يعرض 1 - 12 نتائج من 12 نتيجة بحث عن '(( algorithm ((hardening function) OR (python function)) ) OR ( algorithm pre function ))', وقت الاستعلام: 0.09s تنقيح النتائج
  1. 1

    New aspect-oriented constructs for security hardening concerns حسب Mourad, Azzam

    منشور في 2009
    "…They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  2. 2

    New primitives to AOP weaving capabilities for security hardening concerns حسب Mourad, Azzam

    منشور في 2007
    "…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    conferenceObject
  3. 3

    Common weaving approach in mainstream languages for software security hardening حسب Alhadidi, Dima

    منشور في 2013
    "…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. The security solutions are woven into GIMPLE representations in a systematic way, eliminating the need for manual hardening that might generate a considerable number of errors. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  4. 4
  5. 5

    Defense against adversarial attacks: robust and efficient compressed optimized neural networks حسب Insaf Kraidia (19198012)

    منشور في 2024
    "…A cumulative updating loss function was employed for overall optimization, demonstrating remarkable superiority over traditional optimization techniques. …"
  6. 6
  7. 7

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité حسب Mourad, Azzam

    منشور في 2009
    "…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article
  8. 8
  9. 9

    The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability حسب Abd-El-barr, Mostafa

    منشور في 2003
    "…A fault tolerant network is able to function even in the presence of some faults in the network. …"
    احصل على النص الكامل
    article
  10. 10

    Prediction of biogas production from chemically treated co-digested agricultural waste using artificial neural network حسب Fares Almomani (12585685)

    منشور في 2020
    "…<p dir="ltr">The present study evaluates the effect of co-digestion of agricultural solid wastes (ASWs), cow manure (CM), and the application of chemical pre-treatment with NaHCO<sub>3</sub> on the performance of anaerobic digestion (AD) process. …"
  11. 11

    Large language models for code completion: A systematic literature review حسب Rasha Ahmad Husein (19744756)

    منشور في 2024
    "…This is achieved by predicting subsequent tokens, such as keywords, variable names, types, function names, operators, and more. Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
  12. 12

    DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins حسب Samir Brahim, Belhaouari

    منشور في 2025
    "…ObjectiveThis study utilized various classical machine learning techniques, such as support vector machines, k-nearest neighbors, and random forests, in conjunction with a modified deep learning approach called DeepRaman. These algorithms were employed to distinguish and categorize bacterial endotoxins, following appropriate spectral pre-processing, which involved novel filtering techniques and advanced feature extraction methods. …"
    احصل على النص الكامل
    احصل على النص الكامل
    احصل على النص الكامل
    article