Showing 61 - 80 results of 3,373 for search '"executed"', query time: 0.05s Refine Results
  1. 61
  2. 62

    CHALLENGES FACING CONTRACTORS IN THE EXECUTION OF PUBLIC BUILDING PROJECTS AND THEIR IMPACT ON PERFORMANCE by Emmanuel Omopariola, Jacob Olusegun Ilori, Abimbola Olukemi Windapo

    Published 2020-01-01
    “…  In the Nigerian construction industry, many challenges are being faced by the contractors in the execution of public building projects; these challenges have not been investigated properly and their impacts on cost, time, quality and client satisfaction have not been thouroughly examined. …”
    Get full text
    Article
  3. 63

    Russian Law-Making (on the Example of the Federal Executive Authority): Ethical Aspect by K. S. Litovko

    Published 2024-07-01
    “…The purpose of the work was to analyze the modern process of law-making in Russia on the example of the federal executive authority, taking into account ethical aspects. …”
    Get full text
    Article
  4. 64
  5. 65
  6. 66

    OPTIMIZATION OF AGGREGATION AND SEQUENTIAL-PARALLEL EXECUTION MODES OF INTERSECTING OPERATION SETS by G. М. Levin, B. М. Rozin, A. B. Dolgui

    Published 2016-10-01
    “…A mathematical model and a method for the problem of optimization of aggregation and of sequential- parallel execution modes of intersecting operation sets are proposed. …”
    Get full text
    Article
  7. 67

    Associations between Prospective Memory, Executive Function and Physical Activity in Schoolchildren by Anouk Irina Glättli, Markus Gerber, Sebastian Ludyga

    Published 2025-01-01
    “…Thus, this study aimed to investigate associations between prospective memory, executive functions, and physical activity in schoolchildren. …”
    Get full text
    Article
  8. 68
  9. 69
  10. 70

    Security capability analysis of software-based heterogeneous redundant execution system by Bolin MA, Zheng ZHANG, Quan REN, Gaofei ZHANG, Jiangxing WU

    Published 2021-09-01
    Subjects: “…software-based heterogeneous redundant execution…”
    Get full text
    Article
  11. 71
  12. 72
  13. 73

    Evading Antivirus Detection Using Fountain Code-Based Techniques for Executing Shellcodes by Gang-Cheng Huang, Ko-Chin Chang, Tai-Hung Lai

    Published 2025-01-01
    “…This obfuscation approach maintains the shellcode’s integrity, ensuring correct code execution. However, in the persistence phase of the penetration testing process, this method offers an additional means of evading antivirus techniques.…”
    Get full text
    Article
  14. 74
  15. 75
  16. 76
  17. 77
  18. 78
  19. 79
  20. 80

    A Toolchain for Assisting Migration of Software Executables Towards Post-Quantum Cryptography by Norrathep Rattanavipanon, Jakapan Suaboot, Warodom Werapun

    Published 2025-01-01
    “…However, there is a lack of (semi-)automatic tools to support this transition, particularly for software deployed as binary executables. To address this gap, in this work, we first propose a set of requirements necessary for this type of tool to detect quantum-vulnerable software executables. …”
    Get full text
    Article