نتایج جستجو برای: access restrictions to machines

تعداد نتایج: 10664006  

Journal: :جغرافیا و توسعه فضای شهری 0
براتعلی خاکپور زینب فاریابی

one of the main challenges facing urban planning in the late 20th century is the growth rate of traffic that influences access to sustainable urban development. one of the solutions proposed for traffic—as well as the economic, social, and environmental problems originating from it—in large cities has been the applying of traffic restrictions during certain times and in specific places in order...

2011
Eldora Martin Knechtel Rafael Peñaloza

Recent research has shown that labeling ontologies can be useful for restricting the access to some of the axioms and their implicit consequences. However, the labeling of the axioms is an error-prone and highly sensible task. In previous work we have shown how to correct the access restrictions if the security administrator knows the precise access level that a consequence must receive, and ax...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده فنی و مهندسی 1387

abstract biometric access control is an automatic system that intelligently provides the access of special actions to predefined individuals. it may use one or more unique features of humans, like fingerprint, iris, gesture, 2d and 3d face images. 2d face image is one of the important features with useful and reliable information for recognition of individuals and systems based on this ...

2007
Xining Li

Mobile agents are self-contained processes, dispatched by their principal, roaming the Internet to access data and services, and carrying out their decision-making and problem-solving tasks remotely. M-commerce, the traditional E-commerce combined with mobile devices and wireless networks, is likely to become a major business model in the near future. Due to the flexibility and mobility, mobile...

2005
Ajith Abraham Ravi Jain

Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. There are two types of intruders: external intruders, who are unauthorized users of the machines they attack, and internal intruders, who have permission to ac...

Journal: :Computers & Security 1993
Teresa F. Lunt

Intrusion detection is an alternative to the situation of the security violation.Security mechanism of the network is necessary against the threat to the system. There are two types of intruders: external intruders, who are unauthorized users of the machines they attack, and internal intruders, who have permission to access the system with some restrictions. This paper describes a brief overvie...

1999
Haris Lekatsas Wayne H. Wolf

We present an algorithm based on arithmetic coding that allows decompression to start at any point in the compressed le. This random access requirement poses some restrictions on the implementation of arithmetic coding and on the model used. Our main application area is executable code compression for computer systems where machine instructions are decompressed on-they before execution. We focu...

Journal: :ERCIM News 2016
Karol Kurach Marcin Andrychowicz Ilya Sutskever

In this paper, we propose and investigate a new neural network architecture called Neural Random Access Machine. It can manipulate and dereference pointers to an external variable-size random-access memory. The model is trained from pure input-output examples using backpropagation. We evaluate the new model on a number of simple algorithmic tasks whose solutions require pointer manipulation and...

Recourse to a purported ideal of societal homogeneity has become common in the context of the refugee reception crisis – not only in Japan, as Leppold et al report, but also throughout Europe. Calls for societal homogeneity in Europe originate from populist movements as well as from some governments. Often, they go along with reduced social support for refugees and asylum seekers, for example i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید