(x,y) is a recursive function and P is an r.e. set, then the relation r(x,y) Î P is r.e., and this is the relation y Î ωx. Also, every r.e. set A is represented in (Q) by some formula Ei(v1); hence A = ωi. Thus every r.e. set appears in our enumeration. we call i an index of an r.e. set A if A = ωi. we let U(x,y) be the relation x Î ωy , and we see that this relation is r.e. Indexing of r.e. Relations. For each n ³ 2, we also wish to arrange all r.e. relations of degree n an in infinite sequence . . . Ron,R1n , . . . , Rnn , . . . in such a manner that the relation Ryn(x1, . . . ,xn) is an r.e. relation among x1, . . . , xn and y. To this end, it will be convenient to use the indexing of r.e. sets that we already have and to use the recursive pairing function J(x,y) and its associated functions Jn(x1,. . . ,xn) (cf. §4, Chapter 1).
APA, Harvard, Vancouver, ISO, and other styles
6

O’Leary, Jared. "Coding “Hip Hot Cross Buns” with Sonic Pi (Beginner)." In The Music Technology Cookbook, 301–10. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197523889.003.0050.

Full text
Abstract:
The purpose of this lesson is to learn how to code the song “Hot Cross Buns” with the software Sonic Pi. Learning outcomes of this activity include: 1) how to create and call functions to trigger sequences (algorithms) of notes or samples, 2) how to use “sleep” to create timing separation between notes or samples, 3) how to use repeats to loop a musical phrase, and 4) how to use parameters and effects to shape or change the sonic characteristics of the notes and samples. Because the song being coded will be recognizable to many students, learners can hear if they are on the right track, which can be a fun way for them to receive feedback while engaging in the music programming process.
APA, Harvard, Vancouver, ISO, and other styles
7

Patel, Bhaskar N., and S. G. Prajapati. "Performance Comparison of AODV and DSDV Routing Protocols of MANET." In Technological Advancements and Applications in Mobile Ad-Hoc Networks, 144–51. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0321-9.ch008.

Full text
Abstract:
A mobile ad hoc network is a collection of mobile nodes communicating without wired network and infrastructure or centralized control. Due to limited transmission range of wireless network, more than single hops may be required to transfer data across the network. In order to reliable communication within the network, a routing protocol is used which are call MANET routing protocol. The major function of such an MANET routing protocol is to establishment short and real route between a pair of nodes so that messages may be delivered in a timely manner. This chapter examines two routing protocols for mobile ad hoc networks– the Destination Sequenced Distance Vector (DSDV), the pro-active routing protocol, and the Ad hoc On- Demand Distance Vector routing (AODV), an re-active routing protocol. The authors compare both protocols based on packet delivery fraction and average delay with changing number of source nodes and pause time.
APA, Harvard, Vancouver, ISO, and other styles
8

Sánchez-Pozos, Katy, María de los Ángeles Granados-Silvestre, and María Guadalupe Ortíz-López. "From Pharmacogenetics to Gene Expression: Implications for Precision Medicine in Diabetes." In Drug Metabolism [Working Title]. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.97375.

Full text
Abstract:
Approximately 25–60% of patients show specific pharmacological responses to a particular drug. We call this interindividual variability (IV) response to drugs affecting their efficacy and the appearance of side effects in individuals. This IV may be due to multifactorial components such as genetic factors (single nucleotide polymorphisms, SNPs; and copy number variations, CNV), environmental stimuli, epigenetic modulation, disease/health conditions, or drug interactions, among others. Therefore, these factors can influence the response to the drug by modifying absorption, metabolism, pharmacokinetics (PK), and pharmacodynamics (PD), causing the loss of treatment efficacy or leading to adverse drug reactions with negative consequences for patients. The knowledge in pharmacogenetics (study of pharmacological consequences of single gene mutations) and pharmacogenomics (study of the influence of many gene or gene patterns in the reponse to drugs), disciplines that seek to predict how a specific individual responds to the administration of a particular drug, has advanced by leaps and bounds thanks to “omics” technologies. Nonetheless, despite, the development of next-generation sequencing platforms and the mapping of the human genome have transformed the field of pharmacogenetics, the translational into clinical practice has been slow. Therefore, identification of SNPs that could affect the expression of pharmacogenes in order to make associations with PK and PD will improve our understanding of genetic effects on drug efficacy and transfer it to the clinic. Type 2 diabetes (T2D) represents a national public health problem, not only because of the high frequency of the disease reported worldwide, but also because of the poor adherence to therapeutic management, whose causes have not yet been clarified. One of the challenges in the management of diseases to reach optimal treatment is the complex genetic background. Hence, the integration of multiple levels of pharmacological information, including variation in gene sequence, impact in drug response, and function of drug targets, could help us to predict sources of interpatient variability in drug effects, laying the basis for precision therapy. Thus, the present chapter aims to collect all the available data about genetic variations in pharmacogenes affecting drug response in T2D and integrate it with their effect on gene expression to elucidate their impact in pharmacological efficacy.
APA, Harvard, Vancouver, ISO, and other styles
9

Gaines, Susan M., Geoffrey Eglinton, and Jürgen Rullkötter. "Molecular Paleontology and Biochemical Evolution." In Echoes of Life. Oxford University Press, 2008. http://dx.doi.org/10.1093/oso/9780195176193.003.0015.

Full text
Abstract:
Carl Woese’s drive for a unified system of biological classification didn’t just open the microbial world to exploration: it reshuffled the entire taxonomic system and revolutionized the way that biologists study evolution, reigniting interest in preanimal evolution. Studies of evolution from the mid-nineteenth through most of the twentieth century relied on the comparison of forms in living and fossil organisms and were limited to the complex multicellular organisms that developed over the past 550 million years. In other words, much was known about the evolution of animals and land plants that left distinctive hard fossils, and very little was known about the unicellular algae and microorganisms that occupied the seas for most of the earth’s history. Woese’s Tree of Life, derived from nucleic acid sequences in ribosomal RNA, has revealed ancestral relationships that form and function don’t even hint at, allowing biologists to look beyond the rise of multicellular life and link it with less differentiated, more primal forms—which was precisely Woese’s intention. But evolution is a history, not just a family tree of relationships. If the information stored in the genes of extant organisms is to provide true insight into that history, it needs to be anchored in time, linked to extinct organisms and to past environments. Ultimately, we must look to the record in the rocks and sediments, just as paleontologists and biologists have been doing for the past two centuries. In Darwin’s time, that record comprised rocks from the past 550 million years, a span of time that geologists now call the Phanerozoic eon, based on Greek words meaning visible or evident life. The eon began with the rocks of the Cambrian period, in which nineteenth- and early-twentieth-century paleontologists discovered a fabulous assortment of fossils—traces of trilobites, anemones, shrimp, and other multicellular animals that were completely missing from any of the earlier strata. Thousands of new animals and plants, including representatives of almost all contemporary groups, as well as hundreds of now-extinct ones, appeared so suddenly between 542 and 530 million years ago that paleontologists refer to the phenomenon as the Cambrian “explosion.”
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Function calls sequence"

1

Gorji, Alireza, and Mahdi Abadi. "Detecting Obfuscated JavaScript Malware Using Sequences of Internal Function Calls." In the 2014 ACM Southeast Regional Conference. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2638404.2737181.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kawasoe, Reo, Chansu Han, Ryoichi Isawa, Takeshi Takahashi, and Jun'ichi Takeuchi. "Investigating behavioral differences between IoT malware via function call sequence graphs." In SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3412841.3442041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ditu, Bogdan. "Model-Based Function Call Code Generation and Stack Management in Retargetable Compilers: Application Binary Interface Modeling of Stack Layout and Function Call Sequence." In 2015 20th International Conference on Control Systems and Computer Science (CSCS). IEEE, 2015. http://dx.doi.org/10.1109/cscs.2015.38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Myoung Yee, and Yoonsik Cheon. "A Fitness Function to Find Feasible Sequences of Method Calls for Evolutionary Testing of Object-Oriented Programs." In 2008 International Conference on Software Testing, Verification, and Validation. IEEE, 2008. http://dx.doi.org/10.1109/icst.2008.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wang, Nanxin, and Jie Cheng. "EMAT: An Engineering Methodology Application Tool." In ASME 1995 15th International Computers in Engineering Conference and the ASME 1995 9th Annual Engineering Database Symposium collocated with the ASME 1995 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1995. http://dx.doi.org/10.1115/cie1995-0730.

Full text
Abstract:
Abstract More and more applications in today’s automotive industry call for integration of existing product design/analysis programs into packages to perform a higher level of system functionality, such as total engine analysis, model-based engine mapping, and powertrain system or vehicle optimization. The functional and procedural specifications for these integrations are often referred to as engineering methodologies. To enable the rapid prototyping of these methodologies, a generic software integration framework, EMAT (Engineering Methodology Application Tool) has been developed. EMAT consists of a high-level language environment MDL (Methodology Description Language) and a program for process execution scheduling and monitoring based on an artificial intelligence technology called Blackboard. Under the EMAT framework, a user can easily specify the control flow and data flow for any methodology in a declarative manner. Such a specification only needs to contain logical orders in which individual component programs will be executed (such as sequence, branching, or looping), and the input/output connections between the programs. EMAT will then dynamically interpret this specification into procedures that actually carry out the execution. In contrast to the conventional integration practices such as developing application specific scripts, EMAT provides a generic and high level means for integration, which improves hot only the efficiency of programing, but also the modularity, maintainability, and reusability of software. EMAT is currently being applied to the integration of multiple engine simulation programs to prototype complicated engineering methodologies for a wide range of applications within FORD.
APA, Harvard, Vancouver, ISO, and other styles
6

Cipollone, Roberto, Davide Di Battista, and Angelo Gualtieri. "Energy Recovery From the Turbocharging System of Internal Combustion Engines." In ASME 2012 11th Biennial Conference on Engineering Systems Design and Analysis. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/esda2012-82302.

Full text
Abstract:
On the road transportation sector, considering its deep involvement with many social expectations, assumed such proportions to become one of the major source of air pollution, mainly in urban highly congested areas. The use of reciprocating internal combustion engines (ICE) dominates the sector and the environmental dimension of the problem is under a strong attention of Governments. European Community, for instance, through sequences of regulations (EURO) reduced the emission allowed of primary pollutants; more recently, the Community added limits to climate-altering gases which directly refer to fuel consumption reduction. These limits today appear the new driver of the future engine and vehicle technological evolution. Similar efforts are under commitment by other developed countries (USA, Japan, etc,…) as well as also by the other Countries whose economic importance will dominate the markets in a very near future (BRICS Countries). The need to fulfill these issues and to keep the traditional engine expectations (torque, speed, fun to drive, etc..) triggered, especially in recent decades, a virtuous cycle whose result will be a new engine and vehicle era. The evolution till had today has been driven by the EURO limits and it demonstrated surprisingly that emission reduction and engine performances can be matched without compromises in both sides. Today, adding severe limits on equivalent CO2, emissions, it appears very difficult to predict how future engines (and vehicles) will be improved; new technologies are entering to further improve the traditional thermal powertrain but the way to a massive and more convinced electrification seems to be definitely opened. The two aspects will match in the sector of energy recovery which appears one of the most powerful tools for fuel consumption saving and CO2 reduction. When the recovery is done on exhaust gases it has an additional interest, having a moderate cost per unit of CO2 saved. The potentiality of this recovery is huge: 30%–35% of the chemical energy provided by the fuel is lost with the flue gases. For different reasons engines for passengers cars or goods transportation (light and heavy unit engines) as well those used for electricity generation (gen-set) are interested to this recovery: the first sector for the CO2 reduction, the second for the increasing value of electrical energy on the market. This wide interest is increasing the probability to have in a near future a reliable technology, being different actors pushing in this direction. In recent years the literature focused the attention to this recovery through a working fluid (organic type) on which the thermal energy is recovered by increasing its enthalpy. Thanks to a sequence of thermodynamic transformations (Rankine or Hirn cycle), mechanical work is produced. Both concept (Organic working fluid used and Rankine Cycle) are addressed as ORC technology. This overall technology has an evident complexity and doesn’t match with the need to keep reduced costs: it needs an energy recovery system at the gas side, an expander, a condenser and a pump. The space required by these components represents a limiting aspect. The variation of the flow rate and temperature of the gas (typical in ICE), as well as that at the condenser, represents additional critical aspect and call for suitable control strategies not yet exploited. In this paper the Authors studied an energy recovery method integrated with the turbocharging system, which does not require a working fluid making the recovery directly on the gas leaving the cylinders. Considering that the enthalpy drop across the turbine is usually higher than that requested by the compressor to boost the intake air, the concept was to consider an additional turbine which operates in parallel to the existing one. Room for recovery is guaranteed if one considers that a correct matching between turbine and compressor is actually done bypassing part of the exhaust gas from the turbine (waste gate) or using a variable geometry turbine (VGT) which, in any case, represents an energy loss. An additional positive feature is that this recovery does not impact on engine performances and the main components which realizes the recovery (valves & turbine) are technologically proven. In order to evaluate the potentiality of such recovery, the Authors developed a theoretical activity which represents the matching between turbocharger and engine. Thanks to an experimental characterization done on an IVECO F1C 16v JTD engine, an overall virtual platform was set up. The result produced a very satisfactory representation of the cited engine in terms of mechanical engine performances, relevant engine flow rates, pressures and temperatures. The ECU functions were represented too, such as boost pressure, EGR rates, rack control of VGT, etc… Two new direct recovery configurations have been conceived and implemented in the engine virtual platform.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography