Search alternatives:
method » methods (Expand Search)
Showing 1 - 20 results of 5,785 for search 'executive method', query time: 0.12s Refine Results
  1. 1
  2. 2

    Detecting Malicious .NET Executables Using Extracted Methods Names by Hamdan Thabit, Rami Ahmad, Ahmad Abdullah, Abedallah Zaid Abualkishik, Ali A. Alwan

    Published 2025-01-01
    “…The .NET framework is widely used for software development, making it a target for a significant number of malware attacks by developing malicious executables. Previous studies on malware detection often relied on developing generic detection methods for Windows malware that were not tailored to the unique characteristics of .NET executables. …”
    Get full text
    Article
  3. 3

    METHOD OF DISPLAYING AN EXECUTABLE BUSINESS PROCESS MODELS INTO PETRI NETS by Igor G. Fedorov

    Published 2016-08-01
    “…The aim is to study the methods of displaying an executable business process model in a Petri net. …”
    Get full text
    Article
  4. 4

    The role of project delivery methods on the execution of construction projects in Kenyan Judiciary by John Fredrick Okello, Omondi Bowa, Joash Migosi

    Published 2025-03-01
    Subjects: “…Key Word; Project delivery methods, execution of construction projects, Kenyan judiciary, time, cost, site disputes, quality, mixed-methods research.…”
    Get full text
    Article
  5. 5
  6. 6

    Security protocol code analysis method combining model learning and symbolic execution by Xieli ZHANG, Yuefei ZHU, Chunxiang GU, Xi CHEN

    Published 2021-10-01
    “…Symbolic execution can comprehensively analyze program execution space in theory, but it is not feasible in practice for large programs like security protocols, due to the explosion of path space and the limitation of difficulty in solving path constraints.According to the characteristics of security protocol program, a method to guide the symbolic execution of security protocol code by using protocol state machine information obtained from model learning was proposed.At the same time, by separating cryptographic logic from protocol interaction logic, the problem that path constraints cannot be solved caused by the complexity of cryptographic logic is avoided.The feasibility of the method is demonstrated by the practice on the SSH open source project Dropbear.Compared with Dropbear's test suite, the proposed method has advantages in code coverage and error point discovery.…”
    Get full text
    Article
  7. 7
  8. 8

    Symbolic execution based control flow graph extraction method for Android native codes by Hui-ying YAN, Zhen-ji ZHOU, Li-fa WU, Zheng HONG, He SUN

    Published 2017-07-01
    “…A symbolic execution based method was proposed to automatically extract control flow graphs from native libraries of Android applications.The proposed method can provide execution environments for functions in native libraries,simulate JNI function call processes and solve symbols using constraint solver.A control flow graph extraction prototype system named CFGNative was implemented.The experiment results show that CFGNative can accurately distinguish all the JNI function calls and native methods of the representative example,and reach high code coverage within acceptable time.…”
    Get full text
    Article
  9. 9

    Method of Monitoring Correctness of Execution of Processes in Operating Systems by Control of Dimensional Systems of Variables by Vladimir Abramov, Danila Puchkin

    Published 2024-07-01
    “…Detection of disruptions by the method can be executed regardless of reasons of a process execution disruption. …”
    Get full text
    Article
  10. 10
  11. 11

    PERFORMANCE EVALUATION OF THE SCIENTIFIC-TECHNICAL PROJECT'S EXECUTIVE TEAM by A. V. Komarov, M. A. Slepcova, E. V.  Chechetkin, K. V. Shurtakov, M. V.  Tret'jakova

    Published 2018-01-01
    “…The article offers a method to evaluate the performance of executive managers teams involved in scientific-technical projects, which considers a range of factors allowing the team to reach applied targets. …”
    Get full text
    Article
  12. 12
  13. 13

    Executive Function in Young Children: Validation of the Preschool Executive Task Assessment by Yael Fogel, Ortal Cohen Elimelech, Naomi Josman

    Published 2025-05-01
    “…Methods: Thirty-six typically developing children participated. …”
    Get full text
    Article
  14. 14

    A poem (A Message on the Night of Execution) by Hashem Al-Rifai, a critical psychological study by Ihsan Burhanuldeen Ameen

    Published 2023-10-01
    “… For the poet Hashem Al-RifaiThis research deals with the analysis of the poem "A Message on the Night of Execution" by the Egyptian poet Hashem Al-Rifai according to the psychological method. …”
    Get full text
    Article
  15. 15

    RISK ASSESSMENT FOR VIOLATION OF ANTI-TRUST LEGISLATION BY STATE EXECUTIVE AUTHORITIES by A. B. Androsova, O. N. Orlova, S. D. Furta

    Published 2021-05-01
    “…The authors expound a well-known instrument based on the bow-tie diagram construction which successfully helps to develop effective measures to prevent violation of anti-trust legislation cases by state executive authorities. They also give some numeric results of statistical modelling of anti-trust legislation violation risks by state executive authorities by means of the Monte-Carlo method.…”
    Get full text
    Article
  16. 16

    Executive functioning in children with ADHD Investigating the cross-method correlations between performance tests and rating scales by Olsen Kristoffer Dalsgaard, Sukhodolsky Denis, Bikic Aida

    Published 2024-04-01
    “…Replicated evidence shows a weak or non-significant correlation between different methods of evaluating executive functions (EF). The current study investigates the association between rating scales and cognitive tests of EF in a sample of children with ADHD and executive dysfunction.…”
    Get full text
    Article
  17. 17

    Sources of Uncertainty in Bender Element Testing: Execution and Interpretation Challenges in Reconstituted Sandy Soils by António M. G. Pedro, Paulino Dias Santos, Luís Araújo Santos, Paulo Coelho

    Published 2025-06-01
    “…Particular emphasis is placed on the control of relative density and sample saturation during preparation, as well as on factors affecting signal quality and time lag of the system during test execution. The interpretation of the results is analyzed with respect to the limitations of currently employed methods. …”
    Get full text
    Article
  18. 18

    Machine Learning and Reverse Methods for a Deeper Understanding of Public Roadway Improvement Action Impacts during Execution by Sohrab Mamdoohi, Elise Miller-Hooks

    Published 2022-01-01
    “…The execution of public roadway maintenance, rehabilitation, and restoration activities disturb normal traffic flows, resulting in roadway capacity reduction, inducing travel time delays, and promoting traffic safety concerns. …”
    Get full text
    Article
  19. 19

    The Jurisprudential - Legal Analysis of Speeding up in the Execution of a Civil Judgment with Emphasizing on the Provisional Execution by Amir Entezari, Rasoul Maghsoudpour, Sayyed Muhsen Husseini Pouya, Ahmad Taji

    Published 2021-09-01
    “…In this paper with analytic-descriptive method, firstly speeding up in the execution of judgments has been pronounced then according to its importance, the provisional execution has been surveyed. …”
    Get full text
    Article
  20. 20

    Executive functions in children with dyslexia by Thais Barbosa, Camila Cruz Rodrigues, Claudia Berlim de Mello, Mariana Cristina de Souza e Silva, Orlando Francisco Amodeo Bueno

    Published 2019-05-01
    “…ABSTRACT This study aimed to verify whether children with dyslexia have difficulties in executive functions (shifting, working memory, inhibition). …”
    Get full text
    Article