نتایج جستجو برای: on demand
تعداد نتایج: 8454000 فیلتر نتایج به سال:
This study aims to analyze: 1) the development of demand for craft SMIs products through the use of e-commerce, 2) the effect of e-commerce utilization, macroeconomic conditions, prices, and the intensity of promotion on product demand, 3) the effect of e-commerce utilization, macroeconomic conditions, prices, promotion intensity, and product demand for performance; and 4) the role of product d...
t his study investigates the factors affecting the demand for new residential buildings in urban areas of iran during 1976-2010. the demand function for new residential buildings in urban areas was estimated and then the existence of a long-run relationship among variables of this function was studied using the bounds testing of the autoregressive distributed lag co-integration procedure. the t...
The mobile agent paradigm has been proposed as a promising solution to facilitate distributed computing over open and heterogeneous networks. Mobility, autonomy, and intelligence are identified as key features of mobile agent systems and enabling characteristics for the next-generation smart electronic commerce on the Internet. However, security-related issues, especially integrity protection i...
Representational State Transfer (REST), as an architectural style for distributed hypermedia systems, enables scalable operation of the World Wide Web (WWW) and is the foundation for its future evolution. However, although described over 10 years ago, no comprehensive formal model for representing RESTful systems exists. The lack of a formal model has hindered understanding of the REST architec...
Despite a legal framework being in place for several years, the market share of qualified electronic signatures is disappointingly low. Mobile Signatures provide a new and promising opportunity for the deployment of an infrastructure for qualified electronic signatures. We analyzed two possible signing approaches (server based and client based signatures) and conclude that SIM-based signatures ...
Recent malware instances execute completely in the kernel as drivers; they do not contain any user-level malicious processes. This design evades the system call monitoring used by many software security solutions, including malware analyzers and host-based intrusion detectors that track only user-level processes. To trace the behavior of kernel malware instances, we design and implement a hyper...
Malware often injects and executes new code to infect hypervisors, OSs and applications. Such malware infections can be prevented by checking all code against a whitelist before permitting it to execute. The eXecuting Implies Verified Enforcer (XIVE) is a distributed system in which a kernel on each target system consults a server called the approver to verify code on-demand. We propose a new h...
The on demand generation of source code and its execution is essential if computers are expected to play an active role in information discovery and retrieval. This paper presents a model of implementation of a source code generator, whose purpose is to generate source code on demand. The implementation of the source code generator is fully configurable and its adoption to a new application is ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید