نتایج جستجو برای: exploitations
تعداد نتایج: 442 فیلتر نتایج به سال:
Most modern Chip Multiprocessors (CMP) feature shared cache on chip, whose influence on the performance of multithreaded programs, unfortunately, remains unclear due to the limited coverage of the deciding factors in prior studies. In this work, we conduct a systematic measurement of the influence using a recently released CMP benchmark suite, PARSEC, with a spectrum of factors considered. The ...
Le présent article énonce les compétences confiées aux vétérinaires officiels. Dans l’organisation des Services vétérinaires nous distinguerons : le vétérinaire officiel, le vétérinaire officiel suppléant, le vétérinaire de contrôle, le vétérinaire sanitaire, le vétérinaire agréé. Nous décrirons la surveillance épidémiologique dans les troupeaux de ruminants domestiques, de porcs et de volaille...
Abstract. Identifying attack paths in enterprise network is strategically necessary and critical for security defense. However, there has been insufficient efforts in studying how to identify an attack path that goes through unknown security holes. In this paper, we define such attack paths as zero-day attack paths, and propose a prototype system named Patrol to identify them at runtime. Using ...
Compte tenu de l’importance socioéconomique et alimentaire du riz, les producteurs ont utilisé plusieurs systèmes culture pour mieux assurer la compétitivité leurs exploitations. La présente étude a consisté en une analyse l’efficacité économique des riz bas-fonds. Un échantillon 283 été constitué façon aléatoire. L’approche stochastique frontières production coût permis d’estimer décomposer ce...
Finding and accessing suitable geographic information to satisfy various applications in the open and distributed environments of Spatial Data Infrastructures (SDIs) is a crucial task. However, because of the semantic heterogeneity in conventional exploitations and descriptions of geographic information, it is difficult to find suitable geographic information which exactly meets the requirement...
Finite modele search for first order logic theories is a complementary alternative to automated deduction. Systems like Falcon, SEM and FMSET use the LNH(Least Number Heuristic) heuristic to eliminate some trivial symmetries. Such symmetries are worthful, but their exploitation is limited to the first levels of the model search tree, since they desappear as soon as the first cells have been ins...
The virtual experience of Geguti Palace will be presented in this paper in order to demonstrate how it’s possible to offer a deep understanding of a space from abroad by absorbing reality into a virtual environment. Starting from the digital documentation and 3D survey of this medieval royal palace, developed by the Department of Architecture of the University of Ferrara and the Tbilisi State A...
The biophysical properties of DNA suggest its use for applications beyond serving as the genetic material. Several recent reports describe the use of covalently attached double-stranded DNA for controlling the structures of other macromolecules such as protein and RNA. These exploitations of DNA rigidity are conceptually distinct from many other studies in the area of "DNA nanotechnology". Doub...
Exploitation is a fact of life for social organisms, and natural selection gives rise to revenge mechanisms that are designed to deter such exploitations. However, humans may also possess cognitive forgiveness mechanisms designed to promote the restoration of valuable social relationships following exploitation. In the current article, the authors test the hypothesis that decisions about forgiv...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید