首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   69篇
  免费   4篇
电工技术   2篇
化学工业   12篇
金属工艺   1篇
机械仪表   3篇
建筑科学   2篇
能源动力   2篇
轻工业   5篇
水利工程   1篇
无线电   24篇
一般工业技术   7篇
自动化技术   14篇
  2023年   2篇
  2022年   8篇
  2021年   10篇
  2020年   10篇
  2019年   7篇
  2018年   4篇
  2017年   3篇
  2016年   3篇
  2015年   4篇
  2014年   3篇
  2013年   10篇
  2012年   1篇
  2010年   1篇
  2009年   2篇
  2007年   1篇
  2006年   1篇
  2005年   1篇
  1989年   1篇
  1981年   1篇
排序方式: 共有73条查询结果,搜索用时 359 毫秒
1.
Buffer overflow vulnerabilities are one of the most commonly and widely exploited security vulnerabilities in programs. Most existing solutions for avoiding buffer overflows are either inadequate, inefficient or incompatible with existing code. In this paper, we present a novel approach for transparent and efficient runtime protection against buffer overflows. The approach is implemented by two tools: Type Information Extractor and Depositor (TIED) and LibsafePlus. TIED is first used on a binary executable or shared library file to extract type information from the debugging information inserted in the file by the compiler and reinsert it in the file as a data structure available at runtime. LibsafePlus is a shared library that is preloaded when the program is run. LibsafePlus intercepts unsafe C library calls such as strcpy and uses the type information made available by TIED at runtime to determine whether it would be ‘safe’ to carry out the operation. With our simple design we are able to protect most applications with a performance overhead of less than 10%. Copyright © 2006 John Wiley & Sons, Ltd.  相似文献   
2.
Multimedia Tools and Applications - Automated bank cheque verification using image processing is an attempt to complement the present cheque truncation system, as well as to provide an alternate...  相似文献   
3.
The Regular Post Embedding Problem extended with partial (co)directness is shown decidable. This extends to universal and/or counting versions. It is also shown that combining directness and codirectness in Post Embedding problems leads to undecidability.  相似文献   
4.
Wireless Personal Communications - Water Cycle Algorithm (WCA) is a nature-inspired metaheuristic algorithm. There is a lack of literature surrounding the use of WCA in modern cellular mobile...  相似文献   
5.
6.
Wireless Personal Communications - Increased dominance of mobile applications (henceforth, app) over conventional software applications is quite apparent; however, there is a lack of structured...  相似文献   
7.
This paper represents an efficient bootstrapped analog to digital converter with augmented NMOS sleep transistors. The newly designed MOS-based bootstrapped circuit is implemented to provide controlled input supply for analog to digital converter to develop the enhancing capability of circuit. This will reduce the effective leakage of the circuit. In the second stage, the NMOS sleep transistors are augmented as pull-up and pull-down transistors. Due to augmentation of transistors, controlled power supply ( \(V_{\mathrm{DD}})\) is obtained. Because of this, current driving capability in MOS transistors is improved and minimum sub-threshold leakage current is formed. Due to this, reduction of leakage power dissipation occurs much effectively. The whole simulation has been done at 45 nm (nanometer) technology. It is realized that the leakage power is reduced till 50 % approximately and delay performance is improved. It means that speed is improved using bootstrapped circuit with augmented sleep transistors NMOS. In this paper, different consecutive designs with Analog to Digital converter are represented.  相似文献   
8.
Despite the established superiority in finding the global as well as well-spread Pareto optimal (PO) points, the need of more numbers of function evaluations for population based evolutionary optimization techniques leads to a computationally demanding proposal. The case becomes more miserable if the function evaluations are carried out using a first principle based computationally expensive model, making the proposal not fit for online usage of the application. In this work, a Kriging based surrogate model has been proposed to replace a computationally expensive model to save execution time while performing an optimization task. A multi-objective optimization study has been carried out for the bulk vinyl acetate polymerization with long-chain branching using these surrogate as well as expensive models and Kriging PO solutions similar to those found by the first principle models are obtained with a close to 85% savings in function evaluations.  相似文献   
9.
Wireless Personal Communications - In the current generation of information technology, mobile applications (apps) have become an essential and momentous source to publicize the information across...  相似文献   
10.
Multimedia Tools and Applications - Most solitary finger impression check and acknowledgment frameworks / methods are based on the minutiae feature points. Feature Extraction is a fundamental...  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号