نتایج جستجو برای: and memory this paper compares introspection
تعداد نتایج: 16998359 فیلتر نتایج به سال:
Memory introspection can be a powerful tool for analyzing contents of a system’s memory for any malicious code. Current approaches based on memory introspection have focused on Virtual Machines and using a privileged software entity, such as a hypervisor, to perform the introspection. Such software-based introspection, however, is susceptible to variety of attacks that may compromise the hyperv...
a problem of computer vision applications is to detect regions of interest under dif- ferent imaging conditions. the state-of-the-art maximally stable extremal regions (mser) detects affine covariant regions by applying all possible thresholds on the input image, and through three main steps including: 1) making a component tree of extremal regions’ evolution (enumeration), 2) obtaining region ...
چکیده قاجارها و حکومت پهلوی اول علی بازوند موضوع انقراض سلسله قاجار و انتقال حکومت به پهلوی از رخدادهای مهم تاریخ معاصر ایران است . که در این پژوهش به چگونگی نقش و عملکرد دیوان سالاران ، شاهزادگان و رجال خاندان قاجاری در این انتقال قدرت و نحوه ی برخورد رضاشاه با قاجارها دردوران سلطنت به آن پرداخته شده است . برای پاسخ به این مسأله ، بررسی های انجام گرفته بیانگر آن است که مخالفت افراد قاج...
abstract this quasi-experimental study was aimed at examining the impact of storyline complexity on the grammatical accuracy and complexity of advanced and intermediate efl learners. a total of 65 advanced and intermediate efl learners were selected from iran language institute (ili). an intact group including 35 intermediate participants and another intact group with 30 advanced participants ...
Examining and modifying data of interest in the memory of a target program is an important capability for security applications such as memory forensics, rootkit detection, game hacking, and virtual machine introspection. In this paper we present a novel memory graph based approach for program data introspection and modification, which does not require source code, debugging symbols, or any API...
abstract: advertisements are the most accessible type of authentic materials, and this is one reason why they are used more and more in english teaching classes. for this cause, studies in the field of advertisements are very widespread nowadays. for pun is one aspect which makes advertisements more interesting, it is used more than before in advertisements. use of puns makes an advertisement m...
abstract abstract of thesis (includes summary, goals, execution methods, and results) story “al-obnosat al-bayza” is one of the short stories from “hanna mineh” collection. this story is a selection of lives of some humans during a voyage together, each of them is a symbol of human nature (love, mind, kindness) and examine social, cultural, and political aspects of governing system, and it...
The main objective of this article is to capitalise on many years of research, and of practice, relating to the use of introspection in a research context, and thus to provide an initial outline description of introspection, while developing an introspection of introspection. After a description of the context of this research, I define the institutional conditions which would enable the renewa...
the present paper investigates how far ideologies can be tease out in discourse by examining the employed schemata by two ideologically opposed news media, the bbc and press tv, to report syria crisis during a period of nine months in 2011. by assuming that news is not a valuefree construction of facts and drawing on micro structural approach of schema theory, for the first time in discours...
Software-based MMU emulation lies at the heart of outof-VM live memory introspection, an important technique in the cloud setting that applications such as live forensics and intrusion detection depend on. Due to the emulation, the software-based approach is much slower compared to native memory access by the guest VM. The slowness not only results in undetected transient malicious behavior, bu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید