Suchergebnisse - ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection techniky
-
1
Autoren: et al.
Weitere Verfasser: et al.
Dateibeschreibung: application/pdf
Relation: 979-8-4007-0396-6
Verfügbarkeit: https://hdl.handle.net/1822/90000
-
2
Autoren:
Quelle: Siefers, Joseph, Gang Tan, and Greg Morissett. 2010. Robusta: Taming the native beast of the JVM. In proceedings of the 17th ACM Conference on Computer and Communications Security (CCS '10), October 4-8, 2010, Chicago, IL, 201-211. New York: Association for Computing Machinery.
Schlagwörter: software, software engineering, interoperability, operating systems, operating systems security and protection
Dateibeschreibung: application/pdf
Relation: Proceedings of the ACM Conference on Computer and Communications Security (CCS)
Zugangs-URL: http://nrs.harvard.edu/urn-3:HUL.InstRepos:9961291
-
3
Autoren:
Quelle: ACM Sigplan Notices. 48(8)
Schlagwörter: Information and Computing Sciences, Applied Computing, topological data analysis, feature extraction, merge tree computation, parallelization, hybrid parallelization approaches, Software Engineering
Dateibeschreibung: application/pdf
-
4
Autoren:
Quelle: Proceedings 2020 IEEE ACM 42nd International Conference on Software Engineering Workshops Icsew 2020
Schlagwörter: 46 Information and Computing Sciences (for-2020), 4608 Human-Centred Computing (for-2020), 4612 Software Engineering (for-2020), Bioengineering (rcdc), Networking and Information Technology R&D (NITRD) (rcdc), Machine Learning and Artificial Intelligence (rcdc)
Dateibeschreibung: application/pdf
-
5
Autoren:
Weitere Verfasser:
Schlagwörter: cracking, hacking, reverse engineering, autorská práva, softwarové pirátství, WEP, WPA, licence, copyright, mp3, license
Dateibeschreibung: 55 s.; 33054359 bytes; application/zip; application/pdf; application/octet-stream
Relation: Univerzitní knihovna (sklad); http://hdl.handle.net/10195/46510; D26778; 15659
Verfügbarkeit: http://hdl.handle.net/10195/46510
-
6
-
7
Autoren: et al.
Quelle: Barak, Boaz, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, and Ke Yang. 2012. On the (Im)possibility of Obfuscating Programs. Journal of the ACM 59, no. 2: 1–48.
Schlagwörter: complexity theory, cryptography, homomorphic encryption, pseudorandom functions, Rice’s Theorem, software protection, software watermarking, statistical zero knowledge
Dateibeschreibung: application/pdf
Relation: Journal of the ACM
Zugangs-URL: http://nrs.harvard.edu/urn-3:HUL.InstRepos:12644697
-
8
Autoren:
Weitere Verfasser:
-
9
Autoren:
Weitere Verfasser:
Schlagwörter: construction, ocel, prosklení, engineering, Galerie, panorama, facade, výstava, 3d print, dílna, veřejné prostory, organics, prototyp, public spaces, steel, Medlánky, sportovní letadla, technika, archiv, 3d tisk, Gallery, konstrukce, glass, model, kavárna, conference room, archive, software, cafe, foyer, landscape, areál, letectví, organika, exhibition, hangár, aviation, grasshopper, sports aircraft hangar, fasáda, prototype, model workshop, konferenční sál, krajina, resort
Dateibeschreibung: application/pdf; application/zip; text/html
Zugangs-URL: http://hdl.handle.net/11012/68533
-
10
Autoren:
Quelle: ACM Transactions on Reconfigurable Technology and Systems. 16(1)
Schlagwörter: Data Management and Data Science, Information and Computing Sciences, Networking and Information Technology R&D (NITRD), Bioengineering, Machine Learning and Artificial Intelligence, Affordable and Clean Energy, Field-programmable gate array, time series, Matrix Profile, Electrical and Electronic Engineering, Computer Hardware, Electronics, sensors and digital hardware, Distributed computing and systems software
Zugangs-URL: https://escholarship.org/uc/item/4t20j8n0
-
11
Alternate Title: Možnosti využitia ekologického oleja Arnica S 46 do poľnohospodárskej techniky. (Slovak)
Autoren: et al.
Quelle: Journal of Central European Agriculture; 2013, Vol. 14 Issue 4, p1444-1455, 12p
Schlagwörter: AGRICULTURAL engineering, HYDRAULICS, LUBRICATION & lubricants, AGRICULTURE, FORESTS & forestry, TRIBOLOGY
-
12
Autoren:
Weitere Verfasser:
Schlagwörter: bezpečnost dat, šifrování, hesla, škodlivý software, penetrační testování, hardwarová ochrana dat, softwarová ochrana dat, data security, encryption, passwords, malicious software, penetration testing, hardware data protection, software data protection
Dateibeschreibung: 82 s. (126 000 znaků)
Relation: Elektronický archiv Knihovny UTB; http://hdl.handle.net/10563/30141; 36466
Verfügbarkeit: http://hdl.handle.net/10563/30141
-
13
Autoren: McConnell, Steve
Schlagwörter: software, programování, kódování dat
Dateibeschreibung: application/zip
Zugangs-URL: http://hdl.handle.net/11012/40779
-
14
Autoren: Nosek, Matěj
Schlagwörter: autopiloty, precizní zemědělství, navigation, autopilots, precision agriculture, komunikační systémy, communication systems, navigace, software
Zugangs-URL: http://www.nusl.cz/ntk/nusl-639879
-
15
Autoren: et al.
Quelle: ACM Transactions on Graphics. 33(1)
Schlagwörter: 46 Information and Computing Sciences (for-2020), 4607 Graphics, Augmented Reality and Games (for-2020), Algorithms, Theory, Sampling, dimension, line search, thin regions, rendering, depth-of-field, Poisson-disk sampling, Monte Carlo integration, Latin hypercube sampling, uncertainty quantification, cs.GR, cs.GR, I.3.5, 0801 Artificial Intelligence and Image Processing (for), 0806 Information Systems (for), Software Engineering (science-metrix), 4607 Graphics, augmented reality and games (for-2020)
Dateibeschreibung: application/pdf
-
16
Alternate Title: Risk Assessment Techniques and Their Application in Institutional Repositories -- Use in the Digital Repository of Charles University in Prague. (English)
Autoren: Pavlásková, Eliška
Quelle: ProInflow; 2014, Vol. 6 Issue 1, p26-37, 12p
Schlagwörter: SYSTEMS software, SOCIAL interaction, RISK assessment, SELF-evaluation, DIGITAL preservation, INSTITUTIONAL repositories
Geografische Kategorien: PRAGUE (Czech Republic)
Firma/Körperschaft: UNIVERZITA Karlova
-
17
Autoren:
Weitere Verfasser:
Schlagwörter: softwarové inženýrství, byznys analytik, sběr požadavků, kvalitativní výzkum, ChatGPT, typologie otázek, rozhovor, requirements elicitation, business analyst, interview, question typology, software engineering, qualitative research
Dateibeschreibung: application/pdf
Relation: https://vskp.vse.cz/eid/96412
Verfügbarkeit: https://vskp.vse.cz/eid/96412
-
18
Autoren:
Weitere Verfasser:
Schlagwörter: nekalé obchodní a marketingové techniky, senior, ochrana spotřebitele, Consumer protection, unfair marketing and business techniques, 8. Economic growth
Zugangs-URL: http://www.nusl.cz/ntk/nusl-203962
-
19
Alternate Title: POČIATKY A ROZVOJ VYUŽITIA VÝPOČTOVEJ TECHNIKY V OBLASTI EPIDEMIOLÓGIE V SLOVENSKEJ REPUBLIKE. (Slovak)
Autoren: et al.
Quelle: Zdravotnicke listy; 2024, Vol. 12 Issue 4, p70-75, 6p
-
20
Autoren:
Weitere Verfasser:
Relation: 561972531605; http://hdl.handle.net/10467/26419
Verfügbarkeit: http://hdl.handle.net/10467/26419
Nájsť tento článok vo Web of Science
Full Text Finder