肉身 发表于 2025-3-28 15:56:15

String-based Malware Detection for Android Environmentsmportant threat to users sensitive data, compromising more devices everyday. The commercial solutions that aims to fight against this malware are based on signature methodologies whose detection ratio is low. Furthermore, these engines can be easily defeated by obfuscation techniques, which are extr

姑姑在炫耀 发表于 2025-3-28 19:00:17

Optimal Configuration Model of a Fleet of Unmanned Vehicles for Interoperable Missionse inventory of their applications with operational and logistical challenges. Comparing different types of missions, a multi-vehicle approach is able to guarantee better performances and minimum costs, as long as they are coordinated. Thus, the problem to guarantee the better platform configuration

bile648 发表于 2025-3-28 22:54:19

http://reply.papertrans.cn/47/4697/469644/469644_43.png

Morose 发表于 2025-3-29 03:40:28

http://reply.papertrans.cn/47/4697/469644/469644_44.png

闪光东本 发表于 2025-3-29 08:02:56

http://reply.papertrans.cn/47/4697/469644/469644_45.png

deactivate 发表于 2025-3-29 13:22:59

http://reply.papertrans.cn/47/4697/469644/469644_46.png

Customary 发表于 2025-3-29 19:23:42

http://reply.papertrans.cn/47/4697/469644/469644_47.png

极小量 发表于 2025-3-29 23:24:31

http://reply.papertrans.cn/47/4697/469644/469644_48.png

假装是我 发表于 2025-3-30 03:40:51

http://reply.papertrans.cn/47/4697/469644/469644_49.png

赞成你 发表于 2025-3-30 05:57:11

Simulation of Dynamic Systems Using BDI Agents: Initial Steps into a number of interacting components. Each component is then mapped to a BDI agent that captures its behavioral aspects. The system model is described as a multi-agent program that is specified using the Jason agent-oriented programming language.
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Intelligent Distributed Computing X; Proceedings of the 1 Costin Badica,Amal El Fallah Seghrouchni,Paulo Nov Conference proceedings 2017 Sp