نتایج جستجو برای: system call

تعداد نتایج: 2298490  

Journal: :ACM Transactions on Information and System Security 2006

Journal: :Journal of Biomedical Science and Engineering 2013

Journal: :the modares journal of electrical engineering 2007
saied jalili hossin boland ghamat azar

to be sure, that a program behaves correctly at runtime; the behavior of the program should be verified. where the program source code is available, it is possible to extract the operational logic (i.e., behavior) of the program. but in this paper, programs are considered as black boxes, so no information is available about the operational logic of programs. however, some efforts are spent to l...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه ارومیه - دانشکده ادبیات و علوم انسانی 1392

language learning courseware has been receiving growing attention by english educators since its advent. a variety of softwares have been designed by software designers and resorted to by language educators to supplement language textbooks. this experimental study investigated how the application of computerized version of language textbooks and the reception of the entire course through comput...

Journal: :تحقیقات اقتصادی 0
سید محمد هادی سبحانیان دکتری اقتصاد دانشگاه تهران جعفر عبادی استاد اقتصاد دانشگاه تهران محسن مهرارا استاد اقتصاد دانشگاه تهران

despite the relative success of the health system and the promotion of health indicators over the last two decades, iran's health system still faces serious problems. one of the most important of them, is the inequity in access to health. theoretical studies and empirical evidences indicate that implementation of the referral system and family physician plan, is one of the main strategies ...

-

The development and evolution of any system–person, organization–nation depends on how the system succeeds to bridge the gap between what the system knows and what the system does (with the knowledge). We call this the gap between knowing and doing or the knowing-doing gap. If the system does not do what it knows, it will lose out in competition with other systems, its relative performance in...

2010
Victor A. Skormin

Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for re 'w'ie'Ning instructions , searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estim03te or any other aspect of this collection of information, i n...

2017
J'an Vesel'y Arkaprava Basu Abhishek Bhattacharjee Gabriel Loh Mark Oskin Steven K. Reinhardt

GPUs are becoming first-class compute citizens and are being tasked to perform increasingly complex work. Modern GPUs increasingly support programmabilityenhancing features such as shared virtual memory and hardware cache coherence, enabling them to run a wider variety of programs. But a key aspect of general-purpose programming where GPUs are still found lacking is the ability to invoke system...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شهید چمران اهواز - دانشکده ادبیات و زبانهای خارجی 1394

توسع? سریع فناوری های مدرن، محققان، و معلمین زبان را بر آن داشته است که به دنبال روش های جدیدتری برای استفاده از این فناوری ها در محیط کلاس درس باشند، و محیطی عاری از استرس برای یادگیری زبان ایجاد کنند. هدف از این مطالعه بررسی تفاوت های بین دو شیو? تدریس درک مطلب شنیداری، یعنی «یادگیری زبان به کمک کامپیوتر» (call) و «روش سنتی»، به دانش آموزان دوره اول متوسطه در ایران است. همچنین، این مطالعه قصد...

Journal: :journal of advances in computer research 0
hassan asgharian computer engineering, iran university of science and technology, tehran, iran ahmad akbari computer engineering, iran university of science and technology, tehran, iran bijan raahemi school of electrical engineering and computer science, university of ottawa, ottawa, canada

session initiation protocol (sip) is the main signaling protocol of next generation networks (ngn). sip based applications are usually deployed over the internet, for which their text-based nature and internal stateful operation make them vulnerable to different types of attacks. the real‑time functionality of sip based applications make their related security systems more complex. on the other...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید