Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Keep company data safe with Chrome Enterprise
Protect your business with AI policies and data loss prevention in the browser
Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
NOTE: Since 2022 this hosting of PLEXIL is deprecated. PLEXIL has moved to GitHub at
https://github.com/plexil-group/plexil. Documentation is found at
https://plexil-group.github.io/plexil_docs. Please use these new locations.
PLEXIL is a plan execution language and technology developed by NASA and used in automation and autonomy applications at NASA and in the public sector. This software includes compilers for the language, the executive (runtime environment), and related tools....
XiangQi Wizard (Chinese Chess Wizard) is a powerful XiangQi (chinese chess) program, which supports UCCI engines. XQWizard Light is the Mobile version for Windows CE and Java ME. ElephantEye is the UCCI engine in XQWizard with strong AI.
GEARS Conflict Resolution is an innovative experimental tool developed at the EUROCONTROL Experimental Centre to provide automatic conflict resolutions for air traffic control.
Non-disjoint groupping of Documents based on word sequence approach
This is a GUI for learning non disjoint groups of documents based on Weka machine learning framework. It offers the possibility to make non disjoint
clustering of documents using both vectorial and sequential representation (word sequence approach based on WSK kernel). All data format supported
by WEKA could be used in DocCO. Data could be loaded from files, from
databases or from specified URL. All the preprocessing techniques implemented in
WEKA could be used before performing the learning.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
This article talks about how to create a chatterbot that can serve as an interactive help agent. The bot has been "taught" to answer FAQs about a system. It can help solve petty issues for users quickly or point them to a human agent.
A Trial Workbench for Facilitating Best Practices from Prospective to Acute Care in Respiratory Medicine. We aim to provide a set of information management toolboxes that facilitates decision support applications in medical information systems.
CAMA (Context-Aware Mobile Agents) is a middleware for supporting mobile agents coordination. It is based on Linda-style coordination and provides numerous extentions for interoperability and fault-tolerance. It supports portable platforms such as PDAs.
WORF is an open and extensible API framework upon which developers can build new and interesting embedded robot software applications on the Waba platform for their robot creation.
3A-TRE evaluates traditionally logical expressions under 3 assumptions
...In this case, the dependent test modules are always assumed to be true when their results are not available. We call this a stub assumption (SA).
3A-TRE example:
echo "CWA: (T and U)" | java -jar PTRE.jar
Result: F
3A-PTRE example: (P means possible results)
echo "OWA: (T,U and U,F)" | java -jar PTRE.jar
Result: U,F
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.