نتایج جستجو برای: sandbox model

تعداد نتایج: 2104952  

2009
Bryan Auslander Matthew Molineaux David W. Aha Quentin Pizzini

We describe our progress on instrumenting a Navy software simulator for use in the context of intelligent agent research. The Tactical Action Officer (TAO) Sandbox, developed at the University of Southern California, is used by officers to train for specific Navy missions. NRL and Knexus Research Corporation have integrated this simulator with intelligent agents using the Lightweight Integratio...

2009
A. Haas A. Revil

[1] Electric field bursts were passively observed when a nonwetting fluid displaced a wetting fluid in a porous material (drainage) as well as during imbibition experiments. A sandbox experiment was conducted to study these electrical disturbances using a network of very sensitive nonpolarizing electrodes located at the top surface of the tank. Drainage exhibited many more electrical bursts, wi...

2012
Valentin Guignon Gaëtan Droc Michael Alaux Franc-Christophe Baurens Olivier Garsmeur Claire Poiron Tim J. Carver Mathieu Rouard Stéphanie Bocs

SUMMARY We developed a controller that is compliant with the Chado database schema, GBrowse and genome annotation-editing tools such as Artemis and Apollo. It enables the management of public and private data, monitors manual annotation (with controlled vocabularies, structural and functional annotation controls) and stores versions of annotation for all modified features. The Chado controller ...

Journal: :European Physical Journal C 2021

Abstract The Casimir effect continues to be a subject of discussion regarding its relationship, or the lack it, with vacuum energy fluctuating quantum fields. In this note, we propose Gedankenexperiment considering an imaginary process similar fluctuation in typical static set up. thought experiment leads intriguing conclusions minimum distance between plates when approaching Planck scale. More...

2002
Victoria Skoularidou Diomidis Spinellis

We enumerate and compare a number of security-enabling architectures for network clients. These architectures, either proposed as methodologies or currently implemented in software and/or hardware, are capable of protecting the client’s software integrity and its environment. The most important methodologies include the reference monitor model, firewalls and virtual machines. Software implement...

2010
Matthew Finifter Joel Weinberger Adam Barth

Publishers wish to sandbox third-party advertisements to protect themselves from malicious advertisements. One promising approach, used by ADsafe, Dojo Secure, and Jacaranda, sandboxes advertisements by statically verifying that their JavaScript conforms to a safe subset of the language. These systems blacklist known dangerous properties that would let advertisements escape the sandbox. Unfortu...

2002
Kazuhiko Kato Yoshihiro Oyama

We have developed a general approach to enable secure circulation of software in an open network environment such as the Internet By software circulation we mean a generalized conventional software distribution concept in which software can be transferred even in an iterative manner such as through redistribution or using mobile agents To clarify the problem that arises when software is circula...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید