نتایج جستجو برای: path file

تعداد نتایج: 195250  

2005
Christian G. Sarmoria Steve J. Chapin

The post-mortem state of a compromised system may not contain enough evidence regarding what transpired during an attack to explain the attacker’s modus operandi. Current systems that reconstruct sequences of events gather potential evidence at runtime by monitoring events and objects at the system call level. The reconstruction process starts with a detection point, such as a file with suspici...

2006
Xiaoyi Tang

There have been an exploding number of wireless application ideas, such as sensor networks. Wireless networks present unique challenges to the designers. For example, wireless channels are intrinsically unreliable due to multi-path fading. Another constraint is limited spectrum resource. Various approaches have been proposed to build scalable efficient wireless networks. Cross layer design seek...

Journal: :Theoretical Computer Science 1980

Journal: :Igaku Toshokan 1986

Journal: :The Computer Journal 1972

Journal: :Indian Scientific Journal Of Research In Engineering And Management 2023

According to development requirements, a standardized management system is mainly used in basic information files, file statistics and query management, lending management. Development files for that school personnel more efficient functions within the scope of work documents, archiving promoting improve level records staff, increase their strength, speed up on pace technology make efficient. T...

Journal: :ACM SIGMETRICS Performance Evaluation Review 2000

Journal: :Biomedical Imaging and Intervention Journal 2006

Journal: :Pacific Journalism Review : Te Koakoa 2002

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید