نتایج جستجو برای: application methods

تعداد نتایج: 2510462  

پایان نامه :وزارت بهداشت، درمان و آموزش پزشکی - دانشگاه علوم پزشکی و خدمات بهداشتی درمانی استان فارس - دانشکده دندانپزشکی 1380

چکیده ندارد.

Journal: :روش های عددی در مهندسی (استقلال) 0
علیرضا رهایی a. rahaee

0

2012
Ebrahim Shamsoddin-motlagh

Manual testing is hard and time consuming and it maybe impossible for large systems or tester mistake in the test. The software testing is the rising cost of activities in development software and the test case generation is important activity in software testing. Hence researches performed to automate testing such as automatic test case generation. This paper reports a survey of recent researc...

2013
Shafiq Hussain Ghulam Rasool Muhammad Atef Abdul Karim Shahid

Software security has a huge impact on almost all areas ranging from banking systems to critical systems. The rapid expansion of internet and distributed systems has forced developers, designers, engineers and manager to consider software security as an essential activity for their systems. Software security does not depend on the external measures such as firewalls but also on the internal sec...

2016
Lorenzo Addazi Antonio Cicchetti Juri Di Rocco Davide Di Ruscio Ludovico Iovino Alfonso Pierantonio

In MDE resolving pragmatic issues related to the management of models is key to success. Model comparison is one of the most challenging operations playing a central role in a wide range of modelling activities including model versioning, evolution and even collaborative and distributed specification of models. Over the last decade, several syntactic methods have been proposed to compare models...

Journal: :IEEE Computer 2001
Mike Bond Ross J. Anderson

A whole new family of attacks has recently been discovered on the application programming interfaces (APIs) used by security processors. These extend and generalise a number of attacks already known on authentication protocols. The basic idea is that by presenting valid commands to the security processor, but in an unexpected sequence, it is possible to obtain results that break the security po...

2012
Benjamin S. Lerner Matthew J. Carroll Dan P. Kimmel Hannah Quay-de la Vallee Shriram Krishnamurthi

Web applications are fundamentally reactive. Code in a web page runs in reaction to events, which are triggered either by external stimuli or by other events. The DOM, which specifies these behaviors, is therefore central to the behavior of web applications. We define the first formal model of event behavior in the DOM, with high fidelity to the DOM specification. Our model is concise and execu...

Journal: :علوم اجتماعی 0
دکتر حبیب احمدی لیلا نیکپور قنواتی

due to the complex nature of deviation, delinquency and crime, criminology and sociology of deviations have used, in their studies of social deviations, not only different theoretical frameworks but different methods commonly used in qualitative and quantitative approaches. this diversity of methods has provided great opportunities for the evaluation of the methods and eclectic use of methods, ...

Journal: :Journal of Computer Security 2010
Stéphanie Delaune Steve Kremer Graham Steel

PKCS#11 defines an API for cryptographic devices that has been widely adoptedin industry. However, it has been shown to be vulnerable to a variety of attacks thatcould, for example, compromise the sensitive keys stored on the device. In this paper, weset out a formal model of the operation of the API, which differs from previous securityAPI models notably in that it accounts for...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید