-
1
New aspect-oriented constructs for security hardening concerns
Published 2009“…They allow to analyze a program's call graph in order to determine how to change function signatures for passing the parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
article -
2
New primitives to AOP weaving capabilities for security hardening concerns
Published 2007“…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
3
Common weaving approach in mainstream languages for software security hardening
Published 2013“…In this paper, we propose a novel aspect-oriented approach based on GIMPLE, a language-independent and a tree-based representation generated by the GNU Compiler Collection (GCC), for the systemization of application security hardening. The security solutions are woven into GIMPLE representations in a systematic way, eliminating the need for manual hardening that might generate a considerable number of errors. …”
Get full text
Get full text
Get full text
article -
4
A Dual Vibration Absorber for Vibration Suppression of Harmonically Forced Systems
Published 2022“…In this work, a dual absorber setup is proposed for the reduction of the harmonic response of single degree of freedom systems. …”
Get full text
Get full text
Get full text
masterThesis -
5
A modified optimal design of a vibration absorber for ground motion isolation
Published 2014“…For a given stiffness ratio of the system, the optimal mass and damping ratios are obtained analytically using an optimization method based on invariant points of the objective function. Similar to the case of the classical vibration absorber setup, these points are independent of the system damping ratio. …”
Get full text
Get full text
Get full text
Get full text
conferenceObject -
6
-
7
Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité
Published 2009“…They allow to analyze a program’s call graph in order to determine how to change function signatures for the passing of parameters associated with a given security hardening. …”
Get full text
Get full text
Get full text
article -
8
Fleet sizing of trucks for an inter-facility material handling system using closed queueing networks
Published 2022“…<p>Material handling systems (MHS) are integral to logistics functions by providing various supports such as handling, moving, and storing materials in manufacturing and service organisations. …”
-
9
Decision-level fusion for single-view gait recognition with various carrying and clothing conditions
Published 2017“…The methods are evaluated on CASIA B Dataset using four different experimental setups, and on OU-ISIR Dataset B using two different setups. …”
Get full text
article -
10
Decision-level Gait Fusion for Human Identification at a Distance
Published 2014Get full text
doctoralThesis