Search alternatives:
method » methods (Expand Search)
Showing 1 - 20 results of 8,178 for search '(elective OR executive) method', query time: 0.14s Refine Results
  1. 1
  2. 2

    Election theory: Alternative voting methods in the Pennsylvania 2022 Senate election. by Justine Sullivan

    Published 2023-08-01
    “…This study utilizes a survey approach modeled after the ballots used in Pennsylvania’s 2022 Senate election in order to determine how voter support for each candidate may change as a result of non-plurality voting methods being used. …”
    Get full text
    Article
  3. 3
  4. 4

    Detecting Malicious .NET Executables Using Extracted Methods Names by Hamdan Thabit, Rami Ahmad, Ahmad Abdullah, Abedallah Zaid Abualkishik, Ali A. Alwan

    Published 2025-01-01
    “…The .NET framework is widely used for software development, making it a target for a significant number of malware attacks by developing malicious executables. Previous studies on malware detection often relied on developing generic detection methods for Windows malware that were not tailored to the unique characteristics of .NET executables. …”
    Get full text
    Article
  5. 5

    METHOD OF DISPLAYING AN EXECUTABLE BUSINESS PROCESS MODELS INTO PETRI NETS by Igor G. Fedorov

    Published 2016-08-01
    “…The aim is to study the methods of displaying an executable business process model in a Petri net. …”
    Get full text
    Article
  6. 6

    The role of project delivery methods on the execution of construction projects in Kenyan Judiciary by John Fredrick Okello, Omondi Bowa, Joash Migosi

    Published 2025-03-01
    Subjects: “…Key Word; Project delivery methods, execution of construction projects, Kenyan judiciary, time, cost, site disputes, quality, mixed-methods research.…”
    Get full text
    Article
  7. 7
  8. 8

    Security protocol code analysis method combining model learning and symbolic execution by Xieli ZHANG, Yuefei ZHU, Chunxiang GU, Xi CHEN

    Published 2021-10-01
    “…Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path constraints.According to the characteristics of security protocol program, a method to guide the symbolic execution of security protocol code by using protocol state machine information obtained from model learning was proposed.At the same time, by separating cryptographic logic from protocol interaction logic, the problem that path constraints cannot be solved caused by the complexity of cryptographic logic is avoided.The feasibility of the method is demonstrated by the practice on the SSH open source project Dropbear.Compared with Dropbear's test suite, the proposed method has advantages in code coverage and error point discovery.…”
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Local elections 2000: analyzing the results of the elections by Alvidas Lukošaitis

    Published 2000-04-01
    “…In the face of the upcoming Seimas elections, the results of the elections become the fact attracting special importance. …”
    Get full text
    Article
  12. 12

    Symbolic execution based control flow graph extraction method for Android native codes by Hui-ying YAN, Zhen-ji ZHOU, Li-fa WU, Zheng HONG, He SUN

    Published 2017-07-01
    “…A symbolic execution based method was proposed to automatically extract control flow graphs from native libraries of Android applications.The proposed method can provide execution environments for functions in native libraries,simulate JNI function call processes and solve symbols using constraint solver.A control flow graph extraction prototype system named CFGNative was implemented.The experiment results show that CFGNative can accurately distinguish all the JNI function calls and native methods of the representative example,and reach high code coverage within acceptable time.…”
    Get full text
    Article
  13. 13

    Method of Monitoring Correctness of Execution of Processes in Operating Systems by Control of Dimensional Systems of Variables by Vladimir Abramov, Danila Puchkin

    Published 2024-07-01
    “…Detection of disruptions by the method can be executed regardless of reasons of a process execution disruption. …”
    Get full text
    Article
  14. 14
  15. 15

    Game method to increase students' motivation to engage in elective disciplines in physical culture and sports by Inna N. Ovsyannikova, Konstantin G. Tomilin, Yulia A. Tumasyan, Yulia A. Vasilkovskaya, Ludmila V. Malygina

    Published 2021-06-01
    “…Purpose of the research: assessment of the effectiveness of the game method to increase the motivation of students to engage in elective disciplines in physical culture and sports. …”
    Get full text
    Article
  16. 16

    Stable federated learning method for low-altitude IoT networks based on election strategy by SHEN Lingfeng, WANG Guanghui, BAI Tianshui, ZHU Zhengyu, ZHANG Qiankun

    Published 2024-09-01
    “…An federated fearning based on proxy Raft election and weight calculation (FedREP-W) method was proposed, which combined classical Raft election and weight calculation, significantly improving the stability and efficiency of federated training. …”
    Get full text
    Article
  17. 17
  18. 18

    PERFORMANCE EVALUATION OF THE SCIENTIFIC-TECHNICAL PROJECT'S EXECUTIVE TEAM by A. V. Komarov, M. A. Slepcova, E. V.  Chechetkin, K. V. Shurtakov, M. V.  Tret'jakova

    Published 2018-01-01
    “…The article offers a method to evaluate the performance of executive managers teams involved in scientific-technical projects, which considers a range of factors allowing the team to reach applied targets. …”
    Get full text
    Article
  19. 19
  20. 20

    Executive Function in Young Children: Validation of the Preschool Executive Task Assessment by Yael Fogel, Ortal Cohen Elimelech, Naomi Josman

    Published 2025-05-01
    “…Methods: Thirty-six typically developing children participated. …”
    Get full text
    Article