Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 230
1.
  • Error Recovery Script of Im... Error Recovery Script of Immunity Debugger for C# .NET Applications
    Shinde, Rupali; Choi, Min; Lee, Su-Hyun Journal of information processing systems, 12/2019, Volume: 15, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    We present a new technique, called VED (very effective debugging), for detecting and correcting division by zero errors for all types of .NET application. We use applications written in C# because C# ...
Full text
Available for: UL
2.
  • Features of MCNP6 Features of MCNP6
    Goorley, T.; James, M.; Booth, T. ... Annals of nuclear energy, 01/2016, Volume: 87, Issue: P2
    Journal Article
    Peer reviewed
    Open access

    •MCNP6 is simply and accurately described as the merger of MCNP5 and MCNPX capabilities, but it is much more than the sum of these two computer codes.•MCNP6 is the result of six years of effort by ...
Full text
Available for: IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP

PDF
3.
  • Debugging System for Progra... Debugging System for Programs with Different Execution Models
    Mikhail Aksenov; Vladimir Sukhomlin Современные информационные технологии и IT-образование, 09/2020, Volume: 16, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    This article is devoted to the issues of debugging programs in modern high-level languages. There are many different languages with different paradigms and different execution models. Each of them ...
Full text
Available for: NUK, UL, UM, UPUK
4.
  • Understanding the motivatio... Understanding the motivations, challenges and needs of Blockchain software developers: a survey
    Bosu, Amiangshu; Iqbal, Anindya; Shahriyar, Rifat ... Empirical software engineering : an international journal, 08/2019, Volume: 24, Issue: 4
    Journal Article
    Peer reviewed

    The blockchain technology has potential applications in various areas such as smart-contracts, Internet of Things (IoT), land registry, supply chain management, storing medical data, and identity ...
Full text
Available for: EMUNI, FIS, FZAB, GEOZS, GIS, IJS, IMTLJ, KILJ, KISLJ, MFDPS, NLZOH, NUK, OBVAL, OILJ, PNG, SAZU, SBCE, SBJE, SBMB, SBNM, UKNU, UL, UM, UPUK, VKSCE, ZAGLJ

PDF
5.
  • Fault Injection Emulation f... Fault Injection Emulation for Systems in FPGAs: Tools, Techniques and Methodology, a Tutorial
    Ruano, Óscar; García-Herrero, Francisco; Aranda, Luis Alberto ... Sensors, 02/2021, Volume: 21, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Communication systems that work in jeopardized environments such as space are affected by soft errors that can cause malfunctions in the behavior of the circuits such as, for example, single event ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, PNG, SAZU, UL, UM, UPUK

PDF
6.
Full text

PDF
7.
  • P4DB: On-the-Fly Debugging ... P4DB: On-the-Fly Debugging for Programmable Data Planes
    Zhou, Yu; Bi, Jun; Zhang, Cheng ... IEEE/ACM transactions on networking, 2019-Aug., 2019-8-00, Volume: 27, Issue: 4
    Journal Article
    Peer reviewed

    While extending network programmability to a more considerable extent, P4 raises the difficulty of detecting and locating bugs, e.g., P4 program bugs and missed table rules, in runtime. These runtime ...
Full text
Available for: IJS, NUK, UL
8.
  • The Model of System to Coun... The Model of System to Counter to Software Tools Learning Code
    Anatoliy Petrovich Durakovskiy; Tatayna Aleksandrovna Kondratieva; Yuri Nikolaevich Lavrukhin ... Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ, 03/2015, Volume: 22, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    The article describes the main types of software used for the study of the code, the shortcomings of existing systems of protection programs and proposed a new model of protection system of code.
Full text
Available for: NUK, UL, UM, UPUK
9.
  • The Model of System to Coun... The Model of System to Counter to Software Tools Learning Code
    Anatoliy Petrovich Durakovskiy; Svyatoslav Vasilievich Ponomarev Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ, 03/2015, Volume: 22, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    The article describes the main types of software used for the study of the code, the shortcomings of existing systems of protection programs and proposed a new model of protection system of code.
Full text
Available for: NUK, UL, UM, UPUK
10.
  • Automated Nonintrusive Anal... Automated Nonintrusive Analysis of Electronic System Level Designs
    Goli, Mehran; Stoppe, Jannis; Drechsler, Rolf IEEE transactions on computer-aided design of integrated circuits and systems, 02/2020, Volume: 39, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Due to the ever increasing complexity of hardware systems, designers strive for higher levels of abstractions in the early stages of the design process. Modeling hardware at the electronic system ...
Full text
Available for: IJS, NUK, UL

PDF
1 2 3 4 5
hits: 230

Load filters