Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

3 4 5 6 7
zadetkov: 13.229
41.
  • Efficient invisible specula... Efficient invisible speculative execution through selective delay and value prediction
    Sakalis, Christos; Kaxiras, Stefanos; Ros, Alberto ... 2019 ACM/IEEE 46th Annual International Symposium on Computer Architecture (ISCA), 06/2019
    Conference Proceeding
    Odprti dostop

    Speculative execution, the base on which modern high-performance general-purpose CPUs are built on, has recently been shown to enable a slew of security attacks. All these attacks are centered around ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM

PDF
42.
  • Model Countermeasures Child... Model Countermeasures Children which Commit Crimes in Review Restorative Justice
    Kaimudin, Arfan; Ashsyarofi, Hisbul Luthfi Jurnal Cakrawala Hukum, 08/2023, Letnik: 14, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    This study describes the model settlement of cases through non-penal channels for crimes committed by children according to Act 11 of 2012 concerning the Juvenile Criminal Justice System with ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
43.
  • Improvement of Tsunami Coun... Improvement of Tsunami Countermeasures Based on Lessons from The 2011 Great East Japan Earthquake and Tsunami - Situation After Five Years
    Suppasri, Anawat; Latcharote, Panon; Bricker, Jeremy D. ... Coastal Engineering Journal, 12/1/2016, 20161200, 2016-12-00, 20161201, Letnik: 58, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    The 2011 Great East Japan Tsunami exposed many hidden weaknesses in Japan's tsunami countermeasures. Since then, many improvements have been made in both structural measures (numerical simulations, ...
Celotno besedilo
Dostopno za: BFBNIB, GIS, IJS, KISLJ, NUK, PNG, UL, UM, UPUK

PDF
44.
  • Adaptive Radar Detection an... Adaptive Radar Detection and Classification Algorithms for Multiple Coherent Signals
    Han, Sudan; Yan, Linjie; Zhang, Yuxuan ... IEEE transactions on signal processing, 2021, Letnik: 69
    Journal Article
    Recenzirano
    Odprti dostop

    In this paper, we address the problem of target detection in the presence of coherent (or fully correlated) signals, which can be due to multipath propagation effects or electronic attacks by smart ...
Celotno besedilo
Dostopno za: IJS, NUK, UL

PDF
45.
  • SMoTherSpectre SMoTherSpectre
    Bhattacharyya, Atri; Sandulescu, Alexandra; Neugschwandtner, Matthias ... Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 11/2019
    Conference Proceeding

    Spectre, Meltdown, and related attacks have demonstrated that kernels, hypervisors, trusted execution environments, and browsers are prone to information disclosure through micro-architectural ...
Celotno besedilo
Dostopno za: NUK, UL

PDF
46.
  • The disconcerting potential... The disconcerting potential of online disinformation: Persuasive effects of astroturfing comments and three strategies for inoculation against them
    Zerback, Thomas; Töpfl, Florian; Knöpfle, Maria New media & society, 05/2021, Letnik: 23, Številka: 5
    Journal Article
    Recenzirano
    Odprti dostop

    This study is the first to scrutinize the psychological effects of online astroturfing in the context of Russia’s digitally enabled foreign propaganda. Online astroturfing is a communicative strategy ...
Celotno besedilo
Dostopno za: NUK, OILJ, SAZU, UKNU, UL, UM, UPUK

PDF
47.
  • Strategies for Enhancing th... Strategies for Enhancing the Impact of Blended Instruction in Chinese Colleges and Universities
    Song, Qianqian; Agnawa Jr, Marcelino M. International journal of information and education technology, 08/2023, Letnik: 13, Številka: 8
    Journal Article
    Odprti dostop

    Due to the rapid development of information technology, traditional classroom teaching is not able to meet the needs of students. Therefore, colleges and universities are paying more and more ...
Celotno besedilo
Dostopno za: NUK, UL, UM, UPUK
48.
  • Rule discovery to identify ... Rule discovery to identify patterns contributing to overrepresentation and severity of run-off-the-road crashes
    Montella, Alfonso; Mauriello, Filomena; Pernetti, Mariano ... Accident analysis and prevention, 06/2021, Letnik: 155
    Journal Article
    Recenzirano

    •Roadway, environmental, and driver factors associated with ROR crashes were investigated.•The analysis was carried out using the rule discovery technique.•Data refer to the crashes occurred in the ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
49.
  • InSpectre: Breaking and Fix... InSpectre: Breaking and Fixing Microarchitectural Vulnerabilities by Formal Analysis
    Guanciale, Roberto; Balliu, Musard; Dam, Mads Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 10/2020
    Conference Proceeding
    Odprti dostop

    The recent Spectre attacks have demonstrated the fundamental insecurity of current computer microarchitecture. The attacks use features like pipelining, out-of-order and speculation to extract ...
Celotno besedilo
Dostopno za: NUK, UL

PDF
50.
  • Supporting discovery and de... Supporting discovery and development of medical countermeasures for chemical injury to eye and skin
    Araj, Houmam; Tseng, Hung; Yeung, David T. Experimental eye research, 08/2022, Letnik: 221
    Journal Article
    Recenzirano
    Odprti dostop

    Vesicants, from vesica (Latin for blister), can cause local and systemic toxicity. They include the chemotherapy drug nitrogen mustard and chemical warfare agents sulfur mustard, Lewisite, and ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
3 4 5 6 7
zadetkov: 13.229

Nalaganje filtrov