نتایج جستجو برای: sandbox model
تعداد نتایج: 2104952 فیلتر نتایج به سال:
مطالبی که در این رساله ارایه می گردد مجموعه مباحثی است پیرامون انجام یک سری آزمایشات مدلسازی بر روی میزلرزه در ارتباط با ماسه ریزدانه مسلح با الیاف موکت که به صورت تصادفی توزیع گردیده اند randomly distributed fiber reinforcement در این نوع خاک مسلح الیاف و تریشه های کوتاه و بلند ژیوتکستایل که از نظر مواد تشکیل دهنده و ترکیبات کاملا مشابه الیاف موکت می باشد با خاکهای دانه ای ریزاده (مثل ماسه ریز...
Theory of mind (ToM) is the ability to take other people's perspective by inferring their mental state. Most 6-year olds pass the change-of-location false belief task that is commonly used to assess ToM. However, the change-of-location task is not suitable for individuals over 5 years of age, due to its discrete response options. In two experiments, we used a paper and pencil version of a modif...
The Java Card ar hite ture for smart ards [4℄ bring two major innovations to the smart ard world: rst, Java ards an run multiple appli ations, whi h an ommuni ate through shared obje ts; se ond, new appli ations, alled applets, an be downloaded on the ard post issuan e. These two features bring onsiderable exibility to the ard, but also raise major se urity issues. A maliious applet, on e downl...
Summary: We developed a controller that is compliant with the Chado database schema, GBrowse and genome annotation-editing tools such as Artemis and Apollo. It enables the management of public and private data, monitors manual annotation (with controlled vocabularies, structural and functional annotation controls) and stores versions of annotation for all modified features. The Chado controller...
To cope with the ever-increasing volume of malware samples, automated program analysis techniques are inevitable. Malware sandboxes in particular have become the de facto standard to extract a program’s behavior. However, the strong need to automate program analysis also bears the risk that anyone that can submit programs to learn and leak the characteristics of a particular sandbox. We introdu...
System M: A Program Logic for Code Sandboxing and Identification Report Title Security-sensitive applications that execute untrusted code often check the code’s integrity by comparing its syntax to a known good value or sandbox the code to contain its effects. System M is a new program logic for reasoning about such security-sensitive applications. System M extends Hoare Type Theory (HTT) to tr...
Many services need to survive machine failures, but designing and deploying fault-tolerant services can be difficult and error-prone. In this work, we present Tardigrade, a system that deploys an existing, unmodified binary as a fault-tolerant service. Tardigrade replicates the service on several machines so that it continues running even when some of them fail. Yet, it keeps the service states...
As students operate increasingly in digital environments populated by social media tools, they need to leverage them effectively to access online resources and stay connected to the physical environments which they inhabit. This paper reports on a practitioner research project to reconfigure a traditional Computer Information Systems (CIS) tutoring lab at a business university into the “CIS San...
In location memory tasks, young children show biases toward reference axes, whereas older children show biases away from axes. As predicted by a dynamic systems model, this transition is gradual and varies across target location (Schutte & Spencer, 2009). Here we tested whether task context would influence the transition by testing children in a sandbox memory task that varied in several ways f...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید