iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ code
جزئیات خدمات ترجمه در ترجمه تخصصی
DynamoRIO
code
type
Eþ
data
data
data
data
data
IEEE TRANSACTIONS ON COMPUTERS, VOL. 60, NO. 3, MARCH 2011 335
ABSTRACT
ABSTRACT
ABSTRACT
Code of Professional Ethics AAT Code of Professional Ethics – Version 2.0 January 2014
concepts and the mathematical models used in kinematic positioning are
legal systems can be split between civil law and common
History The history of law connects closely to the development
Remote Attack Surfaces The largest and most attractive attack surface
Remote Attack Surfaces The largest and most attractive attack surface
Remote Attack Surfaces The largest and most attractive attack surface
IEEE TRANSACTIONS ON COMPUTERS, VOL. 60, NO. 3, MARCH 2011 335
ISIN
An International Securities Identification Number (ISIN) uniquely identifies a security. Its structure is defined in ISO 6166.
ADVANCED CODING TECHNIQUES
www.ietdl.org
gerenal rule for hovercraft
The NSA is Watching You Leaked NSA source code from
The NSA is Watching You Leaked NSA source code from
changes to home page and search engine settings in the
changes to home page and search engine settings in the
TRANSACTIONS ON SOFTWARE ENGINEERING 1
VisualizingCompiledExecutablesforMalwareAnalysis
PIC-et Radio II: How to Receive AX.25 UI Frames Using Inexpensive PIC Microcontrollers
20 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 36, NO. 1, JANUARY/FEBRUARY 2010
20 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 36, NO. 1, JANUARY/FEBRUARY 2010
20 IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 36, NO. 1, JANUARY/FEBRUARY 2010
Statically Detecting Likely Buffer Overflow Vulnerabilities Abstract Buffer overflow attacks
Statically Detecting Likely Buffer Overflow Vulnerabilities Abstract Buffer overflow attacks
Statically Detecting Likely Buffer Overflow Vulnerabilities Abstract Buffer overflow attacks
Charan Langton, Editor
HyperSentry: Enabling Stealthy In-context Measurement of
The HipHop Compiler for PHP
The HipHop Compiler for PHP
there was an error running selected code generator:
there was an error running selected code generator:
there was an error running selected code generator:
Microelectronics Journal 44 (2013) 545–552
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
Thrift: Scalable Cross-Language Services Implementation
NASA/TM---98-207890
Information and Software Technology 55 (2013) 395–411
Information and Software Technology 55 (2013) 395–411
3. SIMD PROGRAMMING: THE CONNECTION MACHINE 101
Microelectronics Journal 44 (2013) 545–552
Optik 124 (2013) 4046– 4051
Optik 124 (2013) 4046– 4051
Expert Systems with Applications 41 (2014) 445–456
Expert Systems with Applications 41 (2014) 445–456
Expert Systems with Applications 41 (2014) 445–456
Expert Systems with Applications 41 (2014) 445–456
Expert Systems with Applications 41 (2014) 445–456
IEEE INFOCOM 2014 - IEEE Conference on Computer Communications
Procedia
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
some methods require modifying the source code of OS kernel
Kernel Memory Protection by an Insertable Hypervisor
11/17/2014 How Do I Add a Client Side Message Box to ASPX Pages?
International Social Work 49(2): 151–164
Applied Soft Computing 26 (2015) 357–367
2014 5th International Conference on Information and Communication Systems (ICICS)
Part II
2011 IEEE Symposium on Computers & Informatics
Prediction of the behavior of reinforced
Driven Software Development is a software development approach that aims
CASTI Guidebook to
Source: MAYNARD’S INDUSTRIAL ENGINEERING HANDBOOK
1
2
1960 IEEE COMMUNICATIONS SURVEYS & TUTORIALS, VOL. 15, NO. 4, FOURTH QUARTER 2013
Simplescalar installation
Code of
Defining Code-injection Attacks
·
This article discusses the major developments in the history of
This article discusses the major developments in the history of
Many producers can send messages that go to one queue
Many producers can send messages that go to one queue
Many producers can send messages that go to one queue
Many producers can send messages that go to one queue
embedded systems and support preliminary allocation in Figure 2. In this figure, blocks in the upper row
Hardware Models for Automated Partitioning
