Zobrazeno 1 - 10
of 4 341
pro vyhledávání: '"Run Time"'
Autor:
JERO, SAMUEL1 samuel.jero@ll.mit.edu, BUROW, NATHAN1 nathan.burow@ll.mit.edu, WARD, BRYAN1 bryan.ward@ll.mit.edu, SKOWYRA, RICHARD1 richard.skowyra@ll.mit.edu, KHAZAN, ROGER1 rkh@ll.mit.edu, SHROBE, HOWARD2 hes@csail.mit.edu, OKHRAVI, HAMED3 hamed.okhravi@ll.mit.edu
Publikováno v:
ACM Computing Surveys. Jul2023, Vol. 55 Issue 6, p1-34. 34p.
Publikováno v:
Journal of Algebraic Statistics. 2022, Vol. 13 Issue 2, p2879-2889. 11p.
Publikováno v:
Journal of the ACM. Apr2015, Vol. 62 Issue 2, p15-45. 45p.
Autor:
Ballard, Grey1 (AUTHOR) ballard@eecs.berkeley.edu, Demmel, James2 (AUTHOR) demmel@cs.berkeley.edu, Holtz, Olga3 (AUTHOR) holtz@math.berkeley.edu, Schwartz, Oded1 (AUTHOR) odedsc@eecs.berkeley.edu
Publikováno v:
Communications of the ACM. Feb2014, Vol. 57 Issue 2, p107-114. 8p. 5 Diagrams, 2 Charts, 2 Graphs.
Autor:
Hili, Nicolas1 (AUTHOR) hili@cs.queensu.ca, Bagherzadeh, Mojtaba1 (AUTHOR), Jahed, Karim1 (AUTHOR), Dingel, Juergen1 (AUTHOR)
Publikováno v:
Software & Systems Modeling. Jul2020, Vol. 19 Issue 4, p959-981. 23p.
Autor:
Chisnall, David1 (AUTHOR)
Publikováno v:
Communications of the ACM. Sep2012, Vol. 55 Issue 9, p44-47. 4p. 1 Color Photograph.
Publikováno v:
网络与信息安全学报, Vol 10, Pp 154-164 (2024)
The discovery of deserialization vulnerabilities has garnered significant attention from cybersecurity researchers, with an increasing number of vulnerabilities being uncovered, posing severe threats to enterprise network security. The Java language'
Externí odkaz:
https://doaj.org/article/650528a0ddff4ffeb578311d9aed95a1
Publikováno v:
网络与信息安全学报, Vol 10, Iss 2, Pp 154-164 (2024)
The discovery of deserialization vulnerabilities has garnered significant attention from cybersecurity researchers, with an increasing number of vulnerabilities being uncovered, posing severe threats to enterprise network security. The Java language'
Externí odkaz:
https://doaj.org/article/877e1b3043104cc9b576dc94336c1e86
Autor:
Dokulil, Jiri1
Publikováno v:
Journal of Supercomputing. May2019, Vol. 75 Issue 5, p2725-2760. 36p.
Publikováno v:
ACM Transactions on Autonomous & Adaptive Systems; Mar2024, Vol. 19 Issue 1, p1-25, 25p