نتایج جستجو برای: obfuscation and vagueness

تعداد نتایج: 16827488  

2014
V. Aranov A. Terentiev

Overlapped executable code is an attractive artifact of obfuscation technology not yet widely covered and researched. Overlapped code and opaque predicates technologies together allows creation of prominent software obfuscation technologies featuring both obscure executable code and code protected from patching due to hard-to-track relations with other code. The paper provides polynomial algori...

Journal: :AMIA ... Annual Symposium proceedings. AMIA Symposium 2005
Shlomi Codish Richard N. Shiffman

Ambiguity and vagueness in clinical practice guidelines reduce the likelihood of clinician adherence. They lead to inconsistent interpretation and, in turn, to inappropriate practice variation and medical errors. Resolving ambiguity and vagueness is an essential step in the computerized implementation of clinical practice guidelines. Successful resolution of ambiguity and vagueness requires an ...

2006
HENRY JACKMAN

Vagueness has always been a problem for philosophers. This is true in a number of ways. One obvious way is that the vagueness inherent in much philosophical discourse has always lead to problems in the interpretation and criticism of philosophical arguments. This is a way in which the vagueness of language causes problems for philosophers. (We can call this “the practical problem of vagueness.”...

Journal: :CoRR 2016
Apostolos Syropoulos

Vagueness is something everyone is familiar with. In fact, most people think that vagueness is closely related to language and exists only there. However, vagueness is a property of the physical world. Quantum computers harness superposition and entanglement to perform their computational tasks. Both superposition and entanglement are vague processes. Thus quantum computers, which process exact...

Journal: :Informal Logic 2009

Journal: :Chinese Journal of Electronics 2023

The pattern-matching problem with wildcards can be formulated as a conjunction where an accepting string is same the pattern for all non-wild-cards. A scheme of obfuscation algorithm that “encrypt” to prevent some adversary from forging any string. Since 2013, there are abundant works about which discussed weak/strong functionality preservation and distributed black-box security. These based on...

Journal: :Journal of Cryptology 2013

Journal: :Journal of Cryptology 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید