نتایج جستجو برای: hack

تعداد نتایج: 658  

Journal: :The Bulletin of the Royal College of Surgeons of England 2018

Journal: :Journal of Animal and Feed Sciences 2022

1. Abd El‐Hack M.E., El‐Saadony M.T., Shafi Qattan S.Y.A., Batiha G.E., Khafaga A.F., Abdel‐Moneim A.M.E., Alagawany M., 2020. Probiotics in poultry feed: a comprehensive review. J. Anim. Physiol. Nutr. 104, 1835–1850, https://doi.org/10.1111/jpn.13... CrossRef Google Scholar

Journal: :Ann. Pure Appl. Logic 1995
Ewan J. Barker

In order to apply known general theorems about the effective properties of recursive structures in a particular recursive structure, it is necessary to verify that certain decidability conditions are satisfied. This requires the determination of when certain relations, called hack andforth relations, hold between finite strings of elements from the structure. Here we determine this for recursiv...

Journal: :ITA 1979
Matthias Jantzen

— We prove Jtn {D[*) £ M (£>!*), where I>î* is the one-sided Dyck language, and discuss some old and new resuits concerning Pétri net languages. The above resuit shows that Pétri nets without X-labeled transitions are less powerful thon gênerai nets as regards their firing séquences since the class S£\ of gênerai Pétri net languages {Hack [13]) is identical with Aî^D'?), and the class ^Sf^ of c...

Journal: :Journal of Animal and Feed Sciences 2023

1. Abdelnour S.A., Abd El‐Hack M.E., Alagawany M., Taha A.E., Elnesr S.S., Elmonem O.M., Swelum A.A., 2020. Useful impacts of royal jelly on reproductive sides, fertility rate and sperm traits animals. J. Anim. Physiol. Nutr. 104, 1798–1808, https://doi.org/10.1111/jpn.13... CrossRef Google Scholar

Journal: :Journal of Animal and Feed Sciences 2022

1. Abd El-Hack M.E., Alagawany M., Abdel-Moneim A.M.E., Mohammed N.G., Khafaga A.F., Bin-Jumah Othman S.I., Allam A.A., Elnesr S.S., 2020. Cinnamon (Cinnamomum zeylanicum) oil as a potential alternative to antibiotics in poultry. Antibiotics 9, 1–12, https://doi.org/10.3390/antibi.... CrossRef Google Scholar

2002
Vikas Jayaswal William Yurcik David Doss

The poor state of security on the Internet calls for more effective ways to protect networked systems from attacks. One solution is to be able to counter attack with offensive capabilities. With attacker information available, companies find themselves in a dilemma – counter attack for immediate self-defense, retaliate for future deterrence, inform the appropriate law enforcement authorities, o...

Journal: :Softw., Pract. Exper. 2016
Renaud Pawlak Martin Monperrus Nicolas Petitprez Carlos Noguera Lionel Seinturier

This article presents Spoon, a library for the analysis and transformation of Java source code. Spoon enables Java developers to write a large range of domain-specific analyses and transformations in an easy and concise manner. Spoon analyses and transformations are written in plain Java. With Spoon, developers do not need to dive into parsing, to hack a compiler infrastructure, or to master a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید