بدائل البحث:
algorithm pre » algorithm _ (توسيع البحث), algorithm fa (توسيع البحث), algorithm goa (توسيع البحث)
algorithm pre » algorithm _ (توسيع البحث), algorithm fa (توسيع البحث), algorithm goa (توسيع البحث)
-
1
New aspect-oriented constructs for security hardening concerns
منشور في 2009"…They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
2
New primitives to AOP weaving capabilities for security hardening concerns
منشور في 2007"…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
conferenceObject -
3
Common weaving approach in mainstream languages for software security hardening
منشور في 2013"…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. The security solutions are woven into GIMPLE representations in a systematic way, eliminating the need for manual hardening that might generate a considerable number of errors. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
4
Genetic and heuristic algorithms for regrouping service sites. (c2000)
منشور في 2000احصل على النص الكامل
احصل على النص الكامل
masterThesis -
5
Defense against adversarial attacks: robust and efficient compressed optimized neural networks
منشور في 2024"…A cumulative updating loss function was employed for overall optimization, demonstrating remarkable superiority over traditional optimization techniques. …"
-
6
Cortical EEG Source Localization of Focal Epilepsy
منشور في 2017احصل على النص الكامل
doctoralThesis -
7
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
منشور في 2009"…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article -
8
Autonomous Robot Navigation Based On Recurrent Neural Networks
منشور في 2012احصل على النص الكامل
doctoralThesis -
9
The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability
منشور في 2003"…A fault tolerant network is able to function even in the presence of some faults in the network. …"
احصل على النص الكامل
article -
10
Prediction of biogas production from chemically treated co-digested agricultural waste using artificial neural network
منشور في 2020"…<p dir="ltr">The present study evaluates the effect of co-digestion of agricultural solid wastes (ASWs), cow manure (CM), and the application of chemical pre-treatment with NaHCO<sub>3</sub> on the performance of anaerobic digestion (AD) process. …"
-
11
Large language models for code completion: A systematic literature review
منشور في 2024"…This is achieved by predicting subsequent tokens, such as keywords, variable names, types, function names, operators, and more. Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …"
-
12
DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins
منشور في 2025"…ObjectiveThis study utilized various classical machine learning techniques, such as support vector machines, k-nearest neighbors, and random forests, in conjunction with a modified deep learning approach called DeepRaman. These algorithms were employed to distinguish and categorize bacterial endotoxins, following appropriate spectral pre-processing, which involved novel filtering techniques and advanced feature extraction methods. …"
احصل على النص الكامل
احصل على النص الكامل
احصل على النص الكامل
article