Search alternatives:
barrier » barriers (Expand Search)
Showing 1 - 9 results of 9 for search '(( algorithm ((hardening function) OR (barrier function)) ) OR ( algorithm python function ))', query time: 0.07s Refine Results
  1. 1
  2. 2

    LINE SEARCH TECHNIQUES FOR THE LOGARITHMIC BARRIER FUNCTION IN QUADRATIC-PROGRAMMING by Bendaya, M.

    Published 2020
    “…In this paper, we propose a line-search procedure for the logarithmic barrier function in the context of an interior point algorithm for convex quadratic programming. …”
    Get full text
    article
  3. 3

    New aspect-oriented constructs for security hardening concerns by Mourad, Azzam

    Published 2009
    “…They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  4. 4

    New primitives to AOP weaving capabilities for security hardening concerns by Mourad, Azzam

    Published 2007
    “…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    Get full text
    conferenceObject
  5. 5

    Common weaving approach in mainstream languages for software security hardening by Alhadidi, Dima

    Published 2013
    “…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. The security solutions are woven into GIMPLE representations in a systematic way, eliminating the need for manual hardening that might generate a considerable number of errors. …”
    Get full text
    Get full text
    Get full text
    article
  6. 6

    Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité by Mourad, Azzam

    Published 2009
    “…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
    Get full text
    Get full text
    Get full text
    article
  7. 7

    Singularly perturbed nonlinear ODEs and interior point optimizationalgorithms by Ezzine, J.

    Published 1995
    “…In addition, this connection is used to show that the logarithmic barrier function is indeed, in some sense, optimum…”
    Get full text
    Get full text
    article
  8. 8

    Assessing Factors Influencing Customers’ Adoption of AI-Based Voice Assistants by Surbhi Choudhary (21633701)

    Published 2024
    “…Among the “reasons against”, the “value barrier” and “image barrier” come out to be major determinants leading to inhibitions regarding the usage of voice assistants. …”
  9. 9

    Artificial intelligence in respiratory care by Manjush Karthika (18384907)

    Published 2024
    “…AI algorithms are widely studied in areas like mechanical ventilation, sleep medicine, lung ultrasound, and pulmonary function diagnostics and the results are found to be promising. …”