Search Results - acm: d.: software/d.2: software engineering/d.2.0: general/d.2.0.0: protection techniky
-
1
Authors: et al.
Contributors: et al.
File Description: application/pdf
Relation: 979-8-4007-0396-6
Availability: https://hdl.handle.net/1822/90000
-
2
Authors:
Source: Siefers, Joseph, Gang Tan, and Greg Morissett. 2010. Robusta: Taming the native beast of the JVM. In proceedings of the 17th ACM Conference on Computer and Communications Security (CCS '10), October 4-8, 2010, Chicago, IL, 201-211. New York: Association for Computing Machinery.
Subject Terms: software, software engineering, interoperability, operating systems, operating systems security and protection
File Description: application/pdf
Relation: Proceedings of the ACM Conference on Computer and Communications Security (CCS)
-
3
Authors:
Source: ACM Sigplan Notices. 48(8)
Subject Terms: Information and Computing Sciences, Applied Computing, topological data analysis, feature extraction, merge tree computation, parallelization, hybrid parallelization approaches, Software Engineering
File Description: application/pdf
-
4
Authors:
Source: Proceedings 2020 IEEE ACM 42nd International Conference on Software Engineering Workshops Icsew 2020
Subject Terms: 46 Information and Computing Sciences (for-2020), 4608 Human-Centred Computing (for-2020), 4612 Software Engineering (for-2020), Bioengineering (rcdc), Networking and Information Technology R&D (NITRD) (rcdc), Machine Learning and Artificial Intelligence (rcdc)
File Description: application/pdf
-
5
Authors:
Contributors:
Subject Terms: cracking, hacking, reverse engineering, autorská práva, softwarové pirátství, WEP, WPA, licence, copyright, mp3, license
File Description: 55 s.; 33054359 bytes; application/zip; application/pdf; application/octet-stream
Relation: Univerzitní knihovna (sklad); http://hdl.handle.net/10195/46510; D26778; 15659
Availability: http://hdl.handle.net/10195/46510
-
6
-
7
Authors: et al.
Source: Barak, Boaz, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, and Ke Yang. 2012. On the (Im)possibility of Obfuscating Programs. Journal of the ACM 59, no. 2: 1–48.
Subject Terms: complexity theory, cryptography, homomorphic encryption, pseudorandom functions, Rice’s Theorem, software protection, software watermarking, statistical zero knowledge
File Description: application/pdf
Relation: Journal of the ACM
-
8
-
9
Authors:
Contributors:
Subject Terms: construction, ocel, prosklení, engineering, Galerie, panorama, facade, výstava, 3d print, dílna, veřejné prostory, organics, prototyp, public spaces, steel, Medlánky, sportovní letadla, technika, archiv, 3d tisk, Gallery, konstrukce, glass, model, kavárna, conference room, archive, software, cafe, foyer, landscape, areál, letectví, organika, exhibition, hangár, aviation, grasshopper, sports aircraft hangar, fasáda, prototype, model workshop, konferenční sál, krajina, resort
File Description: application/pdf; application/zip; text/html
Access URL: http://hdl.handle.net/11012/68533
-
10
Authors:
Source: ACM Transactions on Reconfigurable Technology and Systems. 16(1)
Subject Terms: Data Management and Data Science, Information and Computing Sciences, Networking and Information Technology R&D (NITRD), Bioengineering, Machine Learning and Artificial Intelligence, Affordable and Clean Energy, Field-programmable gate array, time series, Matrix Profile, Electrical and Electronic Engineering, Computer Hardware, Electronics, sensors and digital hardware, Distributed computing and systems software
Access URL: https://escholarship.org/uc/item/4t20j8n0
-
11
Alternate Title: Možnosti využitia ekologického oleja Arnica S 46 do poľnohospodárskej techniky. (Slovak)
Authors: et al.
Source: Journal of Central European Agriculture; 2013, Vol. 14 Issue 4, p1444-1455, 12p
Subject Terms: AGRICULTURAL engineering, HYDRAULICS, LUBRICATION & lubricants, AGRICULTURE, FORESTS & forestry, TRIBOLOGY
-
12
Authors:
Contributors:
Subject Terms: bezpečnost dat, šifrování, hesla, škodlivý software, penetrační testování, hardwarová ochrana dat, softwarová ochrana dat, data security, encryption, passwords, malicious software, penetration testing, hardware data protection, software data protection
File Description: 82 s. (126 000 znaků)
Relation: Elektronický archiv Knihovny UTB; http://hdl.handle.net/10563/30141; 36466
Availability: http://hdl.handle.net/10563/30141
-
13
Authors: McConnell, Steve
Subject Terms: software, programování, kódování dat
File Description: application/zip
Access URL: http://hdl.handle.net/11012/40779
-
14
Authors: Nosek, Matěj
Subject Terms: autopiloty, precizní zemědělství, navigation, autopilots, precision agriculture, komunikační systémy, communication systems, navigace, software
Access URL: http://www.nusl.cz/ntk/nusl-639879
-
15
Authors: et al.
Source: ACM Transactions on Graphics. 33(1)
Subject Terms: 46 Information and Computing Sciences (for-2020), 4607 Graphics, Augmented Reality and Games (for-2020), Algorithms, Theory, Sampling, dimension, line search, thin regions, rendering, depth-of-field, Poisson-disk sampling, Monte Carlo integration, Latin hypercube sampling, uncertainty quantification, cs.GR, cs.GR, I.3.5, 0801 Artificial Intelligence and Image Processing (for), 0806 Information Systems (for), Software Engineering (science-metrix), 4607 Graphics, augmented reality and games (for-2020)
File Description: application/pdf
-
16
Alternate Title: Risk Assessment Techniques and Their Application in Institutional Repositories -- Use in the Digital Repository of Charles University in Prague. (English)
Authors: Pavlásková, Eliška
Source: ProInflow; 2014, Vol. 6 Issue 1, p26-37, 12p
Subject Terms: SYSTEMS software, SOCIAL interaction, RISK assessment, SELF-evaluation, DIGITAL preservation, INSTITUTIONAL repositories
Geographic Terms: PRAGUE (Czech Republic)
Company/Entity: UNIVERZITA Karlova
-
17
Authors:
Contributors:
Subject Terms: softwarové inženýrství, byznys analytik, sběr požadavků, kvalitativní výzkum, ChatGPT, typologie otázek, rozhovor, requirements elicitation, business analyst, interview, question typology, software engineering, qualitative research
File Description: application/pdf
Relation: https://vskp.vse.cz/eid/96412
Availability: https://vskp.vse.cz/eid/96412
-
18
Authors:
Contributors:
Subject Terms: nekalé obchodní a marketingové techniky, senior, ochrana spotřebitele, Consumer protection, unfair marketing and business techniques, 8. Economic growth
Access URL: http://www.nusl.cz/ntk/nusl-203962
-
19
Alternate Title: POČIATKY A ROZVOJ VYUŽITIA VÝPOČTOVEJ TECHNIKY V OBLASTI EPIDEMIOLÓGIE V SLOVENSKEJ REPUBLIKE. (Slovak)
Authors: et al.
Source: Zdravotnicke listy; 2024, Vol. 12 Issue 4, p70-75, 6p
-
20
Authors:
Contributors:
Relation: 561972531605; http://hdl.handle.net/10467/26419
Availability: http://hdl.handle.net/10467/26419
Nájsť tento článok vo Web of Science
Full Text Finder