NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3
zadetkov: 24
1.
  • University learning with an... University learning with anti-plagiarism systems
    Kolhar, Manjur; Alameen, Abdalla Accountability in research, 05/2021, Letnik: 28, Številka: 4
    Journal Article
    Recenzirano

    We have designed an anti-plagiarism software to detect plagiarism in students' assignments, especially written assignments, homework, and research reports, which will hereinafter be collectively ...
Celotno besedilo
2.
  • MalDy: Portable, data-drive... MalDy: Portable, data-driven malware detection using natural language processing and machine learning techniques on behavioral analysis reports
    Karbab, ElMouatez Billah; Debbabi, Mourad Digital investigation, April 2019, 2019-04-00, Letnik: 28
    Journal Article
    Odprti dostop

    In response to the volume and sophistication of malicious software or malware, security investigators rely on dynamic analysis for malware detection to thwart obfuscation and packing issues. Dynamic ...
Celotno besedilo

PDF
3.
Celotno besedilo

PDF
4.
  • 실제 적용 타당성 탐색을 위한 고전적 상호배제 알... 실제 적용 타당성 탐색을 위한 고전적 상호배제 알고리즘 성능 평가
    이형봉; Hyung-bong Lee; 권기현 ... 정보처리학회논문지. KIPS transactions on computer and communication systems 컴퓨터 및 통신 시스템, 12/2017, Letnik: 6, Številka: 12
    Journal Article
    Odprti dostop

    상호배제는 원래 다중처리기 시스템을 지원하는 운영체제의 경쟁상황 예방 이론에서 출발하였으나, 최근에는 다중코어처리기의 일반화로 그 적용범위가 급격하게 병렬처리 어플리케이션 영역으로 이동되었다. POSIX 스레드, WIN32 스레드, Java 스레드 등이 대표적인 병렬 처리 어플리케이션 개발환경인데, 이들은 각자 고유한 상호배제 메커니즘을 제공하고 있다. ...
Celotno besedilo
5.
  • Search algorithm based on p... Search algorithm based on priority in semantic method for malicious code detection
    Wang, Ke; Han, Jiansheng; Zhang, Han 2013 International Conference on Information and Network Security (ICINS 2013), 2013
    Conference Proceeding

    This paper present a search algorithm based on priority to detect malicious behavior in the semantic method with respect to morph technology in computer viruses. For Win32 PE virus, use disassembly ...
Celotno besedilo
6.
  • Teaching methods for "Assem... Teaching methods for "Assembly Language Programming" in Windows environment
    Miaojun Xu 2011 IEEE International Symposium on IT in Medicine and Education, 2011-Dec., Letnik: 1
    Conference Proceeding

    "Assembly Language Programming" is one of the basic courses for students majoring in computer and electronic information. Over the years with the development of computer hardware and software, ...
Celotno besedilo
7.
  • Early Performance Evaluation of Multi-OS Embedded Platforms Using Native Simulation
    Fernandez, Rodrigo; Posadas, Hector; Villar, Eugenio 2013 Euromicro Conference on Digital System Design, 2013-Sept.
    Conference Proceeding

    The increase in complexity of electronic systems has opened the way to the use of different types of operating systems working together. The development of these systems requires simulation ...
Celotno besedilo
8.
  • Application of multi-thread... Application of multi-thread serial communication based on Win32 API functions in GPS tracking ship
    Guixi Jia; Shiyun Wen; Zhen Jia ... 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), 2012-April
    Conference Proceeding

    GPS tracking ship is an automatic equipment used to measure water-depth, which is based on the GPS navigational signals, and the system needs real-time and efficient data acquisition through serial ...
Celotno besedilo
9.
  • AVR-USB data acquisition AVR-USB data acquisition
    Lakkoju, N. K.; Gudla, S.; Mantravadi, B. S. 2011 3rd International Conference on Electronics Computer Technology, 2011-April, Letnik: 1
    Conference Proceeding

    Several industrial operations in monitor control and command applications use data acquisition, where data from the external world is read, processed, used for decisions and, eventually, memorized by ...
Celotno besedilo
10.
  • A critique of the Windows A... A critique of the Windows Application Programming Interface
    Spinellis, Diomidis Computer standards and interfaces, 11/1998, Letnik: 20, Številka: 1
    Journal Article
    Recenzirano

    The architecture, interface, and functionality of the Windows Application Programming Interface (API) make it difficult to master and use effectively, and contribute negatively to the safety, ...
Celotno besedilo
1 2 3
zadetkov: 24

Nalaganje filtrov