null detection
Смотреть что такое "null detection" в других словарях:
Null modem — Modem Pour le MoDem, voir Mouvement démocrate (France). Le modem (mot valise, pour modulateur démodulateur), est un périphérique servant à communiquer avec des utilisateurs distants par l intermédiaire d une ligne téléphonique. Il permet… … Wikipédia en Français
Null result — In science, a null result is a result without the expected content: that is, the proposed result is absent.[1] It is an experimental outcome which does not show an otherwise expected effect. This does not imply a result of zero or nothing, simply … Wikipedia
Optical heterodyne detection — is an important special case of heterodyne detection. In heterodyne detection, a signal of interest at some frequency is non linearly mixed with a reference local oscillator (LO) that is set at a close by frequency. The desired outcome is the… … Wikipedia
Duplicate Address Detection — IPv6 im TCP/IP‑Protokollstapel: Anwendung HTTP IMAP SMTP DNS … Transport TCP UDP … Deutsch Wikipedia
ICL7107 — The Intersil ICL7106 and ICL7107 are low power, 31/2 digit A/D converters. Included are seven segment decoders, display drivers, a reference, and a clock. The ICL7106 is designed to interface with a liquid crystal display (LCD) and includes a… … Wikipedia
детектирование с двумя зонами стирания — — [Л.Г.Суменко. Англо русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.] Тематики информационные технологии в целом EN double null detection … Справочник технического переводчика
детектирование со стиранием — — [Л.Г.Суменко. Англо русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.] Тематики информационные технологии в целом EN null detection … Справочник технического переводчика
Type I and type II errors — In statistics, the terms Type I error (also, α error, or false positive) and type II error (β error, or a false negative) are used to describe possible errors made in a statistical decision process. In 1928, Jerzy Neyman (1894 1981) and Egon… … Wikipedia
Buffer overflow — In computer security and programming, a buffer overflow, or buffer overrun, is an anomalous condition where a process attempts to store data beyond the boundaries of a fixed length buffer. The result is that the extra data overwrites adjacent… … Wikipedia
Modularity (networks) — For other uses, see Modularity. Modularity is one measure of the structure of networks or graphs. It measures the strength of division of a network into modules (also called groups, clusters or communities). Networks with high modularity have… … Wikipedia
Shellcode — In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called shellcode because it typically starts a command shell from which the attacker can control the compromised … Wikipedia