Results 51 to 60 of about 140,437 (320)
COMPUTER VIROLOGY: SELF-DEFENSE SYSTEM
Based on the biological human models in defending human body against viruses, a new approach in designing the anti-virus system is introduced. This approach is called SDS( Self- Defence System).
Hamid M. A. Abdul-Hussain +1 more
doaj +1 more source
Programming Without Refining [PDF]
To derive a program for a given specification R means to find an artifact P that satisfies two conditions: P is executable in some programming language; and P is correct with respect to R.
Marwa Benabdelali +3 more
doaj +1 more source
A Deep-Q-Network (DQN) controls a virtual agent as the level of a player using only screenshots as inputs. Replay memory selects a limited number of experience replays according to an arbitrary batch size and updates them using the associated Q-function.
Bonwoo Gu, Yunsick Sung
doaj +1 more source
Teaching robots parametrized executable plans through spoken interaction [PDF]
While operating in domestic environments, robots will necessarily face difficulties not envisioned by their developers at programming time. Moreover, the tasks to be performed by a robot will often have to be specialized and/or adapted to the needs of
BASTIANELLI, EMANUELE +2 more
core
ABSTRACT Background The Improving Population Outcomes for Renal Tumours of childhood (IMPORT) is a prospective clinical observational study capturing detailed demographic and outcome data on children and young people diagnosed with renal tumours in the United Kingdom and the Republic of Ireland.
Naomi Ssenyonga +56 more
wiley +1 more source
Detecting Malicious Code by Binary File Checking [PDF]
The object, library and executable code is stored in binary files. Functionality of a binary file is altered when its content or program source code is changed, causing undesired effects.
Marius POPA
doaj +1 more source
Mexitl: Multimedia in Executable Interval Temporal Logic [PDF]
This paper explores a formalism for describing a wide class of multimedia document constraints, based on an interval temporal logic. We describe the requirements on temporal logic specification that arise from the multimedia documents application area ...
Bowman, Howard +3 more
core +2 more sources
Multi-Robot Task Allocation and Scheduling Considering Cooperative Tasks and Precedence Constraints
In order to fully exploit the advantages inherent to cooperating heterogeneous multi-robot teams, sophisticated coordination algorithms are essential. Time-extended multi-robot task allocation approaches assign and schedule a set of tasks to a group of ...
Bischoff, Esther +3 more
core +1 more source
ABSTRACT Introduction We developed MedSupport, a multilevel medication adherence intervention designed to address root barriers to medication adherence. This study sought to explore the feasibility and acceptability of the MedSupport intervention strategies to support a future full‐scale randomized controlled trial.
Elizabeth G. Bouchard +8 more
wiley +1 more source
ABSTRACT Background/Objectives Osteosarcoma is a radioresistant tumor that may benefit from stereotactic body radiation therapy (SBRT) for locoregional control in metastatic/recurrent disease. We report institutional practice patterns, outcomes, toxicity, and failures in osteosarcoma patients treated with SBRT.
Jenna Kocsis +13 more
wiley +1 more source

