UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 6.221
1.
Celotno besedilo
2.
Celotno besedilo
3.
  • A Survey of Symbolic Execut... A Survey of Symbolic Execution Techniques
    Baldoni, Roberto; Coppa, Emilio; D’elia, Daniele Cono ... ACM computing surveys, 05/2019, Letnik: 51, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Many security and software testing applications require checking whether certain properties of a program hold for any possible usage scenario. For instance, a tool for identifying software ...
Celotno besedilo

PDF
4.
  • The Adoption of JavaScript ... The Adoption of JavaScript Linters in Practice: A Case Study on ESLint
    Tomasdottir, Kristin Fjola; Aniche, Mauricio; van Deursen, Arie IEEE transactions on software engineering, 08/2020, Letnik: 46, Številka: 8
    Journal Article
    Recenzirano
    Odprti dostop

    A linter is a static analysis tool that warns software developers about possible code errors or violations to coding standards. By using such a tool, errors can be surfaced early in the development ...
Celotno besedilo

PDF
5.
  • Static bending analysis of ... Static bending analysis of beams made of functionally graded porous materials
    Zghal, Souhir; Ataoui, Dhia; Dammak, Fakhreddine Mechanics based design of structures and machines, 03/2022, Letnik: 50, Številka: 3
    Journal Article
    Recenzirano

    This paper constitutes a first attempt to explore the influence of porosity on bending static analysis of functionally graded (FG) beams using a refined mixed finite element beam model. The material ...
Celotno besedilo
6.
  • Survey of techniques to det... Survey of techniques to detect common weaknesses in program binaries
    Adhikari, Ashish; Kulkarni, Prasad Cyber Security and Applications, December 2025, 2025-12-00, Letnik: 3
    Journal Article
    Recenzirano
    Odprti dostop

    Software vulnerabilities resulting from coding weaknesses and poor development practices are common. Attackers can exploit these vulnerabilities and impact the security and privacy of end-users. Most ...
Celotno besedilo
7.
  • DL-Droid: Deep learning bas... DL-Droid: Deep learning based android malware detection using real devices
    Alzaylaee, Mohammed K.; Yerima, Suleiman Y.; Sezer, Sakir Computers & security, February 2020, 2020-02-00, 20200201, Letnik: 89
    Journal Article
    Recenzirano
    Odprti dostop

    The Android operating system has been the most popular for smartphones and tablets since 2012. This popularity has led to a rapid raise of Android malware in recent years. The sophistication of ...
Celotno besedilo

PDF
8.
  • A critical review of recent... A critical review of recent research on functionally graded plates
    Jha, D.K.; Kant, Tarun; Singh, R.K. Composite structures, February 2013, 2013-02-00, Letnik: 96
    Journal Article
    Recenzirano

    In view of the significant increase in research activity and publications in functionally graded materials (FGMs) and structures in the last few years, the present article is an attempt to identify ...
Celotno besedilo
9.
  • SmartCheck SmartCheck
    Tikhomirov, Sergei; Voskresenskaya, Ekaterina; Ivanitskiy, Ivan ... 2018 IEEE/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB), 05/2018
    Conference Proceeding

    Ethereum is a major blockchain-based platform for smart contracts - Turing complete programs that are executed in a decentralized network and usually manipulate digital units of value. Solidity is ...
Celotno besedilo
10.
Celotno besedilo
1 2 3 4 5
zadetkov: 6.221

Nalaganje filtrov