Filters








787 Hits in 6.5 sec

THE MEDIEVAL LEGAL PRACTICE OF EXCULPATORY OATH AND TRIAL BY FIRE IN THE LEGEND OF QUEEN ISOLDE [chapter]

Alicja Bańczyk
2019 History of Law and Other Humanities  
The rector also recommended to the prison's guard a diligent security associated with a human treatment 18 .  ...  It had the geometric shape of a trapezoid with the short side overlooking Corso di Porta Vittoria, the diagonal sides Via Freguglia and Via Manara and, lastly, the longest side Via San Barnaba.  ...  their intelligence and their feelings, with their ideality and their interests, with their loves and their hatreds.  ... 
doi:10.2307/j.ctvr7f8t1.25 fatcat:cycw7vxmi5f6voswncnstkl24a

Big Brother: A Drop-In Website Interaction Logging Service

Harrisen Scells, Jimmy, Guido Zuccon
2021 Proceedings of the 44th International ACM SIGIR Conference on Research and Development in Information Retrieval  
However, in many research scenarios, the way interactions are logged are usually tied to a monolithic system.  ...  Our service, Big Brother, can be dropped-in to existing user interfaces with almost no configuration required by researchers.  ...  Fire with Fire: Towards Robust Recommender Systems via Adversarial Poisoning Training ................................................................................................................  ... 
doi:10.1145/3404835.3462781 fatcat:k4mqsyqgjffttnmt6my7okyvu4

Institutional Strategies for Cybersecurity in Higher Education Institutions

Eric C. K. Cheng, Tianchong Wang
2022 Information  
Publications that showcase best practices often lack system-wide perspectives towards cybersecurity in HEIs.  ...  strategies, with takeaways designed to equip HEIs better to address cybersecurity threats into the future.  ...  protection, and existing fire system [8] .  ... 
doi:10.3390/info13040192 fatcat:k3sdck53fngyjob5jtjjgbeq2u

Governing lethal behavior

Ronald C. Arkin
2008 Proceedings of the 3rd international conference on Human robot interaction - HRI '08  
for the implementation of an ethical control and reasoning system potentially suitable for constraining lethal actions in an autonomous robotic system so that they fall within the bounds prescribed by  ...  It is based upon extensions to existing deliberative/reactive autonomous robotic architectures, and includes recommendations for (1) post facto suppression of unethical behavior, (2) behavioral design  ...  F (do not fire) T (override) T (able to fire) Operator commands system to fire despite ethical recommendations to the contrary 3.  ... 
doi:10.1145/1349822.1349839 dblp:conf/hri/Arkin08 fatcat:ksklbtupxjeazksapkn4zzd4ki

Dreaming of clean nukes

Michael A. Levi
2004 Nature  
Additionally, MDA is developing a battle management/fire control system (C2BMC) that needs to be compatible with the global C4ISR system.  ...  This will be easier against small adversaries with limited WMD and more vulnerable delivery methods. It will be more of a challenge against larger adversaries with more robust attack capabilities.  ...  STRATCOM, with its strategic IO mission assignment, should align the many separate programs to achieve more robust IO options.  ... 
doi:10.1038/428892a pmid:15118700 fatcat:4l7opgcfbzdm7merk5sw35a3ry

Road Safety from the Perspective of European Union

2021 International Conference Safe and Secure Society  
Training in model situations in staff training shows that it is not entirely clear how staff should behave in a given situation, especially with regard to the rule: run / hide / fight.  ...  The fire and rescue service has a sufficient number of experienced experts and professional teams of fire-fighting providers who are trained to assist in the investigation of the location of the fire and  ...  The aim is to provide technical and technological equipment and appropriate training of HaZZ members (training and education) with subsequent certification of the module and its inclusion in the CECIS  ... 
doi:10.36682/icsss_2021_5 fatcat:zya2p2j3uvepndomvdsp4zyoni

Parameters Autumn: 2020

USAWC Parameters
2020 Parameters  
Deal shows how the People's Liberation Army's involvement in political warfare, via info-messaging, opens a competitive space that does not favor Beijing.  ...  Our final forum, Regional Challenges, deals with developments in the Middle East and the Pacific regions.  ...  side is more resolute and internally unified-as well as the need to prepare the battlefield before fighting. 13 The first chapter of Sun Zi's Art of War opens with a recommendation to assess which side  ... 
doi:10.55540/0031-1723.2668 fatcat:jibzwitycfhernguv43zsfsdtm

Parameters Summer 2022

USAWC Press
2022 Parameters  
By contrast, Ukrainians have fought an existential war, making good use of dispersed light infantry tactics with high motivation levels.  ...  Judging how robust machine learning systems are would be difficult, if not impossible, without closely examining the training data.  ...  If self-confidence errs toward arrogance, it becomes suspect-even poisonous.  ... 
doi:10.55540/0031-1723.3147 fatcat:qbyam2jbwjbe7lwo2eteqmwwqy

A Review on Internet of Things for Defense and Public Safety

Paula Fraga-Lamas, Tiago Fernández-Caramés, Manuel Suárez-Albela, Luis Castedo, Miguel González-López
2016 Sensors  
., data-driven applications or embedded automation and intelligent adaptive systems) to revolutionize modern warfare and provide benefits similar to those in industry.  ...  This article reviews the main tactical requirements and the architecture, examining gaps and shortcomings in existing IoT systems across the military field and mission-critical scenarios.  ...  With variations from country to country, the primary areas of responsibility include: structure fire-fighting and fire safety, wild land fire-fighting, life-saving through search and rescue, rendering  ... 
doi:10.3390/s16101644 pmid:27782052 pmcid:PMC5087432 fatcat:vg4ybtb7qjfj3iuhnocr7pkdoa

Combat in Games

Joseph C. Osborn, Dylan Lederle-Ensign, Noah Wardrip-Fruin, Michael Mateas
2015 International Conference on Foundations of Digital Games  
These requirements are eventually fulfilled via operational logics, which tie the game's observable behavior (including its instantial assets) to play experiences and cultural knowledge, creating what  ...  trains.  ...  games ground combat in real-time graphical and state logics, computer role-playing games (RPGs) model it mainly via resource logics, often with turn-taking.  ... 
dblp:conf/fdg/OsbornLWM15 fatcat:iqo2bzimbfeprdfnmgibfh5yca

Transdisciplinary consolidation of financial technologies with knowledge systems
Трансдисциплінарна консолідація фінансових технологій із системами знань

Oleksandr LYUBICH, SESE "The Academy of Financial Management", Oleksandr STRYZHAK, SESE "The Academy of Financial Management"
2021 Fìnansi Ukraïni  
The article describes a cognitive IT technology that provides consolidated interaction with online narrative documents which show various financial technologies.  ...  LEFT: Soldiers connect to OEF SIPRNet via PRC-117G during RTO/Operator Training for the first time. An early meeting with Multinational Force Iraq Commander Gen.  ...  The output node that fires most strongly produces the network's answer. The training algorithm compares that answer to the label of the photo.  ... 
doi:10.33763/finukr2021.11.054 fatcat:edc3aarta5gq7be2wixkynjz7q

D5.1 Key Technologies for IoT Data Management Benchmark

Gino Ciccone, Giuseppina Carpentieri, Cosimo Zotti, Alexandr Tardo, Marek Bednarczyk, Tadeusz Puźniakowski, Paweł Czapiewski, Stefan Köpsell, Kumar Sharad, José Luis Cárcel, Joan Meseguer, Ahmad Nimr (+9 others)
2021 Zenodo  
Researchers have proposed adversarial training as way to provide robustness against such attacks.  ...  and generalization of results; In • Model Poisoning: [99] presents an attack to backdoor Federated Learning via model poisoning.  ...  This makes it really difficult to alter the data integrity proofs, having then a tamper proof system for data integrity verification by itself.  ... 
doi:10.5281/zenodo.5084813 fatcat:ssllddbo7rda7fadthu26ajrzu

Autonomous Intelligent Cyber-defense Agent (AICA) Reference Architecture. Release 2.0 [article]

Alexander Kott, Paul Théron, Martin Drašar, Edlira Dushku, Benoît LeBlanc, Paul Losiewicz, Alessandro Guarino, Luigi Mancini, Agostino Panico, Mauno Pihelgas, Krzysztof Rzadca
2019 arXiv   pre-print
In a conflict with a technically sophisticated adversary, NATO military tactical networks will operate in a heavily contested battlefield.  ...  To fight them, NATO needs artificial cyber hunters - intelligent, autonomous, mobile agents specialized in active cyber defense. With this in mind, in 2016, NATO initiated RTG IST-152.  ...  This is due to the expected difficulty in accrediting systems with robust intelligent behaviors.  ... 
arXiv:1803.10664v2 fatcat:gtkwxl2gezcn7hbdtldxh77zai

Before the Bomb: How America Approached the End of the Pacific War

David L. Porter, John D. Chappell
1997 Journal of American History  
In reply, the editors admitted that the war had become a "ghastly and inhuman affair," yet countered that the "time has come to fight fire with fire" inasmuch as the Japanese understood only force. 63  ...  Hoover recommended allowing the Japanese to maintain the imperial system and also suggested granting Japan control of Korea and Formosa.  ...  .; images of Japan in, 1, [28] [29] with postwar focus, 4, [56] [57] [58] [59] [60] [61] [62] [63] [64] [65] [66] [67] [68] [69] [70] [71] role of in war effort, 16-19, 55-56,149 African Americans:  ... 
doi:10.2307/2952706 fatcat:fngkuf4ctzejfou354pv5olugm

A Stable Nuclear Future? The Impact of Autonomous Systems and Artificial Intelligence [article]

Michael C. Horowitz, Paul Scharre, Alexander Velez-Green
2019 arXiv   pre-print
of autonomous systems with consequences for nuclear stability.  ...  In particular, the need to fight at machine speed and the cognitive risk introduced by automation bias could increase the risk of unintended escalation.  ...  While adversarial training can somewhat mitigate these risks, there is currently no known solution to this vulnerability. 18 Additionally, machine learning is vulnerable to "data poisoning" techniques  ... 
arXiv:1912.05291v2 fatcat:asnyt6i2rnanxjdubi5sfzirp4
« Previous Showing results 1 — 15 out of 787 results