These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

117 related articles for article (PubMed ID: 37250850)

  • 1. Rubbing salt in the wound? A large-scale investigation into the effects of refactoring on security.
    Iannone E; Codabux Z; Lenarduzzi V; De Lucia A; Palomba F
    Empir Softw Eng; 2023; 28(4):89. PubMed ID: 37250850
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Quick remedy commits and their impact on mining software repositories.
    Wen F; Nagy C; Lanza M; Bavota G
    Empir Softw Eng; 2022; 27(1):14. PubMed ID: 34744487
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Visualizing software refactoring using radar charts.
    Al-Ghuwairi AR; Al-Fraihat D; Sharrab Y; Alrashidi H; Almujally N; Kittaneh A; Ali A
    Sci Rep; 2023 Nov; 13(1):19530. PubMed ID: 37945685
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A refactoring categorization model for software quality improvement.
    Almogahed A; Mahdin H; Omar M; Zakaria NH; Gu YH; Al-Masni MA; Saif Y
    PLoS One; 2023; 18(11):e0293742. PubMed ID: 37917752
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A systematic literature review on the impact of AI models on the security of code generation.
    Negri-Ribalta C; Geraud-Stewart R; Sergeeva A; Lenzini G
    Front Big Data; 2024; 7():1386720. PubMed ID: 38803522
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Sequence diagram refactoring using single and hybridized algorithms.
    Baqais AAB; Alshayeb M
    PLoS One; 2018; 13(8):e0202629. PubMed ID: 30133518
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Folic acid supplementation and malaria susceptibility and severity among people taking antifolate antimalarial drugs in endemic areas.
    Crider K; Williams J; Qi YP; Gutman J; Yeung L; Mai C; Finkelstain J; Mehta S; Pons-Duran C; Menéndez C; Moraleda C; Rogers L; Daniels K; Green P
    Cochrane Database Syst Rev; 2022 Feb; 2(2022):. PubMed ID: 36321557
    [TBL] [Abstract][Full Text] [Related]  

  • 8. The Presence, Trends, and Causes of Security Vulnerabilities in Operating Systems of IoT's Low-End Devices.
    Al-Boghdady A; Wassif K; El-Ramly M
    Sensors (Basel); 2021 Mar; 21(7):. PubMed ID: 33810605
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Empirical evaluation of an architectural technical debt index in the context of the Apache and ONAP ecosystems.
    Verdecchia R; Malavolta I; Lago P; Ozkaya I
    PeerJ Comput Sci; 2022; 8():e833. PubMed ID: 35494860
    [TBL] [Abstract][Full Text] [Related]  

  • 10. LPMSAEF: Lightweight process mining-based software architecture evaluation framework for security and performance analysis.
    Sahlabadi M; Muniyandi RC; Shukur Z; Islam MR; SaberiKamarposhti M; Yim K
    Heliyon; 2024 Mar; 10(5):e26969. PubMed ID: 38455540
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Seluge++: a secure over-the-air programming scheme in wireless sensor networks.
    Doroodgar F; Abdur Razzaque M; Isnin IF
    Sensors (Basel); 2014 Mar; 14(3):5004-40. PubMed ID: 24618781
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Comparative Analysis of Open-Source Tools for Conducting Static Code Analysis.
    Kuszczyński K; Walkowski M
    Sensors (Basel); 2023 Sep; 23(18):. PubMed ID: 37766033
    [TBL] [Abstract][Full Text] [Related]  

  • 13. BoneJ2 - refactoring established research software.
    Domander R; Felder AA; Doube M
    Wellcome Open Res; 2021; 6():37. PubMed ID: 33954267
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Software Systems Security Vulnerabilities Management by Exploring the Capabilities of Language Models Using NLP.
    Althar RR; Samanta D; Kaur M; Alnuaim AA; Aljaffan N; Aman Ullah M
    Comput Intell Neurosci; 2021; 2021():8522839. PubMed ID: 34987569
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Distilling structure in Taverna scientific workflows: a refactoring approach.
    Cohen-Boulakia S; Chen J; Missier P; Goble C; Williams AR; Froidevaux C
    BMC Bioinformatics; 2014; 15 Suppl 1(Suppl 1):S12. PubMed ID: 24564760
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Free and Open Source Software organizations: A large-scale analysis of code, comments, and commits frequency.
    Chełkowski T; Jemielniak D; Macikowski K
    PLoS One; 2021; 16(9):e0257192. PubMed ID: 34555061
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Evaluating refactorings for disciplining #ifdef annotations: An eye tracking study with novices.
    da Costa JAS; Gheyi R; Ribeiro M; Apel S; Alves V; Fonseca B; Medeiros F; Garcia A
    Empir Softw Eng; 2021; 26(5):92. PubMed ID: 34248397
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Supporting secure programming in web applications through interactive static analysis.
    Zhu J; Xie J; Lipford HR; Chu B
    J Adv Res; 2014 Jul; 5(4):449-62. PubMed ID: 25685513
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Challenges With Developing Secure Mobile Health Applications: Systematic Review.
    Aljedaani B; Babar MA
    JMIR Mhealth Uhealth; 2021 Jun; 9(6):e15654. PubMed ID: 34152277
    [TBL] [Abstract][Full Text] [Related]  

  • 20.
    ; ; . PubMed ID:
    [No Abstract]   [Full Text] [Related]  

    [Next]    [New Search]
    of 6.