In Favor of “Leader Proofing”

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Questioning Answering By Pattern Matching, Web-Proofing, Semantic Form Proofing

In this paper, we introduce the University at Albany’s question answering system, ILQUA. It is developed on the following methods: pattern matching over annotated text, web-proofing and semantic form proofing. These methods are currently used in other QA systems, however, we revised them to work together in our QA system.

متن کامل

Future proofing

far the fastest growing agricultural producer with output expected to increase by more than 40 per cent between now and 2019. Production growth is also expected to be well above 20 per cent in China, India, the Russian Federation and the Ukraine. But the report warns that increased global food production could still lead to a large section of the global population going hungry. Although the wor...

متن کامل

Idiot-Proofing Authentication

We develop a mechanism by which a server can guarantee that client passwords contain a certain amount of (actually random) entropy while not actually knowing these passwords. We define and implement a protocol between a client and server used during password generation. Importantly, while we greatly modify the process of generating a password, the actual day-to-day use of this password is mostl...

متن کامل

‘Evolution-Proofing’ Antibacterials

When antibiotics first came into use, they were so effective at curbing bacterial infections that it seemed the age-old battle of man vs. microbe would soon be at an end [1]. Eighty years and dozens of drugs later, we now know better. Following each new antibiotic’s launch, reports soon accumulated that once-treatable infections were becoming refractory to the drug [2]. Nowadays, many infectiou...

متن کامل

Tamper-proofing Software Watermarks

We introduce a novel method called constant encoding, which can be used to tamper-proof a software watermark that is embedded in the dynamic data structures of a program. Our novel tamperproofing method is based on transforming numeric or non-numeric constant values in the text of the watermarked program into function calls whose value depends on the watermark data structure. Under reasonable a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Daedalus

سال: 2016

ISSN: 0011-5266,1548-6192

DOI: 10.1162/daed_a_00402