نتایج جستجو برای: روش bot
تعداد نتایج: 372308 فیلتر نتایج به سال:
Bots are malicious software components used for generating spams, launching denial of service attacks, phishing, identity theft and information exfiltration and such other illegal activities. Bot detection is an area of active research in recent times. Here we propose a bot detection mechanism for a single host. A user traffic profile is used to filter out normal traffic generated by the host. ...
Bots, which are new malignant programs are hard to detect by signature based pattern matching techniques. In this research, we focused on a unique function of the bots the remote control channel (C&C session). We clarified that the C&C session has unique characteristics that come from the behavior of bot programs. Accordingly, we propose an alternative technique to identify computers compromise...
* Part of this work was done as a National Research Council Fellow at the University of California, Berkeley. 1 Bonner, J. T., Am. J. Bot., 31, 175 (1944). 2 Skupienski, F. X., Recherches Sur Le Cycle Evolutif Des Certains Myxomycetes, Paris, 1920. 3 Kniep, H., Die Sexualitdt der niederen Pflanzen, Gustav Fischer, Jena, 1928. 4 Raper, K. B., The Quarterly Revie-w of Biology, 26, 169 (1951). 6 E...
The development of reliable, robust and capable service robot platforms is expensive and time consuming. On the other hand, stable hardware is a prerequisite to be able to concentrate on the targeted research area. This paper proposes a strategy to make such high-end service robot platforms available as research platform, by means of the example of CareO-bot ® 3 developed at Fraunhofer IPA. Sev...
Larvae of the bot fly Cuterebra emasculator Fitch infest tree squirrels and chipmunks from the Atlantic Ocean to just west of the Mississippi River and from southern Canada to the Gulf Coast of the United States. Whether the species is present in all states and provinces in this region is not well documented. Because there are few published records of C. emasculator in South Carolina, we gather...
Sheryl Brahnam Missouri State University 1909 S. National Springfield, MO 65804 USA [email protected] In this paper, I present a preliminary study that examines the sexual comments and insults users directed at three conversational agents that differed in the gender impressions of their embodiment. The three types of embodiment explored in this study are male, female, and neuter-robotic. Resu...
The demand for janitorial robots has gone up with the rising affluence and increasingly busy lifestyles of people [1], both in offices and personal homes. All too often people forget to switch off lights, close doors, throw away garbage and so on; this is where a janitorial robot would come in handy. This kind of robot must have the necessary characteristics of being able to autonomously naviga...
Parallel applications can speed up their execution by accessing resources hosted by multiple autonomous providers. Applications following the message passing model demand processors to be available at the same time; a problem known as resource coallocation. Other application models, such as workflows and bag-of-tasks (BoT), can also benefit from the coordinated allocation of resources from auto...
s. Albuquerque, New Mexico, August 12-16, 2001. Botanical Society of America. Pp. 132. Panero, J.L., Baldwin, B.G., Schilling, E.E. & Clevinger, J.A. 2001c. Molecular phylogenetic studies of members of tribes Helenieae, Heliantheae, and Eupatorieae (Asteraceae). 3. General systematics and proposed taxonomic changes in current classification. In: Botany 2001 Abstracts. Albuquerque, New Mexico, A...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید