Zobrazeno 1 - 10
of 5 102
pro vyhledávání: '"Happe A"'
Autor:
Camps-Valls, Gustau, Fernández-Torres, Miguel-Ángel, Cohrs, Kai-Hendrik, Höhl, Adrian, Castelletti, Andrea, Pacal, Aytac, Robin, Claire, Martinuzzi, Francesco, Papoutsis, Ioannis, Prapas, Ioannis, Pérez-Aracil, Jorge, Weigel, Katja, Gonzalez-Calabuig, Maria, Reichstein, Markus, Rabel, Martin, Giuliani, Matteo, Mahecha, Miguel, Popescu, Oana-Iuliana, Pellicer-Valero, Oscar J., Ouala, Said, Salcedo-Sanz, Sancho, Sippel, Sebastian, Kondylatos, Spyros, Happé, Tamara, Williams, Tristan
In recent years, artificial intelligence (AI) has deeply impacted various fields, including Earth system sciences. Here, AI improved weather forecasting, model emulation, parameter estimation, and the prediction of extreme events. However, the latter
Externí odkaz:
http://arxiv.org/abs/2406.20080
Autor:
Happe, Andreas, Cito, Jürgen
Linux systems are integral to the infrastructure of modern computing environments, necessitating robust security measures to prevent unauthorized access. Privilege escalation attacks represent a significant threat, typically allowing attackers to ele
Externí odkaz:
http://arxiv.org/abs/2405.02106
Autor:
Liebel, Grischa, Klünder, Jil, Hebig, Regina, Lazik, Christopher, Nunes, Inês, Graßl, Isabella, Steghöfer, Jan-Philipp, Exelmans, Joeri, Oertel, Julian, Marquardt, Kai, Juhnke, Katharina, Schneider, Kurt, Gren, Lucas, Happe, Lucia, Herrmann, Marc, Wyrich, Marvin, Tichy, Matthias, Goulão, Miguel, Wohlrab, Rebekka, Kalantari, Reyhaneh, Heinrich, Robert, Greiner, Sandra, Rukmono, Satrio Adi, Chakraborty, Shalini, Abrahão, Silvia, Amaral, Vasco
Purpose: Software modelling and Model-Driven Engineering (MDE) is traditionally studied from a technical perspective. However, one of the core motivations behind the use of software models is inherently human-centred. Models aim to enable practitione
Externí odkaz:
http://arxiv.org/abs/2404.18682
Penetration testing, an essential component of software security testing, allows organizations to identify and remediate vulnerabilities in their systems, thus bolstering their defense mechanisms against cyberattacks. One recent advancement in the re
Externí odkaz:
http://arxiv.org/abs/2310.11409
Autor:
Santoro, V., Kheir, O. Abou El, Acharya, D., Akhyani, M., Andersen, K. H., Barrow, J., Bentley, P., Bernasconi, M., Bertelsen, M., Bessler, Y., Bianchi, A., Brooijmans, G., Broussard, L., Brys, T., Busi, M., Campi, D., Chambon, A., Chen, J., Czamler, V., Deen, P., DiJulio, D. D., Dian, E., Draskovits, L., Dunne, K., Barbari, M. El, Ferreira, M. J., Fierlinger, P., Fröst, V. T., Folsom, B. T., Friman-Gayer, U., Gaye, A., Gorini, G., Gustafsson, A., Gutberlet, T., Happe, C., Han, X., Hartl, M., Holl, M., Jackson, A., Kemp, E., Kamyshkov, Y., Kittelmann, T., Klinkby, E. B., Kolevatov, R., Laporte, S. I., Lauritzen, B., Lejon, W., Linander, R., Lindroos, M., Marko, M., Damián, J. I. Márquez, McClanahan, T. C., Meirose, B., Mezei, F., Michel, K., Milstead, D., Muhrer, G., Nepomuceno, A., Neshvizhevsky, V., Nilsson, T., Odén, U., Plivelic, T., Ramic, K., Rataj, B., Remec, I., Rizzi, N., Rogers, J., Rosenthal, E., Rosta, L., Rücker, U., Samothrakitis, S., Schreyer, A., Selknaes, J. R., Shuai, H., Silverstein, S., Snow, W. M., Strobl, M., Strothmann, M., Takibayev, A., Wagner, R., Willendrup, P., Xu, S., Yiu, S. C., Yngwe, L., Young, A. R., Wolke, M., Zakalek, P., Zavorka, L., Zanini, L., Zimmer, O.
The European Spallation Source, currently under construction in Lund, Sweden, is a multidisciplinary international laboratory. Once completed to full specifications, it will operate the world's most powerful pulsed neutron source. Supported by a 3 mi
Externí odkaz:
http://arxiv.org/abs/2309.17333
Autor:
Happe, Andreas, Cito, Jürgen
Offensive security-tests are a common way to pro-actively discover potential vulnerabilities. They are performed by specialists, often called penetration-testers or white-hat hackers. The chronic lack of available white-hat hackers prevents sufficien
Externí odkaz:
http://arxiv.org/abs/2308.07057
Autor:
Happe, Andreas, Cito, Jürgen
The field of software security testing, more specifically penetration testing, is an activity that requires high levels of expertise and involves many manual testing and analysis steps. This paper explores the potential usage of large-language models
Externí odkaz:
http://arxiv.org/abs/2308.00121
Publikováno v:
Advances in Autism, 2023, Vol. 10, Issue 3, pp. 163-184.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/AIA-08-2023-0053
Autor:
Binsheng Gong, Dan Li, Paweł P. Łabaj, Bohu Pan, Natalia Novoradovskaya, Danielle Thierry-Mieg, Jean Thierry-Mieg, Guangchun Chen, Anne Bergstrom Lucas, Jennifer S. LoCoco, Todd A. Richmond, Elizabeth Tseng, Rebecca Kusko, Scott Happe, Timothy R. Mercer, Carlos Pabón-Peña, Michael Salmans, Hagen U. Tilgner, Wenzhong Xiao, Donald J. Johann, Wendell Jones, Weida Tong, Christopher E. Mason, David P. Kreil, Joshua Xu
Publikováno v:
Scientific Data, Vol 11, Iss 1, Pp 1-13 (2024)
Abstract Next-generation sequencing (NGS) has revolutionized genomic research by enabling high-throughput, cost-effective genome and transcriptome sequencing accelerating personalized medicine for complex diseases, including cancer. Whole genome/tran
Externí odkaz:
https://doaj.org/article/73cc5c3ee70441e7acfa9bce7c026093
Publikováno v:
BMJ Open, Vol 14, Iss 10 (2024)
Objectives The objective of this study was to explore barriers and facilitators to the use of clinical practice guidelines (CPGs) in osteoarthritis (OA) care among German physiotherapists.Design Qualitative semistructured interviews were conducted wi
Externí odkaz:
https://doaj.org/article/7a932e0191c14475974f0f13186362aa