نتایج جستجو برای: polymorphic
تعداد نتایج: 25366 فیلتر نتایج به سال:
A very effective means to evade signature-based intrusion detection systems (IDS) is to employ polymorphic techniques to generate attack instances that do not share a fixed signature. Anomaly-based intrusion detection systems provide good defense because existing polymorphic techniques can make the attack instances look different from each other, but cannot make them look like normal. In this p...
Circ Arrhythm Electrophysiol is available at http://circep.ahajournals.org DOI: 10.1161/CIRCEP.111.962027 Received July 28, 2011; accepted December 15, 2011. From the AP-HP, Hôpital Bichat, Service de Cardiologie et Centre de Référence des Maladies Cardiaques Héréditaires, Paris, France (A.L., I.D.); INSERM, U698, Paris, France (A.L.); Université Paris Diderot, Sorbonne Paris Cité, Paris, Franc...
We report the case of a young Chhattisgarhi male with polymorphic dermosporidiosis (cutaneous rhinosporidiosis). He had multiple subcutaneous nodules and an ecthymatoid skin lesion along with nasal rhinosporidiosis. The diagnosis was confirmed by demonstration of sporangia with endospores in fine-needle aspiration cytology (FNAC), histopathology, and imprint smear from the skin lesions. Treatme...
Type inference for structural polymorphism —i.e. record and variant polymorphism— has been an active area of research since more than 10 years ago, and many results have been obtained. However these results are yet to be applied to real programming languages. Based on our experience with the Objective Label system, we describe how variant polymorphism can be integrated in a programming language...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید