NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3
zadetkov: 24
11.
  • Compatible Digital Rights M... Compatible Digital Rights Management System on MS Windows Platform
    Yulin Wang; Yang Shen 2009 International Conference on Information Engineering and Computer Science, 2009-Dec.
    Conference Proceeding

    Digital rights management systems (DRMS) tend to solve two aspects about rights protection of the protected content for content provider: access control and usage control. Access control concerns ...
Celotno besedilo
12.
  • Exploring environments for ... Exploring environments for creation of e-learning simulators
    Tomov, Orlin; Smrikarov, Angel Proceedings of the 2007 international conference on Computer systems and technologies, 06/2007
    Conference Proceeding

    The focus of this article is to evaluate which of the three platforms: Flash, Java and Win32 is more appropriate for e-Learning simulators development. Selecting a platform should not restrict the ...
Celotno besedilo
13.
  • An Image Enhancement Enviro... An Image Enhancement Environment Designed At 32-Bit Version Of Visual Basic 4 Programming Language Using The Win32 API Functions
    Temiz,Mustafa; Kızılkaya,Aydın; Tokat,Sezai Mühendislik bilimleri dergisi, Şubat 2000, 2000-01-01, Letnik: 6, Številka: 1
    Journal Article
    Odprti dostop

    In this paper, using the Win32 API (Application Programming Interface) functions and MDI (Multiple Document Interface) programming technique, which is main principle of Windows system, designed an ...
Celotno besedilo
14.
  • Unknown Malicious Executabl... Unknown Malicious Executables Detection Based on Run-Time Behavior
    Yongtao Hu; Liang Chen; Ming Xu ... 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008-Oct., Letnik: 4
    Conference Proceeding

    Traditional anti-virus scanner employs static features to detect malicious executables. Unfortunately, this content-based approach can be obfuscated by techniques such as polymorphism and ...
Celotno besedilo
15.
  • Exploiting temporal consist... Exploiting temporal consistency to reduce false positives in host-based, collaborative detection of worms
    Malan, David J.; Smith, Michael D. Proceedings of the 4th ACM workshop on Recurring malcode, 11/2006
    Conference Proceeding

    The speed of today's worms demands automated detection, but the risk of false positives poses a difficult problem. In prior work, we proposed a host-based intrusion-detection system for worms that ...
Celotno besedilo
16.
  • Processes, AppDomains, Cont... Processes, AppDomains, Contexts, and CLR Hosts
    Pro VB 2005 and the .NET 2.0 Platform
    Book Chapter

    The point of this chapter was to examine exactly how a .NET executable image is hosted by the .NET platform. As you have seen, the long-standing notion of aWin32 process has been altered under the ...
Celotno besedilo
17.
  • Processes, AppDomains, Cont... Processes, AppDomains, Contexts, and CLR Hosts
    Pro C# with .NET 3.0
    Book Chapter

    In the previous two chapters, you examined the steps taken by the CLR to resolve the location of an externally referenced assembly as well as the role of .NET metadata. In this chapter, you’ll drill ...
Celotno besedilo
18.
  • Processes, AppDomains, Cont... Processes, AppDomains, Contexts, and CLR Hosts
    Pro C# 2005 and the .NET 2.0 Platform
    Book Chapter

    The point of this chapter was to examine exactly how a .NET executable image is hosted by the .NET platform. As you have seen, the long-standing notion of aWin32 process has been altered under the ...
Celotno besedilo
19.
Celotno besedilo
20.
  • C言語の歩き方 C言語の歩き方
    江見, 圭司 コンピュータ&エデュケーション, 2000, Letnik: 8
    Journal Article
    Odprti dostop
Celotno besedilo
1 2 3
zadetkov: 24

Nalaganje filtrov