بدائل البحث:
barrier » barriers (توسيع البحث)
يعرض 1 - 9 نتائج من 9 نتيجة بحث عن '(( algorithm ((hardening function) OR (barrier function)) ) OR ( algorithm python function ))', وقت الاستعلام: 0.08s تنقيح النتائج
  1. 1
  2. 2

    LINE SEARCH TECHNIQUES FOR THE LOGARITHMIC BARRIER FUNCTION IN QUADRATIC-PROGRAMMING حسب Bendaya, M.

    منشور في 2020
    "…In this paper, we propose a line-search procedure for the logarithmic barrier function in the context of an interior point algorithm for convex quadratic programming. …"
    احصل على النص الكامل
    article
  3. 3

    New aspect-oriented constructs for security hardening concerns حسب Mourad, Azzam

    منشور في 2009
    "…They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 4

    New primitives to AOP weaving capabilities for security hardening concerns حسب Mourad, Azzam

    منشور في 2007
    "…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  5. 5

    Common weaving approach in mainstream languages for software security hardening حسب Alhadidi, Dima

    منشور في 2013
    "…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. The security solutions are woven into GIMPLE representations in a systematic way, eliminating the need for manual hardening that might generate a considerable number of errors. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  6. 6

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité حسب Mourad, Azzam

    منشور في 2009
    "…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  7. 7

    Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms حسب Ezzine, J.

    منشور في 1995
    "…In addition, this connection is used to show that the logarithmic barrier function is indeed, in some sense, optimum…"
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 8

    Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants حسب Surbhi Choudhary (21633701)

    منشور في 2024
    "…Among the “reasons against”, the “value barrier” and “image barrier” come out to be major determinants leading to inhibitions regarding the usage of voice assistants. …"
  9. 9

    Artificial intelligence in respiratory care حسب Manjush Karthika (18384907)

    منشور في 2024
    "…AI algorithms are widely studied in areas like mechanical ventilation, sleep medicine, lung ultrasound, and pulmonary function diagnostics and the results are found to be promising. …"