Примеры использования Heuristic на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
It also uses the null-move heuristic.
Enable/disable heuristic code analyzer.
Conspicuous Waste and Representativeness Heuristic.
Select the Use heuristic analyzer check box.
Use the slider the set the level of Heuristic Analysis.
Люди также переводят
Enable Heuristic Analyzer, configure analysis level.
UseAnalyzer Enable/ disable Heuristic Analyzer.
Use the heuristic code analyzer and the iChecker technologies.
Hierarchical games Germeier.Elements of the theory of heuristic solutions.
In the Heuristic analyzer section, do one of the following.
Bekenstein derived the bound from heuristic arguments involving black holes.
Heuristic Analysis emulation of the startup of suspicious applications.
Set the required level of heuristic analysis for malware scanning.
The heuristic analyzer has already sent and conducts additional checks.
This can be achieved using heuristic, and/or metaheuristic methods.
The Heuristic Analyzer detects malicious objects based on their behavior.
In conclusion, we discuss the heuristic connections and interaction between A.
Heuristic analyzer performs fewer operations found inside executable files.
Application of intelligent technologies combining heuristic and signature detection methods;
Advanced heuristic engine(Shuriken) now enabled by default.
It's characteristic peculiarity is reliance on generalized construction of algorithm and heuristic descriptions.
To configure the Heuristic Analyzer, take the following steps.
The article deals with the similarities between conspicuous waste and representativeness heuristic.
Heuristic analyzer performs more operations found in executable files.
Understanding the daily life: the heuristic potential of the concept in the studies of the Soviet era. pdf.
The heuristic capabilities of the leading activity concept embodied in the works of I.
Dynamic application of several heuristic algorithms for extra-reliable data recovery from corrupted PST files.
During heuristic analysis, Kaspersky Security identifies the threat level of an application.
Several heuristic algorithms exist to produce approximations to the partition optimization problem.
Many heuristic algorithms have been proposed which provide near-optimal solutions in polynomial time.