Search

Your search keyword '"Executable"' showing total 10,049 results

Search Constraints

Start Over You searched for: Descriptor "Executable" Remove constraint Descriptor: "Executable"
10,049 results on '"Executable"'

Search Results

1. A Survey of Binary Code Similarity.

2. Comparative analysis of segmentation techniques based on chest X-ray images.

3. Uncovering Secrets of the Maven Repository: Maven packaging

4. eUF: A framework for detecting over-the-air malicious updates in autonomous vehicles

5. A Framework for Dynamic Composition and Management of Emergency Response Processes

6. Composing Web Services Using a Multi-Agent Framework

7. On a Consistency Testing Model and Strategy for Revealing RISC Processor’s Dark Instructions and Vulnerabilities

8. Generating Effective Software Obfuscation Sequences With Reinforcement Learning

9. Through the Looking Glass: Automated Design Understanding of SystemC-Based VPs at the ESL

10. Multi-stage complex task assignment in spatial crowdsourcing

11. DeepUMQA: ultrafast shape recognition-based protein model quality assessment using deep learning

12. Creating a Foundation for Next-Generation Autonomous Systems

13. A Model of Extraction of Rail’s Vertical Corrugation Based on Flexible Virtual Ruler

14. Code Synthesis for Dataflow-Based Embedded Software Design

15. I♥LA

16. Formal Verification of a Trusted Execution Environment-Based Architecture for IoT Applications

17. Using Bayesian optimization algorithm for model-based integration testing

18. Emulating complex simulations by machine learning methods

19. Python Programming in PyPI for Translational Medicine

20. Prediction of antimicrobial peptides toxicity based on their physico-chemical properties using machine learning techniques

21. VESPA: static profiling for binary optimization

22. Enabling Collaborative Data Science Development with the Ballet Framework

23. A Statistically Based Methodology to Estimate the Probability of Encountering Rock Blocks When Tunneling in Heterogeneous Ground

24. A program for the fitting of up to three Havriliak-Negami dispersions to dielectric data

25. Enseñanza y Aprendizaje de Robótica Industrial desde la Virtualidad

26. RAP: A Software Framework of Developing Convolutional Neural Networks for Resource-constrained Devices Using Environmental Monitoring as a Case Study

27. Data Pattern Aware Reliability Enhancement Scheme for 3D Solid-State Drives

28. Selective Sharing of Outsourced Encrypted Data in Cloud Environments

29. MINAD: Multi-inputs Neural Network based on Application Structure for Android Malware Detection

30. Virtual Prototyping a Production Line Using Assume–Guarantee Contracts

31. Custom workflows to improve joint variant calling from multiple related tumour samples: FreeBayesSomatic and Strelka2Pass

32. TA-SPESC: Toward Asset-Driven Smart Contract Language Supporting Ownership Transaction and Rule-Based Generation on Blockchain

33. Modular, compositional, and executable formal semantics for LLVM IR

34. Knowledge-driven framework for industrial robotic systems

35. EasyNanopore: A Ready-to-Use Processing Software for Translocation Events in Nanopore Translocation Experiments

36. Efficient Motion Planning Based on Kinodynamic Model for Quadruped Robots Following Persons in Confined Spaces

38. Large-scale and Robust Code Authorship Identification with Deep Feature Learning

39. Formal model-driven executable DSLs

40. Survey of Methods for Automated Code-Reuse Exploit Generation

42. Bin2vec: learning representations of binary executable programs for security tasks

43. Automatic Generation of Object-Oriented Code from the ReLEL Requirements Model

44. EASIER (EXECUTABLE ACCESS TO STATISTICS FOR INTERACTIVE AND EFFICIENT RESEARCH)

45. FTFL: A Fisher’s test-based approach for fault localization

46. Educational Videogame to Learn the Periodic Table: Design Rationale and Lessons Learned

47. Applying NLP techniques to malware detection in a practical environment

48. Bayesian <scp>single‐arm</scp> phase <scp>II</scp> trial designs with <scp>time‐to‐event</scp> endpoints

49. A Declarative Approach for Transforming SysML Models to Executable Simulation Models

50. A Multi-Dimensional Deep Learning Framework for IoT Malware Classification and Family Attribution

Catalog

Books, media, physical & digital resources