نتایج جستجو برای: outside capabilities
تعداد نتایج: 183537 فیلتر نتایج به سال:
LoRa technology is an increasingly popular option for applications that can exploit its low power and long range capabilities. While most efforts to date have studied its characteristics for smart city environments, we take LoRa outside the city limits, exploring how the environment affects its core communication properties. Specifically, we offer two novel parameter explorations to understand ...
Investment in research and development (R&D) improves the capability of UK armed forces both now and in the future. Moreover, high-technology exports help to sustain the R&D base in the UK. Stimulating innovation – both inside and outside the MOD – is an important aspect of effective R&D. However, the technology landscape is changing in three key dimensions. First, the development cycle for new...
Grid computing networks aggregate huge computing power that they need for solving different scientific problems. This power can be used for attacking the grid’s components as well as outside computers. Attacks such as the Denial of Service (DoS) could be used to target user machines, servers, and security management solutions to sabotage the normal operations of the grid computing network. In t...
Future autonomous robots deployed in homes and workplaces must be able to competently ask for help when situations arise that fall outside of their knowledge or capabilities. When asking for help, these robots must provide enough information to solve the problem without giving overwhelming amounts of information. We present a novel algorithm that learns to predict how natural language utterance...
Not only has the rate of change accelerated beyond our classical lifecycles capability but also the demands of high quality and low cost are beyond our past capabilities how to leverage specific outside tools to meet these demands will be presented. This presentation will focus on a spirit of collaboration and cooperation expressed in Web lifecycles and compare that with the traditional lifec...
Reading or writing outside the bounds of a buffer is a serious security vulnerability that has been exploited in numerous occasions. These attacks can be prevented by ensuring that every buffer is only accessed within its specified bounds. In this paper we present Gandalf, a compiler assisted hardware extension for the OpenRISC processor that thwarts all forms of memory based attacks including ...
Melioidosis is a severe disease that can be difficult to diagnose because of its diverse clinical manifestations and a lack of adequate diagnostic capabilities for suspected cases. There is broad interest in improving detection and diagnosis of this disease not only in melioidosis-endemic regions but also outside these regions because melioidosis may be underreported and poses a potential biote...
Obviously this is a hugely ambitious project far outside current capabilities, possibly not even feasible in theory. However, should such a technology ever become feasible there are good reasons to expect the consequences to be dramatic: it would enable software intelligence, copyable human capital, new ethical problems, and (depending on philosophical outlook) immortality and a posthuman speci...
modeling was first characterized in the 1980s by a number of distinct groups developing, running, and analyzing model output from their own models with little opportunity for anyone outside of those groups to have access to the model data. This was partly a consequence of relatively primitive computer networking and data transfer capabilities, along with the daunting task of collecting and stor...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید