نتایج جستجو برای: outside capabilities

تعداد نتایج: 183537  

2012
Nick Brown Roberta Fisher

2017
Oana-Teodora Iova Amy L. Murphy Gian Pietro Picco Lorenzo Ghiro Davide Molteni Federico Ossi Francesca Cagnacci

LoRa technology is an increasingly popular option for applications that can exploit its low power and long range capabilities. While most efforts to date have studied its characteristics for smart city environments, we take LoRa outside the city limits, exploring how the environment affects its core communication properties. Specifically, we offer two novel parameter explorations to understand ...

2013

Investment in research and development (R&D) improves the capability of UK armed forces both now and in the future. Moreover, high-technology exports help to sustain the R&D base in the UK. Stimulating innovation – both inside and outside the MOD – is an important aspect of effective R&D. However, the technology landscape is changing in three key dimensions. First, the development cycle for new...

2011
Syed Raheel Hassan Jasmina Pazardzievska Julien Bourgeois

Grid computing networks aggregate huge computing power that they need for solving different scientific problems. This power can be used for attacking the grid’s components as well as outside computers. Attacks such as the Denial of Service (DoS) could be used to target user machines, servers, and security management solutions to sabotage the normal operations of the grid computing network. In t...

2010
Taylor Kessler Faulkner Scott Niekum Andrea L. Thomaz

Future autonomous robots deployed in homes and workplaces must be able to competently ask for help when situations arise that fall outside of their knowledge or capabilities. When asking for help, these robots must provide enough information to solve the problem without giving overwhelming amounts of information. We present a novel algorithm that learns to predict how natural language utterance...

2000
Thomas J. McCabe

Not only has the rate of change accelerated beyond our classical lifecycles capability but also the demands of high quality and low cost are beyond our past capabilities  how to leverage specific outside tools to meet these demands will be presented. This presentation will focus on a spirit of collaboration and cooperation expressed in Web lifecycles and compare that with the traditional lifec...

Journal: :CoRR 2017
Gnanambikai Krishnakumar Patanjali SLPSK Prasanna Karthik Vairam Chester Rebeiro

Reading or writing outside the bounds of a buffer is a serious security vulnerability that has been exploited in numerous occasions. These attacks can be prevented by ensuring that every buffer is only accessed within its specified bounds. In this paper we present Gandalf, a compiler assisted hardware extension for the OpenRISC processor that thwarts all forms of memory based attacks including ...

2015
Alex R. Hoffmaster David AuCoin Prasith Baccam Henry C. Baggett Rob Baird Saithip Bhengsri David D. Blaney Paul J. Brett Timothy J.G. Brooks Katherine A. Brown Narisara Chantratita Allen C. Cheng David A.B. Dance Saskia Decuypere Dawn Defenbaugh Jay E. Gee Raymond Houghton Possawat Jorakate Ganjana Lertmemongkolchai Direk Limmathurotsakul Toby L. Merlin Chiranjay Mukhopadhyay Robert Norton Sharon J. Peacock Dionne B. Rolim Andrew J. Simpson Ivo Steinmetz Robyn A. Stoddard Martha M. Stokes David Sue Apichai Tuanyok Toni Whistler Vanaporn Wuthiekanun Henry T. Walke

Melioidosis is a severe disease that can be difficult to diagnose because of its diverse clinical manifestations and a lack of adequate diagnostic capabilities for suspected cases. There is broad interest in improving detection and diagnosis of this disease not only in melioidosis-endemic regions but also outside these regions because melioidosis may be underreported and poses a potential biote...

2014
Anders Sandberg

Obviously this is a hugely ambitious project far outside current capabilities, possibly not even feasible in theory. However, should such a technology ever become feasible there are good reasons to expect the consequences to be dramatic: it would enable software intelligence, copyable human capital, new ethical problems, and (depending on philosophical outlook) immortality and a posthuman speci...

2007
JOHN F. B. MITCHELL RONALD J. STOUFFER KARL E. TAYLOR

modeling was first characterized in the 1980s by a number of distinct groups developing, running, and analyzing model output from their own models with little opportunity for anyone outside of those groups to have access to the model data. This was partly a consequence of relatively primitive computer networking and data transfer capabilities, along with the daunting task of collecting and stor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید