Treffer 1 - 20
von 1.361
- 1
- 2
Seite in der Trefferliste auswählen
Fake product detection using QRCode blockchain domain.
Subashree, M. ; Charulatha, C. ; Divya, T. ; et al.
AIP Conference Proceedings; 2026, Vol. 3345 Issue 1, p1-5, 5p
HOW TO… Stream from your PC to your smart TV.
Rawlinson, Nik
Computer Act!ve. 2/14/2024, Issue 677, p35-37. 3p. 3 Color Photographs.
FlawCheck: Detecting Smart Contract Vulnerabilities Based on Symbolic Execution.
Gou, Naixiang ; Zhao, Xiangfu ; Wang, Shiji ; et al.
Security & Privacy. Mar/Apr2025, Vol. 8 Issue 2, p1-18. 18p.
АЛГОРИТМ АЛГЕБРАЇЧНОГО СИНТЕЗУ МІКРОПРОГРАМНОГОАВТОМАТА НА ОСНОВІ ПЕРЕБОРУ ОПЕРАЦІЙ. (Ukrainian)
БАБАКОВ, Р. М. ; БАРКАЛОВ, О. О.
Cybernetics & Systems Analysis / Kibernetiki i Sistemnyj Analiz; 2026, Issue 1, p16-25, 10p
Einzel‐ und Streifenfundamente auf Rüttelstopfsäulen – Setzungsberechnung. (English)
Klobe, Berthold ; Chen, Chien‐Hsun
Geotechnik; Dec2025, Vol. 48 Issue 4, p272-276, 5p
From Percepts to Semantics: A Multi-modal Saliency Map to Support Social Robots' Attention.
Ferrini, Lorenzo ; Andriella, Antonio ; Ros, Raquel ; et al.
ACM Transactions on Human-Robot Interaction; Dec2025, Vol. 14 Issue 4, p1-19, 19p
Optimizing machine learning operations in multi-cloud infrastructure: a framework for unified deployment management and topology discovery.
Wei, Hao ; Pañeda, Xabiel García ; Rodriguez, Joaquín Salvachúa
Cluster Computing; Nov2025, Vol. 28 Issue 14, p1-23, 23p
Method of a voice source acoustic analysis in real time.
Savchenko, V. V. ; Savchenko, L. V.
Measurement Techniques; Nov2025, Vol. 68 Issue 7/8, p453-463, 11p
POWERTOYS YOU'LL USE EVERY DAY.
RAWLINSON, NIK
APC (Future Publishing Ltd.); Nov2025, Issue 551, p66-69, 4p, 8 Color Photographs
Lessons from piloting and scaling a real-time DHIS2 based treatment reporting tool for mass drug administration in Nigeria.
Imhansoloeva, Martins ; Nwosu, Christian ; Osinoiki, Omosefe ; et al.
PLoS Neglected Tropical Diseases; 10/10/2025, Vol. 19 Issue 10, p1-18, 18p
Awaiting for Godot: stateless model checking that avoids executions where nothing happens.
Jonsson, Bengt ; Lång, Magnus ; Sagonas, Konstantinos
Formal Methods in System Design; Oct2025, Vol. 67 Issue 1, p71-105, 35p
Balancing Accuracy and Efficiency in Vehicular Network Firmware Vulnerability Detection: A Fuzzy Matching Framework with Standardized Data Serialization.
Fang, Xiyu ; He, Kexun ; Wu, Yue ; et al.
Informatics; Sep2025, Vol. 12 Issue 3, p67, 24p
ПРОГРАМНА РЕАЛІЗАЦІЯ ЧИСЛОВОГО МЕТОДУ ОТРИМАННЯ ММП-ОЦІНОК ПАРАМЕТРІВ ДЖЕФФРІСОВОЇ МОДИФІКАЦІЇ РОЗПОДІЛУ ПІРСОНА VII ТИПУ. (Ukrainian)
ДЖУНЬ, Й. В. ; ЯСІНСЬКИЙ, А. М. ; ШПОРТЬКО, О. В. ; et al.
Cybernetics & Systems Analysis / Kibernetiki i Sistemnyj Analiz; 2025, Issue 5, p170-176, 7p
Researchers Find Ten Errors in Google's Quick Share File Transfer Tool.
CIO&Leader. 8/13/2024, pN.PAG-N.PAG. 1p.
Computation Takes Time, But How Much?
WILHELM, REINHARD ; GRUND, DANIEL
Communications of the ACM. Feb2014, Vol. 57 Issue 2, p94-103. 10p. 1 Color Photograph, 4 Diagrams.
Methodology and Implementation of a Secure Data Exchange System.
O. A., Safaryan ; I. A., Alferova ; O. S., Buryakova ; et al.
Pakistan Journal of Life & Social Sciences; 2025, Vol. 23 Issue 2, p1119-1128, 10p
A Monitoring System for Measuring the Cognitive Cycle via a Continuous Reaction Time Task.
Ukov, Teodor ; Tsochev, Georgi ; Yoshinov, Radoslav
Systems; Jul2025, Vol. 13 Issue 7, p597, 35p
WINDOWS PowerToys.
Stapley, Will
Computer Act!ve. 10/21/2020, Issue 591, p50-57. 7p. 18 Color Photographs.
Quik Church, Route 3.141592.
Voss, Sarah
Journal of Humanistic Mathematics. Jan2024, Vol. 14 Issue 1, p322-325. 4p.
Kode Vicious: Beautiful Code Exists, If You Know Where to Look.
Neville-Neil, George V.
Communications of the ACM. Jul2008, Vol. 51 Issue 7, p23-25. 3p. 3 Diagrams.
- 1
- 2