نتایج جستجو برای: sandbox model
تعداد نتایج: 2104952 فیلتر نتایج به سال:
We describe our progress on instrumenting a Navy software simulator for use in the context of intelligent agent research. The Tactical Action Officer (TAO) Sandbox, developed at the University of Southern California, is used by officers to train for specific Navy missions. NRL and Knexus Research Corporation have integrated this simulator with intelligent agents using the Lightweight Integratio...
[1] Electric field bursts were passively observed when a nonwetting fluid displaced a wetting fluid in a porous material (drainage) as well as during imbibition experiments. A sandbox experiment was conducted to study these electrical disturbances using a network of very sensitive nonpolarizing electrodes located at the top surface of the tank. Drainage exhibited many more electrical bursts, wi...
SUMMARY We developed a controller that is compliant with the Chado database schema, GBrowse and genome annotation-editing tools such as Artemis and Apollo. It enables the management of public and private data, monitors manual annotation (with controlled vocabularies, structural and functional annotation controls) and stores versions of annotation for all modified features. The Chado controller ...
Abstract The Casimir effect continues to be a subject of discussion regarding its relationship, or the lack it, with vacuum energy fluctuating quantum fields. In this note, we propose Gedankenexperiment considering an imaginary process similar fluctuation in typical static set up. thought experiment leads intriguing conclusions minimum distance between plates when approaching Planck scale. More...
We enumerate and compare a number of security-enabling architectures for network clients. These architectures, either proposed as methodologies or currently implemented in software and/or hardware, are capable of protecting the client’s software integrity and its environment. The most important methodologies include the reference monitor model, firewalls and virtual machines. Software implement...
Publishers wish to sandbox third-party advertisements to protect themselves from malicious advertisements. One promising approach, used by ADsafe, Dojo Secure, and Jacaranda, sandboxes advertisements by statically verifying that their JavaScript conforms to a safe subset of the language. These systems blacklist known dangerous properties that would let advertisements escape the sandbox. Unfortu...
We have developed a general approach to enable secure circulation of software in an open network environment such as the Internet By software circulation we mean a generalized conventional software distribution concept in which software can be transferred even in an iterative manner such as through redistribution or using mobile agents To clarify the problem that arises when software is circula...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید