نتایج جستجو برای: harmful act
تعداد نتایج: 210565 فیلتر نتایج به سال:
In 1987 the State of Wisconsin, in authorizing a state lottery, required the Wisconsin Lottery Board to contract with IRP to undertake a study of the impact of the lottery on Wisconsin residents of various income levels. Titled "Who Plays the Lottery? A Comparison of Patterns in Wisconsin and the Nation," the study was carried out by Irving Piliavin and Michael Polakowski and is available as IR...
We show that in language learning, contrary to received wisdom, keeping exceptional training instances in memory can be beneecial for generalization accuracy. We investigate this phenomenon empirically on a selection of benchmark natural language processing tasks: grapheme-to-phoneme conversion, part-of-speech tagging, prepositional-phrase attachment, and base noun phrase chunking. In a rst ser...
Linux is increasingly used to power everything from embedded devices to supercomputers. Developers of such systems often start with a mainline kernel from kernel.org and then apply patches for their application domain. Many of these patches represent crosscutting concerns in that they do not fit within a single program module and are scattered throughout the kernel sources—easily affecting over...
Attacks on host computers by malicious peripherals are a growing problem; the inexorable advance of powerful, small, cheap peripherals, which attach to plug-and-play buses, has made such attacks easy to mount. At the same time, commodity operating systems lack systematic defenses. We present Cinch, a pragmatic response to this threat. Cinch transforms USB peripherals to untrusted network endpoi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید