Detection of suspect software objects and signatures after...
Detection of suspicious privileged access to restricted...
Detector and operational method for a firmware interface
Determination of a best offset to detect an embedded pattern
Determination of frequency of timer ticks
Determining a boot image based on a requesting client address
Determining a current machine state of software
Determining a time difference between first and second clock...
Determining cycle adjustments for static timing analysis of...
Determining optimal power down of a system while indexes are...
Determining point of interaction device security properties...
Determining power consumption in IT networks
Determining target operating frequencies for a...
Determining the reputation of a sender of communications
Determining the timing of a data signal
Determining theft of grammar code
Determining whether characteristics of a local area network...
Deterministic shut down of memory devices in response to a...
Deterministic user authentication service for communication netw
Deterministic user authentication service for communication...