Search Results - acm: d.: software/d.2: software engineering/d.2.0: general/d.2.0.0: protection techniky

Refine Results
  1. 1
  2. 2

    Source: Siefers, Joseph, Gang Tan, and Greg Morissett. 2010. Robusta: Taming the native beast of the JVM. In proceedings of the 17th ACM Conference on Computer and Communications Security (CCS '10), October 4-8, 2010, Chicago, IL, 201-211. New York: Association for Computing Machinery.

    File Description: application/pdf

    Relation: Proceedings of the ACM Conference on Computer and Communications Security (CCS)

  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Source: Barak, Boaz, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, and Ke Yang. 2012. On the (Im)possibility of Obfuscating Programs. Journal of the ACM 59, no. 2: 1–48.

    File Description: application/pdf

    Relation: Journal of the ACM

  8. 8
  9. 9
  10. 10
  11. 11

    Alternate Title: Možnosti využitia ekologického oleja Arnica S 46 do poľnohospodárskej techniky. (Slovak)

    Source: Journal of Central European Agriculture; 2013, Vol. 14 Issue 4, p1444-1455, 12p

  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Alternate Title: Risk Assessment Techniques and Their Application in Institutional Repositories -- Use in the Digital Repository of Charles University in Prague. (English)

    Source: ProInflow; 2014, Vol. 6 Issue 1, p26-37, 12p

    Geographic Terms: PRAGUE (Czech Republic)

    Company/Entity: UNIVERZITA Karlova

  17. 17
  18. 18
  19. 19

    Alternate Title: POČIATKY A ROZVOJ VYUŽITIA VÝPOČTOVEJ TECHNIKY V OBLASTI EPIDEMIOLÓGIE V SLOVENSKEJ REPUBLIKE. (Slovak)

    Source: Zdravotnicke listy; 2024, Vol. 12 Issue 4, p70-75, 6p

  20. 20