نتایج جستجو برای: sandbox model

تعداد نتایج: 2104952  

Journal: :IEICE Transactions on Information and Systems 2018

Journal: :ISPRS Annals of the Photogrammetry, Remote Sensing and Spatial Information Sciences 2018

Journal: :Izvestiâ vysših učebnyh zavedenij. Priborostroenie 2017

2007
Alex Marschner Stephen D. Craven Peter M. Athanas

The OpenFire processor is an simple, open source solution for implementing a MicroBlaze-compliant Application-Specific Instruction-Set Processor (ASIP) on an FPGA. Its small size and adjustable feature set also make it attractive for Single Chip Multiple Processor (SCMP) research. Until now the OpenFire has been dependent upon a host MicroBlaze processor or custom user logic for access to exter...

2002
Almut Herzog Nahid Shahmehri

Java’s security architecture is well known for not taking the security aspect of availability into account. This has been recognised and addressed by a number of researchers and communities. However, in their suggested resourceaware Java environments, policies for resource control have so far been stated in proprietary, sometimes hard-coded, or undocumented ways. We set out to investigate if st...

2009
Sergio Ocio Jose Antonio Lopez Brugos

In recent years, several games have presented non-linear gameplay systems; they are also known as sandbox games. Players are offered big, open, full of life worlds where they have a high degree of freedom to choose what they want to do to progress through the game. Multi-agent systems can help providing game designers with the means to achieve their creative visions and build more complex envir...

2014
Jonas Forsman Richard P. Mann Cedric Linder Maartje van den Bogaard

The approach presented in this article represents a generalizable and adaptable methodology for identifying complex interactions in educational systems and for investigating how manipulation of these systems may affect educational outcomes of interest. Multilayer Minimum Spanning Tree and Monte-Carlo methods are used. A virtual Sandbox University is created in order to facilitate effective iden...

2016
Nikilesh Balakrishnan Thomas Bytheway Lucian Carata Ripduman Sohan Andy Hopper

System and library call interception performed entirely in user-space is a viable technique for provenance capture. The primary advantages of such an approach are that it is lightweight, has a low barrier to adoption and does not require root privileges to install and configure. However, since both the user’s application and the provenance capture mechanism execute at the same privilege level a...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید