Gotowa bibliografia na temat „Proxys (logiciels)”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Proxys (logiciels)”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Proxys (logiciels)"
Merghit, Rachid, Mouloud Ait Athmane i Abdelhak Lakehal. "Weak diagnostic performance of resting ankle ABI compared with lower limb's arterial Doppler in the diagnosis of PAD in coronary patients: about a hospital serial study". Batna Journal of Medical Sciences (BJMS) 8, nr 2 (28.12.2021): 105–9. http://dx.doi.org/10.48087/bjmsoa.2021.8203.
Pełny tekst źródłaDieudonné, Awo A. "L’ENSEIGNEMENT DE L’HISTOIRE ÉCONOMIQUE ET SOCIALE AU DÉPARTEMENT D’HISTOIRE ET D’ARCHÉOLOGIE DE L’UNIVERSITÉ D’ABOMEY-CALAVI : ÉTAT DES LIEUX ET DÉFIS (1976-2021) / THE TEACHING OF ECONOMIC AND SOCIAL HISTORY IN THE DEPARTMENT OF HISTORY AND ARCHAEOLOGY OF ABOMEY-CALAVI UNIVERSITY: SITUATIONAL ANALYSIS AND CHALLENGES (1976-2021)". European Journal of Social Sciences Studies 7, nr 4 (29.04.2022). http://dx.doi.org/10.46827/ejsss.v7i4.1257.
Pełny tekst źródłaSilva, Christina, i Ligia Elliot. "Avaliação da Hipermídia para Uso em Educação: uma Abordagem Alternativa". Revista Brasileira de Estudos Pedagógicos 78, nr 188-89-90 (18.06.2019). http://dx.doi.org/10.24109/2176-6681.rbep.78i188-89-90.1057.
Pełny tekst źródłaRozprawy doktorskie na temat "Proxys (logiciels)"
Chiapponi, Elisa. "Detecting and Mitigating the New Generation of Scraping Bots". Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS490.
Pełny tekst źródłaEvery day an invisible war for data takes place between e-commerce websites and web scrapers. E-commerce websites own the data at the heart of the conflict and would like to provide it only to genuine users. Web scrapers aim to have illimited and continuous access to the above-mentioned data to capitalize on it. To achieve this goal, scrapers send large amounts of requests to e-commerce websites, causing them financial problems. This led the security industry to engage in an arms race against scrapers to create better systems to detect and mitigate their requests. At present, the battle continues, but scrapers appear to have the upper hand, thanks to the usage of Residential IP Proxies (RESIPs). In this thesis, we aim to shift the balance by introducing novel detection and mitigation techniques that overcome the limitations of current state-of-the-art methods. We propose a deceptive mitigation technique that lures scrapers into believing they have obtained their target data while they receive modified information. We present two new detection techniques based on network measurements that identify scraping requests proxied through RESIPs. Thanks to an ongoing collaboration with Amadeus IT Group, we validate our results on real-world operational data. Being aware that scrapers will not stop looking for new ways to avoid detection and mitigation, this thesis provides additional contributions that can help in building the next defensive weapons for fighting scrapers. We propose a comprehensive characterization of RESIPs, the strongest weapon currently at the disposal of scrapers. Moreover, we investigate the possibility of acquiring threat intelligence on the scrapers by geolocating them when they send requests through a RESIP
Chicoulaa, Bruno. "Reflexion sur l'informatisation d'un service d'urgence : a propos d'un logiciel". Toulouse 3, 1994. http://www.theses.fr/1994TOU31030.
Pełny tekst źródłaBlanchard, Yann. "Le dossier résumé de séjour à l'hôpital général : à propos du logiciel RSSPLUS : première étape du système d'information médical des centres hospitaliers de Dax et de Bayonne". Bordeaux 2, 1989. http://www.theses.fr/1989BOR23044.
Pełny tekst źródłaGirka, Thibaut. "Differential program semantics". Thesis, Sorbonne Paris Cité, 2018. http://www.theses.fr/2018USPCC147/document.
Pełny tekst źródłaComputer programs are rarely written in one fell swoop. Instead, they are written in a series of incremental changes.It is also frequent for software to get updated after its initial release. Such changes can occur for various reasons, such as adding features, fixing bugs, or improving performances for instance. It is therefore important to be able to represent and reason about those changes, making sure that they indeed implement the intended modifications.In practice, program differences are very commonly represented as textual differences between a pair of source files, listing text lines that have been deleted, inserted or modified. This representation, while exact, does not address the semantic implications of those textual changes. Therefore, there is a need for better representations of the semantics of program differences.Our first contribution is an algorithm for the construction of a correlating program, that is, a program interleaving the instructions of two input programs in such a way that it simulates theirsemantics. Further static analysis can be performed on such correlating programs to compute an over-approximation of the semantic differences between the two input programs. This work draws direct inspiration from an article by Partush and Yahav, that describes a correlating program construction algorithm which we show to be unsound on loops that include `break` or `continue`statements. To guarantee its soundness, our alternative algorithm is formalized and mechanically checked within the Coq proof assistant.Our second and most important contribution is a formal framework allowing to precisely describe and formally verify semantic changes.This framework, fully formalized in Coq, represents the difference between two programs by a third program called an oracle.Unlike a correlating program, such an oracle is not required to interleave instructions of the programs under comparison, and may “skip” intermediate computation steps. In fact, such an oracle is typically written in a different programming language than the programs it relates, which allows designing correlating oracle languages specific to certain classes of program differences, andcapable of relating crashing programs with non-crashing ones.We design such oracle languages to cover a wide range of program differences on a toy imperative language. We also prove that our framework is at least as expressive as Relational Hoare Logic by encoding several variants as correlating oracle languages, proving their soundness in the process
Lardon, Jérémy. "Proxy d'interface Homme-Machine : apport des algorithmes génétiques pour l'adaptation automatique de la présentation de documents Web". Phd thesis, Université Jean Monnet - Saint-Etienne, 2010. http://tel.archives-ouvertes.fr/tel-00573036.
Pełny tekst źródłaNigron, Pierre. "Effectful programs and their proofs in type theory : application to certified compilation and certified packet processing". Electronic Thesis or Diss., Sorbonne université, 2022. http://www.theses.fr/2022SORUS480.
Pełny tekst źródłaOne way to reason about our programs is to write them directly into a proof assistant. Using the Curry-Howard correspondence, programs and proofs are then one. In order not to undermine the logical consistency of the proof assistant, the system is forced to restrict the programs to have no side effects. However, side effects are ubiquitous and essential in programming. Different techniques such as monads or algebraic effects have emerged to model them, thus offering a way to write imperative programs in purely functional languages. It is therefore quite natural that the results of decades of research invested in reasoning about imperative programs try to be adapted to reasoning about programs with effects. In this thesis, we are first interested in the use of separation logic to reason about programs with effects implemented in a proof assistant. We study an approach to describe the behaviour of effects using a predicate transformer. We focus first on freshness, then on packet processing and zero-copy. To study our approach, we rely on two concrete examples which are the SimplExpr module of CompCert and the decoder library Nom. Finally, in order to compile the packet parsers produced to C, we propose a refinement method removing the continuations introduced by the use of a free monad and performing some optimizations
Nguyen, Thi Minh Tuyen. "Taking architecture and compiler into account in formal proofs of numerical programs". Phd thesis, Université Paris Sud - Paris XI, 2012. http://tel.archives-ouvertes.fr/tel-00710193.
Pełny tekst źródłaDénès, Maxime. "Étude formelle d'algorithmes efficaces en algèbre linéaire". Phd thesis, Université Nice Sophia Antipolis, 2013. http://tel.archives-ouvertes.fr/tel-00945775.
Pełny tekst źródłaPerron, Sébastien. "Détection d'erreurs et confinement logiciel : une évaluation empirique". Thèse, 2021. http://depot-e.uqtr.ca/id/eprint/9664/1/eprint9664.pdf%20.pdf.
Pełny tekst źródłaKsiążki na temat "Proxys (logiciels)"
Lohr, Steve, i Joel Brinkley. U.S. v. Microsoft: The inside story of the landmark case. New York: McGraw-Hill, 2001.
Znajdź pełny tekst źródłaSteve, Lohr, red. U.S. v. Microsoft. New York: McGraw-Hill, 2001.
Znajdź pełny tekst źródłaCode complete: A practical handbook of software construction. Redmond, Wash: Microsoft Press, 1993.
Znajdź pełny tekst źródłaCode complete. Wyd. 2. Redmond, Wash: Microsoft Press, 2004.
Znajdź pełny tekst źródłaCode complete. Wyd. 2. Redmond, Wash: Microsoft Press, 2004.
Znajdź pełny tekst źródłaCode complete: [a practical handbook of software construction]. Wyd. 2. Redmond, Wash: Microsoft Press, 2004.
Znajdź pełny tekst źródłaCode Complete, Second Edition. Redmond: Microsoft Press, 2007.
Znajdź pełny tekst źródłaCode complete. Redmond, WA: Microsoft Press, 1993.
Znajdź pełny tekst źródłaAuletta, Ken. World War 3.0: Microsoft and its enemies. New York: Random House, 2001.
Znajdź pełny tekst źródłaAbrahamsson, Pekka, i Jürgen Münch. Product-Focused Software Process Improvement: 8th International Conference, PROFES 2007, Riga, Latvia, July 2-4, 2007, Proceedings. Springer London, Limited, 2007.
Znajdź pełny tekst źródłaCzęści książek na temat "Proxys (logiciels)"
Khoury, Raphaël. "Avant-Propos". W La sécurité logicielle: une approche défensive, XIII—XVI. Presses de l'Université Laval, 2021. http://dx.doi.org/10.2307/j.ctv1qp9gsh.3.
Pełny tekst źródłaMignucci, Mario. "Expository Proofs In Aristotle’S Syllogistic". W Oxford Studies In Ancient Philosophy, 9–28. Oxford University PressOxford, 1991. http://dx.doi.org/10.1093/oso/9780198239659.003.0002.
Pełny tekst źródłaGrattan-Guinness, Ivor. "Turing’s mentor, Max Newman". W The Turing Guide. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198747826.003.0052.
Pełny tekst źródłaAmsler, Mark. "Margery Kempe’s Strategic Vague Language". W The Medieval Life of Language. Nieuwe Prinsengracht 89 1018 VR Amsterdam Nederland: Amsterdam University Press, 2021. http://dx.doi.org/10.5117/9789463721929_ch06.
Pełny tekst źródłaBalibar, Etienne. "What Is Man’ in Seventeenth-Century Philosophy? Subject, Individual, Citizen". W The Individual in Political Theory and Practice, 215–42. Oxford University PressOxford, 1996. http://dx.doi.org/10.1093/oso/9780198205494.003.0010.
Pełny tekst źródłaDummett, Michael. "Some Further Topics". W Elements of Intuitionism, 211–49. Oxford University PressOxford, 2000. http://dx.doi.org/10.1093/oso/9780198505242.003.0007.
Pełny tekst źródłaFeferman, Solomon. "What Does Logic Have to Tell Us about Mathematical Proofs?" W In The Light Of Logic, 177–86. Oxford University PressNew York, NY, 1998. http://dx.doi.org/10.1093/oso/9780195080308.003.0009.
Pełny tekst źródłaBarwise, Jon, i John Etchemendy. "Visual Information and Valid Reasoning". W Logical Reasoning with Diagrams. Oxford University Press, 1996. http://dx.doi.org/10.1093/oso/9780195104271.003.0005.
Pełny tekst źródłaFisler, Kathi D. "Exploiting the Potential of Diagrams in Guiding Hardware Reasoning". W Logical Reasoning with Diagrams. Oxford University Press, 1996. http://dx.doi.org/10.1093/oso/9780195104271.003.0016.
Pełny tekst źródłaBarwise, Jon, i John Etchemendy. "Heterogeneous Logic". W Logical Reasoning with Diagrams. Oxford University Press, 1996. http://dx.doi.org/10.1093/oso/9780195104271.003.0014.
Pełny tekst źródłaStreszczenia konferencji na temat "Proxys (logiciels)"
Costa Mendes, L., i A. G. Bodard. "Apport d’un logiciel de reconstruction 3D dans la prise en charge chirurgico-orthodontique de la dysplasie cléido-crânienne : à propos d’un cas clinique". W 63ème Congrès de la SFCO, redaktorzy S. Boisramé, S. Cousty, J. C. Deschaumes, V. Descroix, L. Devoize, P. Lesclous, C. Mauprivez i T. Fortin. Les Ulis, France: EDP Sciences, 2015. http://dx.doi.org/10.1051/sfco/20156302002.
Pełny tekst źródła