Literatura académica sobre el tema "Proxys (logiciels)"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Proxys (logiciels)".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Proxys (logiciels)"
Merghit, Rachid, Mouloud Ait Athmane y Abdelhak Lakehal. "Weak diagnostic performance of resting ankle ABI compared with lower limb's arterial Doppler in the diagnosis of PAD in coronary patients: about a hospital serial study". Batna Journal of Medical Sciences (BJMS) 8, n.º 2 (28 de diciembre de 2021): 105–9. http://dx.doi.org/10.48087/bjmsoa.2021.8203.
Texto completoDieudonné, Awo A. "L’ENSEIGNEMENT DE L’HISTOIRE ÉCONOMIQUE ET SOCIALE AU DÉPARTEMENT D’HISTOIRE ET D’ARCHÉOLOGIE DE L’UNIVERSITÉ D’ABOMEY-CALAVI : ÉTAT DES LIEUX ET DÉFIS (1976-2021) / THE TEACHING OF ECONOMIC AND SOCIAL HISTORY IN THE DEPARTMENT OF HISTORY AND ARCHAEOLOGY OF ABOMEY-CALAVI UNIVERSITY: SITUATIONAL ANALYSIS AND CHALLENGES (1976-2021)". European Journal of Social Sciences Studies 7, n.º 4 (29 de abril de 2022). http://dx.doi.org/10.46827/ejsss.v7i4.1257.
Texto completoSilva, Christina y Ligia Elliot. "Avaliação da Hipermídia para Uso em Educação: uma Abordagem Alternativa". Revista Brasileira de Estudos Pedagógicos 78, n.º 188-89-90 (18 de junio de 2019). http://dx.doi.org/10.24109/2176-6681.rbep.78i188-89-90.1057.
Texto completoTesis sobre el tema "Proxys (logiciels)"
Chiapponi, Elisa. "Detecting and Mitigating the New Generation of Scraping Bots". Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS490.
Texto completoEvery day an invisible war for data takes place between e-commerce websites and web scrapers. E-commerce websites own the data at the heart of the conflict and would like to provide it only to genuine users. Web scrapers aim to have illimited and continuous access to the above-mentioned data to capitalize on it. To achieve this goal, scrapers send large amounts of requests to e-commerce websites, causing them financial problems. This led the security industry to engage in an arms race against scrapers to create better systems to detect and mitigate their requests. At present, the battle continues, but scrapers appear to have the upper hand, thanks to the usage of Residential IP Proxies (RESIPs). In this thesis, we aim to shift the balance by introducing novel detection and mitigation techniques that overcome the limitations of current state-of-the-art methods. We propose a deceptive mitigation technique that lures scrapers into believing they have obtained their target data while they receive modified information. We present two new detection techniques based on network measurements that identify scraping requests proxied through RESIPs. Thanks to an ongoing collaboration with Amadeus IT Group, we validate our results on real-world operational data. Being aware that scrapers will not stop looking for new ways to avoid detection and mitigation, this thesis provides additional contributions that can help in building the next defensive weapons for fighting scrapers. We propose a comprehensive characterization of RESIPs, the strongest weapon currently at the disposal of scrapers. Moreover, we investigate the possibility of acquiring threat intelligence on the scrapers by geolocating them when they send requests through a RESIP
Chicoulaa, Bruno. "Reflexion sur l'informatisation d'un service d'urgence : a propos d'un logiciel". Toulouse 3, 1994. http://www.theses.fr/1994TOU31030.
Texto completoBlanchard, Yann. "Le dossier résumé de séjour à l'hôpital général : à propos du logiciel RSSPLUS : première étape du système d'information médical des centres hospitaliers de Dax et de Bayonne". Bordeaux 2, 1989. http://www.theses.fr/1989BOR23044.
Texto completoGirka, Thibaut. "Differential program semantics". Thesis, Sorbonne Paris Cité, 2018. http://www.theses.fr/2018USPCC147/document.
