نتایج جستجو برای: harmful act

تعداد نتایج: 210565  

2007
Michael Polakowski

In 1987 the State of Wisconsin, in authorizing a state lottery, required the Wisconsin Lottery Board to contract with IRP to undertake a study of the impact of the lottery on Wisconsin residents of various income levels. Titled "Who Plays the Lottery? A Comparison of Patterns in Wisconsin and the Nation," the study was carried out by Irving Piliavin and Michael Polakowski and is available as IR...

1999
Walter Daelemans Antal Van Den Bosch Jakub Zavrel

We show that in language learning, contrary to received wisdom, keeping exceptional training instances in memory can be beneecial for generalization accuracy. We investigate this phenomenon empirically on a selection of benchmark natural language processing tasks: grapheme-to-phoneme conversion, part-of-speech tagging, prepositional-phrase attachment, and base noun phrase chunking. In a rst ser...

Journal: :Software Testing, Verification and Reliability 2017

Journal: :Communications of the ACM 2016

Journal: :Information Services & Use 2013

Journal: :SSRN Electronic Journal 2016

Journal: :European Heart Journal - Cardiovascular Pharmacotherapy 2017

2005
Marc E. Fiuczynski Robert Grimm Yvonne Coady David Walker

Linux is increasingly used to power everything from embedded devices to supercomputers. Developers of such systems often start with a mainline kernel from kernel.org and then apply patches for their application domain. Many of these patches represent crosscutting concerns in that they do not fit within a single program module and are scattered throughout the kernel sources—easily affecting over...

Journal: :CoRR 2015
Riad S. Wahby Sebastian Angel Max Howald Joshua B. Leners Andrew J. Blumberg Michael Walfish

Attacks on host computers by malicious peripherals are a growing problem; the inexorable advance of powerful, small, cheap peripherals, which attach to plug-and-play buses, has made such attacks easy to mount. At the same time, commodity operating systems lack systematic defenses. We present Cinch, a pragmatic response to this threat. Cinch transforms USB peripherals to untrusted network endpoi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید