Zobrazeno 1 - 10
of 968
pro vyhledávání: '"Citó A"'
Autor:
Farias HLS, Pequeno PACL, Silva WR, Melo VF, Carvalho LCDS, Perdiz RDO, Citó AC, Fearnside PM, Barbosa RI
Publikováno v:
iForest - Biogeosciences and Forestry, Vol 16, Iss 1, Pp 95-104 (2023)
Wood density (WD) is an important functional trait of tree species. Understanding spatial WD variability as a function of environmental determinants improves our ability to estimate carbon stocks in the woody biomass of tropical forests. However, the
Externí odkaz:
https://doaj.org/article/44261ebdd34b496aa91bc4efc647cf78
Autor:
Happe, Andreas, Cito, Jürgen
Linux systems are integral to the infrastructure of modern computing environments, necessitating robust security measures to prevent unauthorized access. Privilege escalation attacks represent a significant threat, typically allowing attackers to ele
Externí odkaz:
http://arxiv.org/abs/2405.02106
Infrastructure as Code (IaC) has enabled cloud customers to have more agility in creating and modifying complex deployments of cloud-provisioned resources. By writing a configuration in IaC languages such as CloudFormation, users can declaratively sp
Externí odkaz:
http://arxiv.org/abs/2402.15632
Autor:
Cito, Simone, Giacomini, Alessandro
In this paper we address the problem of the minimization of the $k$-th Robin eigenvalue $\lambda_{k,\beta}$ with parameter $\beta>0$ among bounded open Lipschitz sets with prescribed perimeter. The perimeter constraint allows us to naturally generali
Externí odkaz:
http://arxiv.org/abs/2312.16597
We prove a quantitative version of the Gaussian Faber-Krahn type inequality proved by Betta, Chiacchio and Ferone for the first Dirichlet eigenvalue of the Ornstein-Uhlenbeck operator, estimating the deficit in terms of the Gaussian Fraenkel asymmetr
Externí odkaz:
http://arxiv.org/abs/2312.05146
Penetration testing, an essential component of software security testing, allows organizations to identify and remediate vulnerabilities in their systems, thus bolstering their defense mechanisms against cyberattacks. One recent advancement in the re
Externí odkaz:
http://arxiv.org/abs/2310.11409
Autor:
Happe, Andreas, Cito, Jürgen
Offensive security-tests are a common way to pro-actively discover potential vulnerabilities. They are performed by specialists, often called penetration-testers or white-hat hackers. The chronic lack of available white-hat hackers prevents sufficien
Externí odkaz:
http://arxiv.org/abs/2308.07057
Autor:
Happe, Andreas, Cito, Jürgen
The field of software security testing, more specifically penetration testing, is an activity that requires high levels of expertise and involves many manual testing and analysis steps. This paper explores the potential usage of large-language models
Externí odkaz:
http://arxiv.org/abs/2308.00121
We look for minimizers of the buckling load problem with perimeter constraint in any dimension. In dimension 2, we show that the minimizing plates are convex; in higher dimension, by passing through a weaker formulation of the problem, we show that a
Externí odkaz:
http://arxiv.org/abs/2307.02856
Background: Ad hoc parsers are pieces of code that use common string functions like split, trim, or slice to effectively perform parsing. Whether it is handling command-line arguments, reading configuration files, parsing custom file formats, or any
Externí odkaz:
http://arxiv.org/abs/2304.09733