Interprocedural static slicing of binary executables
Understanding program slicing as a technique for automatically decomposing programs by analyzing its control and data flow. Control flow analysis of binary executables and its problems. Interprocedural slicing using SDG and experimental results.
Подобные документы
The possibility using systems operational analysis in the organization and management of research and innovation projects in enterprises and Universities. The organizing principle of the multidimensional cube. Data Mining using mathematical apparatus.
??????, добавлен 06.05.2018The comparative analysis of multiple commonly used approaches of the analysis of system logs, and streaming data massively generated by company IT infrastructure with an unattended anomaly detection feature. Hierarchical temporary memory algorithms.
??????, добавлен 18.09.2020The methods of data protection in local and global network. The functions of antivirus programs. The server side of web protection. The aspects of data transfer in big company. Password management. Internet security from different hacking and infection.
??????????? ??????, добавлен 07.08.2017Using Duraton-Overman test to study detailed location patterns of the forestry and agricultural industry in Russia. Data analysis package. The first article on geocoding. Methods for measuring localization. Distance-based localization measurement.
???????? ??????, добавлен 11.02.2017Analysis on the Geographic Information System. Monitoring of the environment in the vicinity of the airport. Modeling control air pollution, noise. Operation of aircraft in the conditions of the implementation of intelligent transport management systems.
??????, добавлен 12.08.2016- 81. Identifying the suitable program for queue management through analysis: Apache Kafka or RabbitMQ
Comparative analysis of prominent message queuing solutions Apache Kafka and RabbitMQ, aimed at identifying the most suitable program for queue management. Evaluation of technology's capability to handle high-throughput scenarios and fault resilience.
??????, добавлен 09.12.2024 Computer science as the theory of representation, processing and use of the information, main directions of development of science, its subject, ikomponenty. Properties and coding information. Rules of conversion from binary to decimal number system.
???????????, добавлен 18.11.2015Introduction to cryptography and data security. The study of random numbers and an unbreakable stream cipher. The data encryption standard and alternatives. Practical aspects of public-key cryptography. Principles of message authentication codes.
?????, добавлен 08.03.2014Application of mathematical methods - important condition in the analysis, work optimization of industrial structures. Use of the device of imitating modeling for research of production systems. The program table parameters for collecting statistics.
????????? ??????, добавлен 10.11.2014Deep learning is one of the most active research fields in machine learning community. It has gained unprecedented achievements in fields such as computer vision, natural language processing and speech recognition. ?hallenges posed by Big Data analysis.
??????, добавлен 18.02.2021Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.
??????, добавлен 28.05.2021Our algorithm combines the Reverse Polish Notation (RPN) and expression tree algorithms it is a novel method for efficiently evaluating arithmetic expressions. The algorithm combines the benefits of Reverse Polish Notation (RPN) and Expression Trees.
??????, добавлен 19.03.2024A test-bed for research cyber-physical production systems and the hardware setup and the software environment. A new approach for distributed software and semantic data modelling is introduced. System SEPIA - ? semantic cyber-physical system approach.
??????, добавлен 23.02.2016Analysis of data mining systems, development of document management systems. Development of an integrated system for intelligent information analysis. A model for using various statistical data of any format in the source of a digital organization.
??????, добавлен 01.02.2024Analysis of various methods and strategies for scaling the fintech API to solve the problems of financial applications. The principles of distributing traffic between multiple servers to improve their performance. Asynchronous data processing methods.
??????, добавлен 14.12.2024??????? ??????? Data Mining, ??? ??????? ?????????????. ??????? ?????????????? ??????????. ????????? ??????????, ????????? ???????? ? Data Mining. ???????? ?????????? ??? ?????? ??????? ? 1960-? ?. Data Mining ??? ????? ????? ?????????????? ??????????.
???????, добавлен 14.01.2015The analises widespread adoption of data-driven business intelligence techniques at the operational, tactical, and strategic levels in the mobile industry, coupled with the integration of user-centric metrics, has brought about a paradigm shift.
??????, добавлен 25.06.2024?????????? ??????? ???????????? ???????????????? ? ??????????? ?????????. ??????????? ???????? Microsoft Exchange Server, Lan Docs, Lotus Notes Docs Vision ? Optima Work Flow. ??????? ????????????? ????????? ??????-????????? ????????? ??????????.
??????????? ??????, добавлен 06.06.2017- 94. Big Data
??????????? ??????? "Big Data" ? ??? ?????????? ? ?????? ? ??????????? ????????? ?????? ? ?????????????? ???????. ??????????? ???????? ?????????? ????????? ?????????? ??????????. ???????? ??????? ???????? ?????? ? ?????????? Big Data ? ?????? ????????.
???????? ??????, добавлен 28.09.2015 The Reynolds number formula in the upstream pipe. A computation methodic of the expansion flow with the convergence threshold for all equations. Velocity vector visualization. The function that calculates the shear stress in cylindrical coordinates.
???????????? ??????, добавлен 10.05.2022Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.
?????, добавлен 08.03.2014???????? ??????? "Big Data", ???????????? ??????? ???????? ???????? ?????? ??? ??????????????? ??????????????. ????? ? ???????? ???? ????????? Big Data ? ??????????? ???????????? ??????????? ?????? ? ???????? ?? ???????? ???????? ????????????? ??????????.
??????, добавлен 24.02.2025????????? ????????????? C#, ???? ????. A-FLOW - ????????? ???????????? ?????????? ???????????. KODU - ?????????? ????? ??? ????????? ???? ? 3D-???????????. LEGO MINDSTORMS NXT, ????????? ???? ????????????? ??? ?????? ????????????? Lego Mindstorms.
???????????? ??????, добавлен 24.11.2017?????? Data Mining: ???????????? ? ????????????????, ????????????? ? ?????????, ?????? ????????????? ??????, ?????????????. ???????????? ?????????? Data Mining. ??????????? ???????? ??????, ???? ?????????? ????????????????. ??????? ??????????? ??????.
???????????, добавлен 27.04.2023A practical guide to using encryption technology to ensure confidentiality, security and integrity of your most valuable assets - its data. The analysis of the basic fundamentals of cryptography and its techniques for dealing with electronic security.
?????, добавлен 08.03.2014