نتایج جستجو برای: and memory this paper compares introspection

تعداد نتایج: 16998359  

2014
Sebastian Biedermann Jakub Szefer

Memory introspection can be a powerful tool for analyzing contents of a system’s memory for any malicious code. Current approaches based on memory introspection have focused on Virtual Machines and using a privileged software entity, such as a hypervisor, to perform the introspection. Such software-based introspection, however, is susceptible to variety of attacks that may compromise the hyperv...

پایان نامه :دانشگاه تربیت معلم - تهران - دانشکده فنی 1393

a problem of computer vision applications is to detect regions of interest under dif- ferent imaging conditions. the state-of-the-art maximally stable extremal regions (mser) detects affine covariant regions by applying all possible thresholds on the input image, and through three main steps including: 1) making a component tree of extremal regions’ evolution (enumeration), 2) obtaining region ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه اراک - دانشکده ادبیات و علوم انسانی 1391

چکیده قاجارها و حکومت پهلوی اول علی بازوند موضوع انقراض سلسله قاجار و انتقال حکومت به پهلوی از رخدادهای مهم تاریخ معاصر ایران است . که در این پژوهش به چگونگی نقش و عملکرد دیوان سالاران ، شاهزادگان و رجال خاندان قاجاری در این انتقال قدرت و نحوه ی برخورد رضاشاه با قاجارها دردوران سلطنت به آن پرداخته شده است . برای پاسخ به این مسأله ، بررسی های انجام گرفته بیانگر آن است که مخالفت افراد قاج...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تبریز - دانشکده ادبیات و زبانهای خارجی 1393

abstract this quasi-experimental study was aimed at examining the impact of storyline complexity on the grammatical accuracy and complexity of advanced and intermediate efl learners. a total of 65 advanced and intermediate efl learners were selected from iran language institute (ili). an intact group including 35 intermediate participants and another intact group with 30 advanced participants ...

2014
David I. Urbina Yufei Gu Juan Caballero Zhiqiang Lin

Examining and modifying data of interest in the memory of a target program is an important capability for security applications such as memory forensics, rootkit detection, game hacking, and virtual machine introspection. In this paper we present a novel memory graph based approach for program data introspection and modification, which does not require source code, debugging symbols, or any API...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید چمران اهواز - دانشکده ادبیات و علوم انسانی 1390

abstract: advertisements are the most accessible type of authentic materials, and this is one reason why they are used more and more in english teaching classes. for this cause, studies in the field of advertisements are very widespread nowadays. for pun is one aspect which makes advertisements more interesting, it is used more than before in advertisements. use of puns makes an advertisement m...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده ادبیات و علوم انسانی 1389

abstract abstract of thesis (includes summary, goals, execution methods, and results) story “al-obnosat al-bayza” is one of the short stories from “hanna mineh” collection. this story is a selection of lives of some humans during a voyage together, each of them is a symbol of human nature (love, mind, kindness) and examine social, cultural, and political aspects of governing system, and it...

2009
Pierre Vermersch

The main objective of this article is to capitalise on many years of research, and of practice, relating to the use of introspection in a research context, and thus to provide an initial outline description of introspection, while developing an introspection of introspection. After a description of the context of this research, I define the institutional conditions which would enable the renewa...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده ادبیات و علوم انسانی دکتر علی شریعتی 1392

the present paper investigates how far ideologies can be tease out in discourse by examining the employed schemata by two ideologically opposed news media, the bbc and press tv, to report syria crisis during a period of nine months in 2011. by assuming that news is not a valuefree construction of facts and drawing on micro structural approach of schema theory, for the first time in discours...

2017
Siqi Zhao Xuhua Ding Wen Xu Dawu Gu

Software-based MMU emulation lies at the heart of outof-VM live memory introspection, an important technique in the cloud setting that applications such as live forensics and intrusion detection depend on. Due to the emulation, the software-based approach is much slower compared to native memory access by the guest VM. The slowness not only results in undetected transient malicious behavior, bu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید