منابع مشابه
KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware
Privacy-breaching malware is an ever-growing class of malicious applications that attempt to steal confidential data and leak them to third parties. One of the most prominent activities to acquire private user information is to eavesdrop and harvest user-issued keystrokes. Despite the serious threat involved, keylogging activities are challenging to detect in the general case. From an operating...
متن کاملWillingness to Write in EFL Contexts
This research was conducted to measure Persian EFL students’s degree of willingness to write in English. To reach the goal, semi-structured interviews were conducted, deriving inspiration from earlier works of McCrosky and Baer (1985), MacIntyre, Dornyei, Clement, and Noels (1998), and Yashima (2002) on willingness to communicate. The participants of the study were 29 individuals comprising 23 ...
متن کاملHow to Write a Short Report?
سخن سردبیر Editorial مجله دانشگاه علوم پزشکی رفسنجان دوره نوزدهم، شهریور 1399، 554-553 چگونه یک گزارش کوتاه بنویسیم؟ How to Write a Short Report? محسن رضائیان[1] M. Rezaeian گزارشهای کوتاه (Short reports) زمانی به رشته تحریر در میآیند که دادههای حاصل از یک مطالعه آنقدر زیاد نباشد که نوشتن یک مقاله کامل را توجیه نماید [1]. همچنین، برخی مجلات نیز علاقمند هستند تا ...
متن کاملMining Cyclically Repeated Patterns
In sequential pattern mining, the support of the sequential pattern for the transaction database is defined only by the fraction of the customers supporting this sequence, which is known as the customer support. In this paper, a new parameter is introduced for each customer, called as repetition support, as an additional constraint to specify the minimum number of repetitions of the patterns by...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Iowa Review
سال: 1992
ISSN: 0021-065X,2330-0361
DOI: 10.17077/0021-065x.4179