iTrans.ir
سفارش ترجمه
خانه
راهنما
چگونه سفارش ترجمه دهیم
تماس با ما
ترجمه فوری
راهنمای استفاده از سایت
API
بیشتر...
پرسش و پاسخ
قیمت ترجمه
ثبت نام
ورود
021-66989400
021-66989500
0935-173-0404
نشانی و اطلاعات تماس
تگ kernel
جزئیات خدمات ترجمه در ترجمه تخصصی
–p
±
±
starch
4 Ways to Free Up Disk Space on Linux
Shi et al. BMC Research Notes 2011, 4:189
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, MARCH 2014, VOLUME: 05, ISSUE: 01
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, MARCH 2014, VOLUME: 05, ISSUE: 01
Two Vulnerabilities in Android OS Kernel
ISSN: 2229-6948(ONLINE) ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, MARCH 2014, VOLUME: 05, ISSUE: 01
ANALYSIS OF ANDROID VULNERABILITIES AND MODERN EXPLOITATION
Two Vulnerabilities in Android OS Kernel
Double-precision Floating-point
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
which dramatically simplifies GPU programming by giving programmers a single
J.ParallelDistrib.Comput.73(2013)4–13
some methods require modifying the source code of OS kernel
Available online at www.sciencedirect.com
Journal of King Saud University – Engineering Sciences (2014) xxx, xxx–xxx
5.9 Distortion in Single-Ended Sampling Mixer 263
5.9 Distortion in Single-Ended Sampling Mixer 265
5.9 Distortion in Single-Ended Sampling Mixer 267
1
1
1
2
Neural Process Lett
Neural Process Lett
Learning to Rank with Extreme Learning Machine
Proceedings of the 2006 ANIPLA
Embedded Linux in a Partitioned
Setting Meaning Values
Downloaded from http://www.elearnica.ir
A Lightweight Online Approach to Protecting Kernel Hooks in Kernel
computers & security 31 (2012) 176e191
a b s t r a c t Kernel queue
a b s t r a c t Kernel queue
On p-Kernel Construction
The Interaction of
Analysis of Linux Scheduling with VAMPIR
Pattern Recognition Letters 34 (2013) 163–175
5
ffi rs.indd 01:50:14:PM 02/28/2014 Page ii ™
1
Linux Kernel Vulnerabilities: State-of-the-Art Defenses
Taxonomy of Linux Kernel Vulnerability Solutions
HIMA: A Hypervisor-Based Integrity Measurement
Journal of Hydrology 509 (2014) 282–294
Parallel Computing xxx (2014) xxx–xxx
Expert Systems with Applications 42 (2015) 4062–4080
Expert Systems with Applications 42 (2015) 4062–4080
LearningRandomKernelApproximationsforObjectRecognition
Scaling up Kernel SVM on Limited Resources:
Lossless Image Compression based on Kernel Least
ViPZonE:OS-LevelMemoryVariability-DrivenPhysical
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 414 #22
HAN 16-ch09-393-442-9780123814791 2011/6/1 3:22 Page 415 #23
Fourier Kernel Learning
Fourier Kernel Learning
2 Eduard Gabriel B az avan, Fuxin Li, and Cristian Sminchisescu
Fourier Kernel Learning 3
4 Eduard Gabriel B az avan, Fuxin Li, and Cristian Sminchisescu
Fourier Kernel Learning 5
Fourier Kernel Learning 7
8 Eduard Gabriel B az avan, Fuxin Li, and Cristian Sminchisescu
Fourier Kernel Learning 9
10 Eduard Gabriel B az avan, Fuxin Li, and Cristian Sminchisescu
Fourier Kernel Learning 11
12 Eduard Gabriel B az avan, Fuxin Li, and Cristian Sminchisescu
Fourier Kernel Learning
Scaling up Kernel SVM on Limited Resources:
AminiNasab2
IEEETRANSACTIONSONPATTERNANALYSISANDMACHINEINTELLIGENCE, VOL.37, NO.3, MARCH 2015 583
IEEETRANSACTIONSONPATTERNANALYSISANDMACHINEINTELLIGENCE, VOL.37, NO.3, MARCH 2015 583
Ambitious applications must fight OS
Ambitious applications must fight OS
J Intell Manuf
J Intell Manuf
Applied Soft Computing 18 (2014) 178–184
tcpcrypt
tcpcrypt
رمزنگاری شبکه کامپیوتر
Process Management a
2015 IEEE 29th International Parallel and Distributed Processing Symposium
The Design and Implementation of Open vSwitch 2 Design Constraints
Open
Multi-lingual opinion mining on YouTube
Multi-lingual opinion mining on YouTube
1 Cleaning and weighing While the usefulness of these operations
subgraph2vec: LearningDistributedRepresentationsof
subgraph2vec: LearningDistributedRepresentationsof
subgraph2vec: LearningDistributedRepresentationsof
908 CASE STUDY 2: WINDOWS 8 CHAP. 11
subgraph2vec: LearningDistributedRepresentationsof
subgraph2vec: LearningDistributedRepresentationsof
sensors
Undergraduate Topics in Computer Science
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
Downloaded from http://iranpaper.ir
2015 27th International Symposium on Computer Architecture and High Performance Computing
U n i t � 4 � � � P e r i p h e r a l s �
TheeXpressDataPath:FastProgrammablePacketProcessingin
CHAPTER 9
CHAPTER 9