466 Hits in 4.1 sec

The Empire Strikes Back: Annesley v. Sherlock and the Triumph of Imperial Parliamentary Supremacy

Martin Stephen Flaherty
1987 Columbia Law Review  
Another room was recently equipped with ten high-powered computers purchased with a special grant from HUD.  ...  These include not only low-income housing, commercial revitalization, and social services, but also a large after-school program, intergenerational activities, a childcare center, a network of family day  ... 
doi:10.2307/1122673 fatcat:i5p2x3crv5cirljmm2m7bigp7i

Sherlock Holmes and the Case of the Lucrative Fandom: Recognizing the Economic Power of Fanworks and Reimagining Fair Use in Copyright

Stacey Lantagne
2014 Social Science Research Network  
Sir Arthur Conan Doyle's Sherlock Holmes stories inspired a passionate fandom long before the age of the Internet.  ...  Gallagher, Trademark and Copyright Enforcement in the Shadow of IP Law, 28 SANTA CLARA COMPUTER & HIGH TECH.  ...  The same aesthetic values were at work in the cases involving the commercial Gone with the Wind fanwork, The Wind Done Gone.  ... 
doi:10.2139/ssrn.2402951 fatcat:seuaq4rh5fduzikh6cviyw3f2i

Assessment of predictive probability models for effective mechanical design feature reuse

Gokula Vasantha, David Purves, John Quigley, Jonathan Corney, Andrew Sherlock, Geevin Randika
2022 Artificial intelligence for engineering design, analysis and manufacturing  
(NNs), and Bayesian Networks (BNs) as representative of these methods.  ...  The practical impact of this contribution is assessed using a prototype (implemented as an extension to a commercial CAD system) by engineers whose comments defined an agenda for ongoing research in this  ...  The interactive interface has been developed for the user to specify high-level constraints in the synthesis process A recursive neural network for representing hierarchical shape structures that includes  ... 
doi:10.1017/s0890060422000014 fatcat:a7lv7mucrjdbbeet7vz43ebazu

Common design structures and substitutable feature discovery in CAD databases

Gokula Vasantha, David Purves, John Quigley, Jonathan Corney, Andrew Sherlock, Geevin Randika
2021 Advanced Engineering Informatics  
By exploiting the established data-mining technology of association rules and item-sets the authors show how CDSs can be efficiently computed for hundreds of 3D CAD models.  ...  A case study, with hole data extracted from a publicly available dataset of hydraulic valves, is presented to illustrate how item-sets associated with CDS can be computed and used to support predictive  ...  The concept of finding one-hole feature difference between CDSs is based on the concept of Triadic closure in network analysis.  ... 
doi:10.1016/j.aei.2021.101261 fatcat:t2mnmz6orresdarxpoih53ngoi

Exploring software developers' work practices: Task differences, participation, engagement, and speed of task resolution

Sherlock A. Licorish, Stephen G. MacDonell
2017 Information & Management  
[22] found that a few key members of smaller OSS projects occupied the center of their teams' communication networks, in contrast to larger teams whose communication networks appeared more modular.  ...  We therefore computed the speed of task resolution of each task by calculating the number of days it took for the task to be resolved.  ...  He is a member of the IEEE Computer Society and the ACM, and serves on the Editorial Board of Information and Software Technology.  ... 
doi:10.1016/ fatcat:qe2egmn6kvhnfhi767ianmbhga

Towards large-scale FAME-based bacterial species identification using machine learning techniques

Bram Slabbinck, Bernard De Baets, Peter Dawyndt, Paul De Vos
2009 Systematic and Applied Microbiology  
Moreover, our machine learning approach also outperformed the Sherlock MIS (MIDI Inc., Newark, DE, USA).  ...  Three techniques have been considered: artificial neural networks, random forests and support vector machines. Nearly perfect identification has been achieved at genus level.  ...  This new approach shows a moderate to high identification performance and outperforms the commercial Sherlock MIS system.  ... 
doi:10.1016/j.syapm.2009.01.003 pmid:19237256 fatcat:i4m7rpcls5e2nareuicz47aham

Output Range Analysis for Deep Neural Networks [article]

Souradeep Dutta, Susmit Jha, Sriram Sanakaranarayanan, Ashish Tiwari
2017 arXiv   pre-print
Increasingly, these deep NNs are also been deployed in high-assurance applications.  ...  In this paper, we study a specific verification problem of computing a guaranteed range for the output of a deep neural network given a set of inputs represented as a convex polyhedron.  ...  box nature of NN models and the absence of effective methods for their analysis has confined their use in systems with low integrity requirements but more recently, deep NNs are also been adopted in high-assurance  ... 
arXiv:1709.09130v1 fatcat:hwomzhne7nea5po5mo2kz574ja

Risk factors for SARS-CoV-2 among patients in the Oxford Royal College of General Practitioners Research and Surveillance Centre primary care network: a cross-sectional study

