iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ host
جزئیات خدمات ترجمه در ترجمه تخصصی
idle
your
ﺖﻳﺎﺳ
migration
Viruses 2013, 5, 1431-1446; doi:10.3390/v5061431
Cloudlet-Screen Computing: A Multi-core-based, Cloud-computing-oriented,
Cloudlet-Screen Computing: A Multi-core-based, Cloud-computing-oriented,
JOURNALOFDISPLAYTECHNOLOGY,VOL.9,NO.6,JUNE2013 459
Leading Edge
Virtualize Storage, Not Disks
1752 IEEE LATIN AMERICA TRANSACTIONS, VOL. 10, NO. 3, APRIL 2012
Malware threatens virtual machines, according to report
How NAT Works A router configured with NAT will have
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
REVIEW RE REVIE VIEW W
REVIEW RE REVIE VIEW W
REVIEW RE REVIE VIEW W
REVIEW RE REVIE VIEW W
The purpose of this paper is to examine the interaction
CHAPTER 10
Y.Gaoetal./JournalofComputerandSystemSciences79(2013)1230–1242 1233
1/28/10
BioMed Central
BioMed Central
3.4 Virtual Clusters and Resource Management 161
RABINOVICH LAYOUT_Layout 1 3/22/12 3:21 PM Page 129
2 3 2 C h a p t e r 1 3 • U n d e r s t a n d i n g A v a i l a b i l i t y
The Design Philosophy of the DARPA Internet Protocols
mediated epithelial cell damage in a mouse model of acute
Legacy and sustainability
Legacy and sustainability
Opinion
Current Biology 21, R775–R785, September 27, 2011ª2011 Elsevier Ltd All rights reserved DOI 10.1016/j.cub.2011.06.018
Current Biology 21, R775–R785, September 27, 2011ª2011 Elsevier Ltd All rights reserved DOI 10.1016/j.cub.2011.06.018
City, Culture and Society 3 (2012) 151–163
The 9th International Conference for Young Computer Scientists
Tcpcrypt maintains the confidentiality of data transmitted in TCP segments
Journal of World Business 50 (2015) 294–301
Annals of Applied Biology ISSN 0003-4746
Data encryption and authentication tcpcrypt encrypts and authenticates all application
Error Control and Flow Control TCP uses port numbers to
webmoney
webmoney
webmoney
acquire ownership of assets for the purpose of controlling the
Multinational enterprises (MNEs) investing in infrastructure privatization projects in
Multinational enterprises (MNEs) investing in infrastructure privatization projects in
Journal of Network and Computer Applications 33 (2010) 661–671
Journal of Network and Computer Applications 37 (2014) 62–75
the focus is on the impact a specific attack has
END ARGUMENTS IN SYSTEM DESIGN This paper presents a design
MethodsX 2 (2015) 14–18
Bus idle protocol When the selected device has BSY cleared
Foreign investors’ interestsandcorporate taxavoidance:
Foreign investors’ interestsandcorporate taxavoidance:
Plant and Soil 255: 571–586, 2003.
0 introduces a powerful new feature as part of vSphere
Expert Systems with Applications 41 (2014) 6123–6130
Consider a server farm with a central dispatcher and several
Hoseinaei
Sovereign Guarantees in Project Finance One of the most attractive
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
Preventing Faults: Fault Monitoringand Proactive Fault Tolerance in Cloud
2013 Second European Workshop on Software Defined Networks
2013 Second European Workshop on Software Defined Networks
Downloaded form http://iranpaper.ir
In this study collected mites that related to this species
Efficient Live Migration of Virtual
Data encryption and authentication tcpcrypt encrypts and authenticates all application
Data encryption and authentication tcpcrypt encrypts and authenticates all application
Shellfish Immunology Probiotics and prebiotics associated with aquaculture a b
has been initially defined as organisms or substances that contribute
specific immune system is the first line of defense which
Shellfish Immunology Probiotics and prebiotics associated with aquaculture a b
has been initially defined as organisms or substances that contribute
specific immune system is the first line of defense which
Shellfish Immunology Probiotics and prebiotics associated with aquaculture a b
Mission Statement
15767 (6) - DanwareNetOp Host HELO Request Remote Information Disclosure
35635 (1) - MS09-004: Vulnerability in Microsoft SQL Server Could Allow Remote Code Execution
63643 (1) - MS13-006: Vulnerability in Microsoft Windows Could Allow Security Feature Bypass(2785220) (uncredentialed check)
00:00:00
00:00:00
00:00:00
REVIEW
REVIEW
1. Introduction
1. Introduction
1. Introduction
COMPROMISING THE HOST OS One of the most appealing targets
COMPROMISING THE HOST OS One of the most appealing targets
Downloaded from http://iranpaper.ir
with a central mainframe supporting a number of directly connected
with a central mainframe supporting a number of directly connected
The runtime modification of hypervisors is an appealing problem for
Mobile Agent Security – Issues and Directions
S e e d i s c u s s i o n s , s t a t s , a n d a u t h o r p r o f i l e s f o r t h i s p u b l i c a t i o n a t : h t t p s : / / w w w . r e s e a r c h g a t e . n e t / p u b l i c a t i o n / 5 6 5 4 6 9 6
The exit of intracellular pathogens from host cells is an
The exit of intracellular pathogens from host cells is an
2016 IEEE 41st Conference on Local Computer Networks 2016 IEEE 41st Conference on Local Computer Networks 2016 IEEE 41st Conference on Local Computer Networks
Network Layer
JBR-09179;NoofPages7
ترکیب شیمیایی گیاه و سازگاری دشمن طبیعی: اثرات متقابل دشمن طبیعی و گیاهخوار
SM
EnergyEconomics42(2014)395–402
Genetically determined variation in host response and susceptibility to pathological
Genetically determined variation in host response and susceptibility to pathological
SM
SM
ترکیب شیمیایی گیاه و سازگاری دشمن طبیعی: اثرات متقابل دشمن طبیعی و گیاهخوار
Migrating from IRRICAD Pro Standalone to IRRICAD Link
Migrating from IRRICAD Pro Standalone to IRRICAD Link
Migrating from IRRICAD Pro Standalone to IRRICAD Link
■
Chapter 2 Upon completion of this chapter, you will be
How to Use Your Social Network to Travel the World
Phages replicate inside the host either by lytic or lysogenic
A Review of Phage Therapy against Bacterial Pathogens of Aquatic
Phages replicate inside the host either by lytic or lysogenic
A Review of Phage Therapy against Bacterial Pathogens of Aquatic
Phages replicate inside the host either by lytic or lysogenic
Phages replicate inside the host either by lytic or lysogenic
A Review of Phage Therapy against Bacterial Pathogens of Aquatic
24.3 Bacterial Factors Involved in Escape From the Vacuolej441
24.3 Bacterial Factors Involved in Escape From the Vacuolej441
میکروبیولوژی
24.3 Bacterial Factors Involved in Escape From the Vacuolej441
Environmental Microbiology Reports (2011) 3(2), 144–153 doi:10.1111/j.1758-2229.2010.00240.x
with the consent of those in charge of the network
with the consent of those in charge of the network
has been made available to the sniffing host using the
Low-PowerWirelessBus
CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE
A Survey on Load Balancing Algorithms for Virtual Machines
Anthony William Maresso