Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Long H. Pham"'
Autor:
Giang T. Phi, Long H. Pham
The chapter first provides background information on the evolution of community-based tourism (CBT) in Vietnam before exploring critical areas of the CBT literature. Next, the qualitative approaches utilized for the study, on which the findings and d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e59966f54ff6ed451cef66268cc6aeea
https://doi.org/10.1079/9781789242782.0007
https://doi.org/10.1079/9781789242782.0007
The current chapter focuses on tourism development post 1975. An analysis of tourism policy and governance in Vietnam cannot set aside the evolution of the Marxist political economic doctrine regulating the socio-economic system of the country since
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::45ec2f1cf466e7189656c79f8566469b
https://doi.org/10.1079/9781789242782.0003
https://doi.org/10.1079/9781789242782.0003
Autor:
Long H. Pham, Jun Sun
Publikováno v:
Computer Aided Verification ISBN: 9783031131844
Neural networks have achieved state-of-the-art performance in solving many problems, including many applications in safety/security-critical systems. Researchers also discovered multiple security issues associated with neural networks. One of them is
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2d944ba795e971314726d86a709ac8c5
https://doi.org/10.1007/978-3-031-13185-1_9
https://doi.org/10.1007/978-3-031-13185-1_9
This chapter offers an overview of ecotourism in forest-protected areas in Vietnam from theoretical concepts and historical evolution of forest conservation to the current structure of governance and management of forest resources and the economic an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bde7fd656e5e1a58893b59a0385b523f
https://doi.org/10.1079/9781789242782.0006
https://doi.org/10.1079/9781789242782.0006
Publikováno v:
IEEE Symposium on Security and Privacy
Smart contracts are distributed, self-enforcing programs executing on top of blockchain networks. They have the potential to revolutionize many industries such as financial institutes and supply chains. However, smart contracts are subject to code-ba
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::504fcfda5f54d3e84a84f9199ed2c03e
http://arxiv.org/abs/2101.01917
http://arxiv.org/abs/2101.01917
Publikováno v:
ICSE
Smart contracts are Turing-complete programs that execute on the infrastructure of the blockchain, which often manage valuable digital assets. Solidity is one of the most popular programming languages for writing smart contracts on the Ethereum platf
Vietnam has experienced rapid growth within its tourism industry during the past decades. This growth is part of Vietnam's opening economy allowing a wide range of forms of tourism. Vietnam Tourism: Policies and Practices provides a comprehensive rev
Publikováno v:
Programming Languages and Systems ISBN: 9783030341749
APLAS
APLAS
Analyzing and verifying heap-manipulating programs automatically is challenging. A key for fighting the complexity is to develop compositional methods. For instance, many existing verifiers for heap-manipulating programs require user-provided specifi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::dbb494e39e5ecaccd216c6de0638a0be
https://doi.org/10.1007/978-3-030-34175-6_21
https://doi.org/10.1007/978-3-030-34175-6_21
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030309411
FM
FM
Concolic testing is a test generation technique which works effectively by integrating random testing generation and symbolic execution. Existing concolic testing engines focus on numeric programs. Heap-manipulating programs make extensive use of com
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::31e85cd14a72980a25ab8fe21ef27193
https://doi.org/10.1007/978-3-030-30942-8_27
https://doi.org/10.1007/978-3-030-30942-8_27
Publikováno v:
Automated Technology for Verification and Analysis ISBN: 9783030317836
ATVA
ATVA
Symbolic execution is a well established method for test input generation. Despite of having achieved tremendous success over numerical domains, existing symbolic execution techniques for heap-based programs are limited due to the lack of a succinct
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b58df24a763f2ca1e7f27be6705033f8
https://doi.org/10.1007/978-3-030-31784-3_12
https://doi.org/10.1007/978-3-030-31784-3_12