共 50 条
- [31] Run-time security evaluation (RTSE) for distributed applications [J]. 1996 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 1996, : 222 - 232
- [32] A Run-Time Power Manager Exploiting Software Parallelism [J]. PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON PARALLEL ARCHITECTURES AND COMPILATION TECHNIQUES (PACT'14), 2014, : 471 - 472
- [33] RUN-TIME REVERSE ENGINEERING SPEEDS SOFTWARE TROUBLESHOOTING [J]. HIGH PERFORMANCE SYSTEMS-THE MAGAZINE FOR TECHNOLOGY CHAMPIONS, 1989, 10 (11): : 41 - &
- [34] Run-time Selection of Security Algorithms For Networked Devices [J]. Q2SWINET09: PROCEEDING OF THE FIFTH ACM INTERNATIONAL SYMPOSIUM ON QOS AND SECURITY FOR WIRELESS AND MOBILE NETWORKS, 2009, : 92 - 96
- [35] Analysis and run-time verification of dynamic security policies [J]. DEFENCE APPLICATIONS OF MULTI-AGENT SYSTEMS, 2006, 3890 : 92 - 103
- [36] SOFTWARE BASED METHODS TO HARDEN EMBEDDED SOFTWARE AT RUN-TIME: A SURVEY [J]. INTERNATIONAL DESIGN ENGINEERING TECHNICAL CONFERENCES AND COMPUTERS AND INFORMATION IN ENGINEERING CONFERENCE, 2015, VOL 9, 2016,
- [37] ANALYSIS OF FUNCTIONAL PROGRAMS TO DETECT RUN-TIME GARBAGE CELLS [J]. ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1988, 10 (04): : 555 - 578
- [39] Improving compiler and run-time support for irregular reductions using local writes [J]. LANGUAGES AND COMPILERS FOR PARALLEL COMPUTING, 1999, 1656 : 181 - 196