Simon de Lusignan, Jienchi Dorward, Ana Correa, Nicholas Jones, Oluwafunmi Akinyemi, Gayatri Amirthalingam, Nick Andrews, Rachel Byford, Gavin Dabrera, Alex Elliot, Joanna Ellis, Filipa Ferreira (+10 others)
2020 Lancet. Infectious Diseases (Print)  
We used multivariable logistic regression models with multiple imputation to identify risk factors for positive SARS-CoV-2 tests within this surveillance network.  ...  We analysed routinely collected, pseudonymised data for patients in the RCGP Research and Surveillance Centre primary care sentinel network who were tested for SARS-CoV-2 between Jan 28 and April 4, 2020  ...  We acknowledge our collaboration with the general practitioner computer system suppliers-EMIS Health, The Phoenix Partnership, and InPractice Systems-Apollo Medical Systems, Public Health England, Wellcome  ... 
doi:10.1016/s1473-3099(20)30371-6 pmid:32422204 pmcid:PMC7228715 fatcat:vtuclb36m5f6bip47nbhc73ma4

Mobile Holmes: Sherlockiana, travel writing and the co-production of the Sherlock Holmes stories

David Paul McLaughlin, Apollo-University Of Cambridge Repository, Apollo-University Of Cambridge Repository, Philip Howell
It focuses on American Sherlockians, a group of devotees of Arthur Conan Doyle's Sherlock Holmes stories.  ...  On our right is Wellington Street Holmes's knowledge of the byways of London was extraordinary, and on this occasion he passed rapidly, and with an assured step, through a network of mews and stables the  ...  Holmes anthology.Further, building on the image of Holmesian space as being a network joined by narratives, Wheeler's use of Google Maps renders the London of Sherlock Holmes as a network of virtual spaces  ... 
doi:10.17863/cam.20952 fatcat:iqd4fghrtnasra62z6fh4udvny

On Service Level Agreement Assurance in Cloud Computing Data Centers

Abdallah Ali Zainelabden, A. Ibrahim, Dzmitry Kliazovich, Pascal Bouvry
2016 2016 IEEE 9th International Conference on Cloud Computing (CLOUD)  
applications, massive data analysis applications, high performance computing applications and mobile cloud applications.  ...  Cloud computing uses the internet data centers to host the applications and data storage and also the processing power in the addition to the virtualization.  ...  Grid Computing : Grid Computing is the computing between a network of computers that connected and utilized together to earn a large super computing resources like high computing power and high storage  ... 
doi:10.1109/cloud.2016.0137 dblp:conf/IEEEcloud/IbrahimKB16 fatcat:mj46cv35a5el5gmyus4z4cq2ri

The Fog over the Grimpen Mire: Cloud Computing and the Law

Miranda Mowbray
2009 SCRIPTed: A Journal of Law, Technology & Society  
Sherlock Holmes Called Upon to Solve the Tragic Mystery.  ...  The current user agreements for the most prominent cloud computing services give no such assurance.  ... 
doi:10.2966/scrip.060109.132 fatcat:x2eexwr3gjby7pwndj6n5fppmi

Innovative technologies for point-of-care testing of viral hepatitis in low-resource and decentralized settings

L. Duchesne, K. Lacombe
2017 Journal of Viral Hepatitis  
Despite high interest resulting from their development in recent years, very few point-of-care devices have reached the market.  ...  In addition to logistical hurdles, legal and economic constraints specific to the commercialization of in vitro diagnostics, which have also participated in the low transfer of innovative point-of-care  ...  Moreover, data analysis must be conducted with computational software by high-skilled personnel.  ... 
doi:10.1111/jvh.12827 pmid:29134742 fatcat:np37famogbfwxb3jyvfpsedlze

A Review of Formal Methods applied to Machine Learning [article]

Caterina Urban, Antoine Miné
2021 arXiv   pre-print
The large majority of them verify trained neural networks and employ either SMT, optimization, or abstract interpretation techniques.  ...  This provides a golden standard and sets high expectations for machine learning verification.  ...  The approach is implemented in a tool named Sherlock (, which builds on the commercial MILP solver GUROBI [78] .  ... 
arXiv:2104.02466v2 fatcat:6ghs5huoynbc5h7lndajmsoxyu

Cloud to Ground Secured Computing: User Experiences on the Transition from Cloud-Based to Locally-Sited Hardware [article]

Carolyn Ellis
2021 arXiv   pre-print
The application of high-performance computing (HPC) processes, tools, and technologies to Controlled Unclassified Information (CUI) creates both opportunities and challenges.  ...  Building on our experiences developing, deploying, and managing the Research Environment for Encumbered Data (REED) hosted by AWS GovCloud, Research Computing at Purdue University has recently deployed  ...  ACKNOWLEDGMENTS We thank our research and faculty partners including Daniel De-Laurentis, Kris Ezra, and Robert Campbell for their feedback on Research Computing resources that have helped us to improve  ... 
arXiv:2108.03994v1 fatcat:uo6ft4wj2rg75isu6snxlf2ncq

Robustly secure computer systems

Jon A. Solworth
2008 Proceedings of the 2007 Workshop on New Security Paradigms - NSPW '07  
Even when commercial operating systems stray from this model, they don't go very far.  ...  Thus high security OSs can be used for the most security sensitive applications. Compatibility is maintained for less security sensitive applications using legacy operating systems.  ...  If critical components of a computer system-such as authentication and authorization (access controls)-are not correctly implemented there is very little assurance that the system will work securely.  ... 
doi:10.1145/1600176.1600186 dblp:conf/nspw/Solworth07 fatcat:efgctuxl3ja43hoetvi3oxrfba
« Previous Showing results 1 — 15 out of 466 results