Search alternatives:
algorithm pre » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
algorithm pre » algorithm _ (Expand Search), algorithm fa (Expand Search), algorithm goa (Expand Search)
-
1
New aspect-oriented constructs for security hardening concerns
Published 2009“…They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
article -
2
New primitives to AOP weaving capabilities for security hardening concerns
Published 2007“…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
3
Common weaving approach in mainstream languages for software security hardening
Published 2013“…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. The security solutions are woven into GIMPLE representations in a systematic way, eliminating the need for manual hardening that might generate a considerable number of errors. …”
Get full text
Get full text
Get full text
article -
4
Genetic and heuristic algorithms for regrouping service sites. (c2000)
Published 2000Get full text
Get full text
masterThesis -
5
Defense against adversarial attacks: robust and efficient compressed optimized neural networks
Published 2024“…A cumulative updating loss function was employed for overall optimization, demonstrating remarkable superiority over traditional optimization techniques. …”
-
6
-
7
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
Published 2009“…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
article -
8
Autonomous Robot Navigation Based On Recurrent Neural Networks
Published 2012Get full text
doctoralThesis -
9
The Use of Enumerative Techniques in Topological Optimization of Computer Networks Subject to Fault Tolerance and Reliability
Published 2003“…A fault tolerant network is able to function even in the presence of some faults in the network. …”
Get full text
article -
10
Prediction of biogas production from chemically treated co-digested agricultural waste using artificial neural network
Published 2020“…<p dir="ltr">The present study evaluates the effect of co-digestion of agricultural solid wastes (ASWs), cow manure (CM), and the application of chemical pre-treatment with NaHCO<sub>3</sub> on the performance of anaerobic digestion (AD) process. …”
-
11
Large language models for code completion: A systematic literature review
Published 2024“…This is achieved by predicting subsequent tokens, such as keywords, variable names, types, function names, operators, and more. Different techniques can achieve code completion, and recent research has focused on Deep Learning methods, particularly Large Language Models (LLMs) utilizing Transformer algorithms. …”
-
12
DeepRaman: Implementing surface-enhanced Raman scattering together with cutting-edge machine learning for the differentiation and classification of bacterial endotoxins
Published 2025“…ObjectiveThis study utilized various classical machine learning techniques, such as support vector machines, k-nearest neighbors, and random forests, in conjunction with a modified deep learning approach called DeepRaman. These algorithms were employed to distinguish and categorize bacterial endotoxins, following appropriate spectral pre-processing, which involved novel filtering techniques and advanced feature extraction methods. …”
Get full text
Get full text
Get full text
article