Machine code

Results: 1169



#Item
291Film editing / Film making / Film production / G-code / Film / Visual arts / Film crew

Operating Procedure Guillotine This machine can only be operated by a trained and authorised employee of the company. Equipment must NOT be altered or modified without authorisation.

Add to Reading List

Source URL: www.atep.org.au

Language: English - Date: 2015-05-10 21:37:54
292Technology / Washing machine / Agitator / Hand washing / American Association of Textile Chemists and Colorists / Clothes dryer / Washing / G-code / Home / Laundry / Home appliances

AATCC Monograph M6 July 31, 2013 Standardization of Home Laundry Test Conditions Developed in 1984 by AATCC Committee

Add to Reading List

Source URL: www.aatcc.org

Language: English - Date: 2013-09-09 11:55:21
293Paralympic sports / Paralympic Games / Classifier / Classification rule / National Paralympic Committee / International Wheelchair Basketball Federation / Machine learning / Statistical classification / Sports

Classification Code ReviewThird consultation round, 3 February to 10 April 2015 Section Code

Add to Reading List

Source URL: www.paralympic.org

Language: English - Date: 2015-04-23 08:46:58
294Opcode / MOV / JMP / Malware / Computing / Machine code / X86 instructions / NOP

Statistical Structures: Fingerprinting Malware for Classification and Analysis Daniel Bilar Wellesley College (Wellesley, MA) Colby College (Waterville, ME)

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
295Markup languages / Open Geospatial Consortium / Machine learning / ISO/IEC 11179 / SensorML / XLink / Statistical classification / Code / Data / Information / Metadata

OceanSITES SensorML Manual History Version Date Comment 0.1 CR: creation of the document

Add to Reading List

Source URL: www.jcommops.org

Language: English - Date: 2009-09-08 08:47:52
296Scripting languages / Computer network security / Software testing / Code injection / Machine code / Malware / Metasploit Project / Batch file / Echo / Computing / Software / System software

Microsoft Word - Advanced Command Injection Exploitation-1.doc

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:24
297Java platform / Cross-platform software / Assembly languages / Java bytecode / Jimple / Java virtual machine / Subroutine / Java / Stack-oriented programming language / Computing / Software engineering / Computer programming

Using reaching-defs and type-flow analyses to obtain three-address code in the Scala compiler c Miguel Garcia, LAMP, ยด Ecole

Add to Reading List

Source URL: lampwww.epfl.ch

Language: English - Date: 2010-04-25 05:49:42
298Software testing / Code injection / Machine code / Malware / Vulnerability / Unix / Nm / At / Vi / Computing / Software / System software

Microsoft PowerPoint - Advanced Command Injection Exploitation[1].ppt [Compatibility Mode]

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:24
299Technology / Merchant services / Embedded systems / Credit cards / Credit card / Debit card / Stored-value card / Card security code / Automated teller machine / Payment systems / Business / Electronic commerce

Gift Card Terms and Conditions

Add to Reading List

Source URL: farmbureaubank.com

Language: English - Date: 2014-11-20 15:40:28
300Machining / G-code / Technology / Machine tools / Learning / Engineering / Manufacturing / Computer-aided engineering / Numerical control / Metalworking

Arizona State University Inventors Stephen Warren Student/Grad MAE School for Engineering of

Add to Reading List

Source URL: azte.technologypublisher.com

Language: English - Date: 2015-03-03 14:31:38
UPDATE