UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

3 4 5 6 7
zadetkov: 85
41.
  • Numerical analysis of the e... Numerical analysis of the effect of acetylene and benzene addition to low-pressure benzene-rich flat flames on polycyclic aromatic hydrocarbon formation
    Kunioshi, Nílson; Komori, Seisaku; Fukutani, Seishiro Combustion and flame, 10/2006, Letnik: 147, Številka: 1
    Journal Article
    Recenzirano

    A modification of the CHEMKIN II package has been proposed for modeling addition of an arbitrary species at an arbitrary temperature to an arbitrary distance from the burner along a flat flame. The ...
Celotno besedilo
42.
  • Parsing via Regular Expressions
    Magyar, David; Szenasi, Sandor 2021 IEEE 19th World Symposium on Applied Machine Intelligence and Informatics (SAMI), 2021-Jan.-21
    Conference Proceeding

    Since programming languages exist, parsing the code - primarily for compilation - is an ever-present necessity. As of today, there is a deep theory of this topic, describing approaches and useful ...
Celotno besedilo
43.
  • Method for fast compression... Method for fast compression of program codes for remote updates in consumer devices
    三井 聡; 清原 良三; 松本 光弘 ITE Technical Report, 02/2009, Letnik: 33, Številka: 8
    Journal Article
    Odprti dostop

    This paper presents the technology for remote system updating that allows software updates in embedded systems such as mobile phones and car navigation systems. Software updates are carried out using ...
Celotno besedilo
44.
  • Increasing the Effective Volume of Digital Watermark Used in Monitoring the Program Code Integrity of FPGA-Based Systems
    Zashcholkin, Kostiantyn; Drozd, Oleksandr; Shaporin, Ruslan ... 2019 IEEE East-West Design & Test Symposium (EWDTS), 2019-Sept.
    Conference Proceeding

    The paper deals with monitoring the program code integrity of FPGA-based systems. An approach to the integrity monitoring considered in the paper is based on embedding the digital watermark into the ...
Celotno besedilo
45.
  • BPE Acceleration Technique ... BPE Acceleration Technique for S/W Update for Mobile Phones
    Kiyohara, Ryozo; Mii, Satoshi 2010 24th IEEE International Conference on Advanced Information Networking and Applications, 2010-April
    Conference Proceeding

    Recently, the size of the software on embedded devices, e.g., mobile phones, has been increasing rapidly. Complex processes in large scale software, such as event handlers, require bugs to be fixed ...
Celotno besedilo
46.
  • Detecting the use of unsafe data in software of embedded systems by means of static analysis methodology
    Novikov, Alexander S.; Ivutin, Alexey N.; Troshina, Anna G. ... 2018 7th Mediterranean Conference on Embedded Computing (MECO), 2018-June
    Conference Proceeding

    The article considers the approach to identifying potentially unsafe data in program code of embedded systems which can lead to errors and fails in the functioning of equipment. The sources of ...
Celotno besedilo
47.
  • A method of the hidden faults elimination in FPGA projets for the critical applications
    Drozd, Oleksandr; Kuznietsov, Mykola; Martynyuk, Oleksandr ... 2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT)
    Conference Proceeding

    This paper addresses to a problem of the hidden faults which is inherent for the instrumentation and control safety-related systems. These systems are designed for operation in two modes: normal and ...
Celotno besedilo
48.
  • Topology of Gluing of Virtual and Real Law in Cases of On-Line Crimes
    Baturin, Yuri M. 2019 International Conference on Engineering Technologies and Computer Science (EnT)
    Conference Proceeding

    The article describes offenses within Massively Multiplayer Online Worlds (MMOW). The use of criminal law in cases of crimes committed by the inhabitants of virtual worlds is also discussed. But what ...
Celotno besedilo
49.
  • Detecting computer code pla... Detecting computer code plagiarism in higher education
    Konecki, Mario; Orehovacki, Tihomir; Lovrencic, Alen Information technology interfaces, 2009-June, 2009
    Conference Proceeding

    Rapid development of industry and economy requires quick and efficient education of large amount of theoretical knowledge and practical skills. In computer science, especially in programming, this ...
Celotno besedilo
50.
  • 端末におけるソフトウェア更新のための高速プログラム圧縮... 端末におけるソフトウェア更新のための高速プログラム圧縮方式(コンシューマ機器および一般)
    三井 聡; Mii Satoshi; 清原 良三 ... 映像情報メディア学会技術報告, 2009, Letnik: 33.8
    Journal Article
    Odprti dostop

    This paper presents the technology for remote system updating that allows software updates in embedded systems such as mobile phones and car navigation systems. Software updates are carried out using ...
Celotno besedilo
3 4 5 6 7
zadetkov: 85

Nalaganje filtrov