Hardware Models for Automated Partitioning
Security in distributed systems is a complex issue which can
HDL Coder
Signal Processing 81 (2001) 2105–2129
computers & security 31 (2012) 176e191
EN VERTICAL SECONDARY SHUTOFF
EN AIR-WATER FILTER
EN PN - PNR SILENCERS
[3B2-11] mmi2011020086.3d 22/3/011 15:27 Page 86
1
Business Horizons (2007) 50, 315–324
chapter 1 ■ INtrODUcING the cataLYSt WeB appLIcatION FraMeWOrK 13
The aim of this paper is to analyze how the
The aim of this paper is to analyze how the
International Journal of Information Management 33 (2013) 840– 849
International Journal of Information Management 33 (2013) 840– 849
International Journal of Information Management 33 (2013) 840– 849
International Journal of Information Management 33 (2013) 840– 849
222 JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 29, NO. 2, JANUARY 15, 2011
IBAN
Business Horizons (2007) 50, 315–324
CHANG LAYOUT 2/16/10 4:06 PM Page 82
G Model
Business Horizons (2007) 50, 315–324
About Objective-C
Criminal Law Criminal law is concerned with the responsibility of
1 To ensure that aeronautical information services units obtain information
Python History of Python
Software Architecture Improvement
Software Architecture Improvement
Error Detection and Correction Using the BCH Code 1
LDPC Codes – a brief Tutorial
RESEARCH PAPER
RESEARCH PAPER
ffi rs.indd 01:50:14:PM 02/28/2014 Page ii ™
In order to be able to change the design of
definition One of the most important papers that discusses related
2011 IEEE International Symposium on Information Theory Proceedings
1
2011 IEEE International Symposium on Information Theory Proceedings
IBIMA Publishing
NET Micro Framework base class libraries use a mix of
Proceedings of the Estonian Academy of Sciences,
core designs migrated from Symmetric Multi Processing to cache coherent
core designs migrated from Symmetric Multi Processing to cache coherent
NET Micro Framework base class libraries use a mix of
2012 Network Technologies
journal of information security and applications 18 (2013) 130e137
Linux Kernel Vulnerabilities: State-of-the-Art Defenses
Taxonomy of Linux Kernel Vulnerability Solutions
2014 2nd International Conference on Devices, Circuits and Systems (ICDCS) 1
2014 2nd International Conference on Devices, Circuits and Systems (ICDCS) 1
F. Benhammadi & K. B. Bey
EMbedded Fingerprint Matching on Smart Card
Voyager 1450g
Voyager 1450g
RESEARCH PAPER
A novel method for recognition of modulation code of lpi radar signals.
XSS-Dec: A Hybrid Solution to Mitigate Cross-Site
Prevention of Cross-Site Scripting Attacks
Information and Software Technology 54 (2012) 467–478
TheJournalofLogicandAlgebraicProgramming 78(2009)340–358
Journal of Network and Computer Applications 33 (2010) 661–671
Journal of Network and Computer Applications 37 (2014) 62–75
Information and Software Technology 54 (2012) 467–478
Documentation
Code Composer
Dreamweaver
Good ideas about smart technology are indeed spreading from city
Good ideas about smart technology are indeed spreading from city
Indurating Machine
Magento PHP
35965
EMbedded Fingerprint Matching on Smart Card
International Journal of Soft Computing and Engineering (IJSCE)
PC-3000 EXPRESS / UDMA / PORTABLE
Error Detection and Correction Using the BCH Code 1
Three letters that together constitute the name of one of
زبان برنامه نویسی گو
I was in my room at my house doing some
Security
(LZW) Compression Algorithm
International Journal on Information Theory (IJIT),Vol.4, No.1, January 2015
1 LZW Encoding
Available online at www.sciencedirect.com
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 2 2 0 8 8 3 4 2 0
NSPE Board of Ethical Review
AGREEMENT FOR SERVICES AND FEES
SECTION 5. professionalism
SECTION 5. professionalism
Available online at www.sciencedirect.com
!
The RF fields supported by the helix are represented by
关闭点火开关 Switch ignition off 打开点火开关 Turn on the ignition switch
AN EXPLORATORY STUDY ON ISSUES AND CHALLENGES OF AGILE
I must thank the entire team at Apress for giving
GLADE:BigDataAnalyticsMadeEasy
Tupleware: “Big”Data,BigAnalytics,SmallClusters
به نام خدا Abstract After the adoption of the Code
HOW TO BUILD SIMPLE TELEGRAPH SETS.
HOW TO BUILD SIMPLE TELEGRAPH SETS.
JOURNAL OF ELECTRONIC TESTING: Theory and Applications 20, 433–437, 2004
Anna Kournikova Virus
Darkhotel's attacks in 2015 - Securelist https://securelist.com/blog/research/71713/darkhotels-attacks-in-2015/
1
Efficient Compilation of Fine-Grained SPMD-threaded
How to Upgrade Your Website PHP Version If you are
2012 International Conference on Computing Sciences
2012 International Conference on Computing Sciences
A Survey of Key Factors Affecting Software Maintainability
Design and VHDL Modeling of All-Digital PLLs
ns-3 tutorial
Getting Started with
a + b
35635 (1) - MS09-004: Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution
87011 (2) - Oracle WebLogic Java Object Unserialization RCE
An Introduction to Information Theory
2015 IX Brazilian Symposium on Components, Architectures and Reuse Software
2015 IX Brazilian Symposium on Components, Architectures and Reuse Software
Entertainment Computing 5 (2014) 173–187
Entertainment Computing 5 (2014) 173–187
CodeReviewQuality: HowDevelopersSeeIt
2016 IEEE/ACM 13th Working Conference on Mining Software Repositories 2016 IEEE/ACM 13th Working Conference on Mining Software Repositories
Data Interchange plc
Elements of Information Theory - cover
Nuclear Engineering and Design 262 (2013) 228– 234
Empowering Software Maintainers
NET to create the class files associated with your data
REAL-TIME SYSTEMS
Empowering Software Maintainers
Empowering Software Maintainers
pecial intention The second form of intention in French criminal
REAL-TIME SYSTEMS
Virtual machine migration makes system deployment fast and easy by
ETHICAL DECISION-MAKING AND RELIGIOUS IDENTITY: A
REAL-TIME SYSTEMS
Cylindrical Offset
Our research will be focusing on automatic detection of three
PACIFIC EARTHQUAKE ENGINEERING
IET Software
IET Software
All threads start in a suspended state when the scheduler
Pirayesh
Python Programming for Hackers and Pentesters
Proceedings of the 50th Hawaii International Conference on System Sciences | 2017
This Smart AI Can Now Steal Code to Write Its
This Smart AI Can Now Steal Code to Write Its
Listdecoding: algorithms
Listdecoding: algorithms
JournalofConstructionalSteelResearch127(2016)41–53
Programmed AI Spits Rhymes Like Kanye West On a bet
Public Officials and State Employees
Public Officials and State Employees
computers & security 37 (2013) 1e14
Distributed Systems
CHAPTER
CHAPTER
1. Introduction
What characterizes almost all Hollywood pictures is their inner emptiness.
Circuit Design with VHDL Pedroni
computers & security 37 (2013) 1e14
The Journal of Systems and Software 120 (2016) 195–218
CHAPTER
Q&A
Q&A
SECURITY ACCOMPANYING DOCUMENT label_accompagning_document_tad TRANSIT ACCOMPANYING DOCUMENT label_european_community EUROPEAN COMMUNITY
1 REGIME 3 Forms 4 Loading lists 5 Items 6
computers & security 37 (2013) 1e14
computers & security 37 (2013) 1e14
Export Classification Model to Predict New
Export Classification Model to Predict New
It takes an input of the same form as this
button at the bottom of the page On the next
پرسنل دارای تایید صلاحیت
■
77707
utilitarians have devised ingenious methods of placing a price on
Refactoring: Improving the Design of Existing Code
24 Feb 2018
TCO-1119
QuantitativeAnalysisofControlFlowCheckingMechanisms
Accepted Manuscript
QuantitativeAnalysisofControlFlowCheckingMechanisms
Use and maintenance manual
Prepared exclusively for John Chukwuma Under Construction: The book you’re reading is still under
fifteen amazing phone functions you had no idea existed nowadays
Downloaded from http://paperhub.ir
Enforcement of foreign judgments
Downloaded from http://iranpaper.ir
2016 IEEE 8th International Conference on Cloud Computing Technology and Science
Reference Guide Draft 2017-10-09
Undergraduate Topics in Computer Science
ve stumbled into a conversation where everyone already knows what
Michalis Polychronakis
ve stumbled into a conversation where everyone already knows what
A more expansive view was adopted by the Supreme Court
strategical directions derived from the current status analysis will be
strategical directions derived from the current status analysis will be
Your mobile number for get sms Mobile Number Please enter
L. Montalvillo, O. Díaz / The Journal of Systems and Software 122 (2016) 110–143 111
L. Montalvillo, O. Díaz / The Journal of Systems and Software 122 (2016) 110–143 111
Software Maintenance and Evolution Overview This section is a short
Accepted Manuscript
652 SECURITY CHAP.9
Third Edition
Category II Codes The following section of Current Procedural Terminology
Downloaded from http://iranpaper.ir
Chapter 7
7.1 Introduction
this ransomware targets the Pokemon Go application for Windows and
Chapter 15 Introduction to Scripting with Ruby Chapter Objectives After
both of the real world in which we live and
both of the real world in which we live and
and you can use as little or as much React
React has been designed from the start for gradual adoption, and you can
USOO9703554B2
2015 27th International Symposium on Computer Architecture and High Performance Computing
DISCIPLINARY CODE
When you drop the set list to block onto the
EN ترجمه Favorite Fault scan System name Enter the system
Unreal Engine 4
Pseudo Random Signal Processing Pseudo Random
The first line tells you that the source code is
The first line tells you that the source code is
The first line tells you that the source code is
After Purchase or Recipient Gift Date by Days after purchase
MOBILE AGENTS AND SECURITY
MOBILE AGENTS AND SECURITY
Downloaded from https://iranpaper.ir
Downloaded from https://iranpaper.ir
Downloaded from https://iranpaper.ir
Program Comprehension and
Downloaded from https://iranpaper.ir
Often the victim has no idea their device is being
Technological Forecasting & Social Change 175 (2022) 121415
Technological Forecasting & Social Change 175 (2022) 121415
1
Journal of Information Security and Applications 48 (2019) 102369
Journal of Information Security and Applications 48 (2019) 102369
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2841907, IEEE
The Basics of C#
Product Data Sheet
®
Lisp: Good News, Bad News, How to Win Big
OW ASP Mobile Application Security T esting Guide v1.6.0