ESET researchers discovered a China-aligned APT group, LongNosedGoblin, which uses Group Policy to deploy cyberespionage ...
Ask the publishers to restore access to 500,000+ books. An icon used to represent a menu that can be toggled by interacting with this icon. A line drawing of the Internet Archive headquarters building ...
Abstract: Genetic programming (GP) and fuzzy logic are used to automatically segment mammography images. GP allows the evolution of optimized segmentation models, guided by a fuzzy logic-based fitness ...
jsh, pronounced "j shell", is a small JavaScript library (~20KB and no dependencies!) that provides helper aliases and functions that are similar to Bash syntax, allowing you to write shell scripts in ...
$ uname -a Linux pop-os 5.17.5-76051705-generic #202204271406~1651504840~22.04~63e51bd SMP PREEMPT Mon May 2 15: x86_64 x86_64 x86_64 GNU/Linux $ ldd --version ldd (Ubuntu GLIBC 2.35-0ubuntu3) 2.35 $ ...
Abstract: We study the stability of an equilibrium of arbitrarily switched, autonomous, continuous-time systems through the computation of a common Lyapunov function (CLF). The switching occurs ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results