•  English
    • Persian
    • English
  •   Login
  • Ferdowsi University of Mashhad
  • |
  • Information Center and Central Library
    • Persian
    • English
  • Home
  • Source Types
    • Journal Paper
    • Ebook
    • Conference Paper
    • Standard
    • Protocol
    • Thesis
  • Use Help
Search 
  •   FUM Digital Library
  • Search
  •   FUM Digital Library
  • Search
  • All Fields
  • Title
  • Author
  • Year
  • Publisher
  • Subject
  • Publication Title
  • ISSN
  • DOI
  • ISBN
Advanced Search
JavaScript is disabled for your browser. Some features of this site may not work without it.

Search

Show Advanced FiltersHide Advanced Filters

Filters

Use filters to refine the search results.

Now showing items 1-10 of 88

    • Relevance
    • Title Asc
    • Title Desc
    • Year Asc
    • Year Desc
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
  • Export
    • CSV
    • RIS
    • Sort Options:
    • Relevance
    • Title Asc
    • Title Desc
    • Issue Date Asc
    • Issue Date Desc
    • Results Per Page:
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100

    Towards a Framework to Detect Multi-stage Advanced Persistent Threats Attacks 

    Type: Conference Paper
    Author : Bhatt, P. , Toshiro Yano, E. , Gustavsson, P.M.
    Publisher: IEEE
    Year: 2014

    Micro simulation of vehicle conflicts involving right turn vehicles at signalized intersections based on cellular automata 

    Type: Journal Paper
    Author : Chai, C. - Wong, Y.D.
    Publisher: Elsevier Science
    Year: 2014

    An Improved Max-Min Task-Scheduling Algorithm for Elastic Cloud 

    Type: Conference Paper
    Publisher: IEEE
    Year: 2014

    A Hybrid Distributed Mutual Exclusion Algorithm 

    Type: Conference Paper
    Author : صمد پایدار; محمود نقیب زاده; ابوالفضل یاوری خلیل آباد; Samad Paydar; Mahmoud Naghibzadeh; Abulfazl Yavari Khalilabad
    Year: 2006
    Abstract:

    and it involves passing many messages. The two major types of these algorithms are token-based and permission-based algorithms. In this research, we propose a hybrid distributed mutual exclusion algorithm. By Hybrid, we mean that the algorithm uses both token...

    Android malware detection based on overlapping of static features 

    Type: Conference Paper
    Author : مریم نژادکمالی راوری; سمیه سلطانی; سیدامین حسینی سنو; Maryam NezhadKamali; somayeh soltani; Seyed Amin Hosseini Seno
    Year: 2017
    Abstract:

    in the literature, most of which are based on permissions. However, the permission-based methods are usually subverted by some bypass techniques such as over-claim of permissions, permission escalation attack, and zero permission attack. In this paper, an Android...

    Application of contract-based verification techniques for hybrid automata to surgical robotic systems 

    Type: Conference Paper
    Publisher: IEEE
    Year: 2014

    100+ Times Faster Weighted Median Filter (WMF) 

    Type: Conference Paper
    Author : Zhang, Qi , Xu, Li , Jia, Jiaya
    Publisher: IEEE
    Year: 2014

    Genome wide association studies based on integrated dataset — Hirschsprung disease as a model 

    Type: Conference Paper
    Author : Xiao Wang; Qinke Peng; Xiao Chen
    Publisher: IEEE
    Year: 2014

    Insect cell culture: Virus replication and applications in biotechnology 

    Type: Journal Paper
    Author : Arif, Basil - Pavlik, Lillian
    Publisher: Elsevier Science
    Year: 2013

    Severing reservations 

    Type: Journal Paper
    Author : Mccall
    Publisher: Cambridge University Press
    Year: 2014
    • 1
    • 2
    • 3
    • 4
    • . . .
    • 9

    Author

    ... View More

    Publisher

    Year

    Keywords

    ... View More

    Type

    Language (ISO)

    Content Type

    Publication Title

    ... View More
    • About Us
    نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
    DSpace software copyright © 2019-2022  DuraSpace