Texto completoComputer programs are rarely written in one fell swoop. Instead, they are written in a series of incremental changes.It is also frequent for software to get updated after its initial release. Such changes can occur for various reasons, such as adding features, fixing bugs, or improving performances for instance. It is therefore important to be able to represent and reason about those changes, making sure that they indeed implement the intended modifications.In practice, program differences are very commonly represented as textual differences between a pair of source files, listing text lines that have been deleted, inserted or modified. This representation, while exact, does not address the semantic implications of those textual changes. Therefore, there is a need for better representations of the semantics of program differences.Our first contribution is an algorithm for the construction of a correlating program, that is, a program interleaving the instructions of two input programs in such a way that it simulates theirsemantics. Further static analysis can be performed on such correlating programs to compute an over-approximation of the semantic differences between the two input programs. This work draws direct inspiration from an article by Partush and Yahav, that describes a correlating program construction algorithm which we show to be unsound on loops that include `break` or `continue`statements. To guarantee its soundness, our alternative algorithm is formalized and mechanically checked within the Coq proof assistant.Our second and most important contribution is a formal framework allowing to precisely describe and formally verify semantic changes.This framework, fully formalized in Coq, represents the difference between two programs by a third program called an oracle.Unlike a correlating program, such an oracle is not required to interleave instructions of the programs under comparison, and may “skip” intermediate computation steps. In fact, such an oracle is typically written in a different programming language than the programs it relates, which allows designing correlating oracle languages specific to certain classes of program differences, andcapable of relating crashing programs with non-crashing ones.We design such oracle languages to cover a wide range of program differences on a toy imperative language. We also prove that our framework is at least as expressive as Relational Hoare Logic by encoding several variants as correlating oracle languages, proving their soundness in the process
Lardon, Jérémy. "Proxy d'interface Homme-Machine : apport des algorithmes génétiques pour l'adaptation automatique de la présentation de documents Web". Phd thesis, Université Jean Monnet - Saint-Etienne, 2010. http://tel.archives-ouvertes.fr/tel-00573036.
Texto completoNigron, Pierre. "Effectful programs and their proofs in type theory : application to certified compilation and certified packet processing". Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS480.
Texto completoOne way to reason about our programs is to write them directly into a proof assistant. Using the Curry-Howard correspondence, programs and proofs are then one. In order not to undermine the logical consistency of the proof assistant, the system is forced to restrict the programs to have no side effects. However, side effects are ubiquitous and essential in programming. Different techniques such as monads or algebraic effects have emerged to model them, thus offering a way to write imperative programs in purely functional languages. It is therefore quite natural that the results of decades of research invested in reasoning about imperative programs try to be adapted to reasoning about programs with effects. In this thesis, we are first interested in the use of separation logic to reason about programs with effects implemented in a proof assistant. We study an approach to describe the behaviour of effects using a predicate transformer. We focus first on freshness, then on packet processing and zero-copy. To study our approach, we rely on two concrete examples which are the SimplExpr module of CompCert and the decoder library Nom. Finally, in order to compile the packet parsers produced to C, we propose a refinement method removing the continuations introduced by the use of a free monad and performing some optimizations
Nguyen, Thi Minh Tuyen. "Taking architecture and compiler into account in formal proofs of numerical programs". Phd thesis, Université Paris Sud - Paris XI, 2012. http://tel.archives-ouvertes.fr/tel-00710193.
Texto completoDénès, Maxime. "Étude formelle d'algorithmes efficaces en algèbre linéaire". Phd thesis, Université Nice Sophia Antipolis, 2013. http://tel.archives-ouvertes.fr/tel-00945775.
Texto completoPerron, Sébastien. "Détection d'erreurs et confinement logiciel : une évaluation empirique". Thèse, 2021. http://depot-e.uqtr.ca/id/eprint/9664/1/eprint9664.pdf%20.pdf.
Texto completoLibros sobre el tema "Proxys (logiciels)"
Lohr, Steve y Joel Brinkley. U.S. v. Microsoft: The inside story of the landmark case. New York: McGraw-Hill, 2001.
Buscar texto completoSteve, Lohr, ed. U.S. v. Microsoft. New York: McGraw-Hill, 2001.
Buscar texto completoCode complete: A practical handbook of software construction. Redmond, Wash: Microsoft Press, 1993.
Buscar texto completoCode complete. 2a ed. Redmond, Wash: Microsoft Press, 2004.
Buscar texto completoCode complete. 2a ed. Redmond, Wash: Microsoft Press, 2004.
Buscar texto completoCode complete: [a practical handbook of software construction]. 2a ed. Redmond, Wash: Microsoft Press, 2004.
Buscar texto completoCode Complete, Second Edition. Redmond: Microsoft Press, 2007.
Buscar texto completoCode complete. Redmond, WA: Microsoft Press, 1993.
Buscar texto completoAuletta, Ken. World War 3.0: Microsoft and its enemies. New York: Random House, 2001.
Buscar texto completoAbrahamsson, Pekka y Jürgen Münch. Product-Focused Software Process Improvement: 8th International Conference, PROFES 2007, Riga, Latvia, July 2-4, 2007, Proceedings. Springer London, Limited, 2007.
Buscar texto completoCapítulos de libros sobre el tema "Proxys (logiciels)"
Khoury, Raphaël. "Avant-Propos". En La sécurité logicielle: une approche défensive, XIII—XVI. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.3.
Texto completoMignucci, Mario. "Expository Proofs In Aristotle’S Syllogistic". En Oxford Studies In Ancient Philosophy, 9–28. Oxford University PressOxford, 1991. http://dx.doi.org/10.1093/oso/9780198239659.003.0002.
Texto completoGrattan-Guinness, Ivor. "Turing’s mentor, Max Newman". En The Turing Guide. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198747826.003.0052.
Texto completoAmsler, Mark. "Margery Kempe’s Strategic Vague Language". En The Medieval Life of Language. Nieuwe Prinsengracht 89 1018 VR Amsterdam Nederland: Amsterdam University Press, 2021. http://dx.doi.org/10.5117/9789463721929_ch06.
Texto completoBalibar, Etienne. "What Is Man’ in Seventeenth-Century Philosophy? Subject, Individual, Citizen". En The Individual in Political Theory and Practice, 215–42. Oxford University PressOxford, 1996. http://dx.doi.org/10.1093/oso/9780198205494.003.0010.
Texto completoDummett, Michael. "Some Further Topics". En Elements of Intuitionism, 211–49. Oxford University PressOxford, 2000. http://dx.doi.org/10.1093/oso/9780198505242.003.0007.
Texto completoFeferman, Solomon. "What Does Logic Have to Tell Us about Mathematical Proofs?" En In The Light Of Logic, 177–86. Oxford University PressNew York, NY, 1998. http://dx.doi.org/10.1093/oso/9780195080308.003.0009.
Texto completoBarwise, Jon y John Etchemendy. "Visual Information and Valid Reasoning". En Logical Reasoning with Diagrams. Oxford University Press, 1996. http://dx.doi.org/10.1093/oso/9780195104271.003.0005.
Texto completoFisler, Kathi D. "Exploiting the Potential of Diagrams in Guiding Hardware Reasoning". En Logical Reasoning with Diagrams. Oxford University Press, 1996. http://dx.doi.org/10.1093/oso/9780195104271.003.0016.
Texto completoBarwise, Jon y John Etchemendy. "Heterogeneous Logic". En Logical Reasoning with Diagrams. Oxford University Press, 1996. http://dx.doi.org/10.1093/oso/9780195104271.003.0014.
Texto completoActas de conferencias sobre el tema "Proxys (logiciels)"
Costa Mendes, L. y A. G. Bodard. "Apport d’un logiciel de reconstruction 3D dans la prise en charge chirurgico-orthodontique de la dysplasie cléido-crânienne : à propos d’un cas clinique". En 63ème Congrès de la SFCO, editado por S. Boisramé, S. Cousty, J. C. Deschaumes, V. Descroix, L. Devoize, P. Lesclous, C. Mauprivez y T. Fortin. Les Ulis, France: EDP Sciences, 2015. http://dx.doi.org/10.1051/sfco/20156302002.
Texto completo