亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? paper3

?? Best algorithm for LZW ..C language
??
?? 第 1 頁 / 共 4 頁
字號:
They then proceed to search for an idle machine and occupy it with anothersegment.Care is taken to coordinate this activity so that only one new segment iscreated..ppThere are two logical components to a worm.The first is the underlying worm maintenance mechanism, which is responsiblefor maintaining the worm \(em finding free machines when needed andreplicating the program for each additional segment.The second is the application part, and several applications have beeninvestigated (Shoch & Hupp, 1982), such as.LB.NP.ulexistentialworm that merely announces its presence on each computer it inhabits;.NP.ulbillboardworm that posts a graphic message on each screen;.NP.ulalarm clockworm that implements a highly reliable alarm clock that is not based on anyparticular machine;.NP.ulanimationworm for undertaking lengthy computer graphics computations..LE.ppCan worms shed any light on the controversies outlined above which surroundthe concept of autopoiesis?Firstly, although they are not living and do not create their own material inany chemical sense, they are certainly autonomous, autopoietic systems.Shoch & Hupp relate how.sp.BQa small worm was left running one night, just exercising the worm controlmechanism and using a small number of machines.When we returned the next morning, we found dozens of machines dead,apparently crashed.If one restarted the regular memory diagnostic, it would run very briefly,then be seized by the worm.The worm would quickly load its program into this new segment; the programwould start to run and promptly crash, leaving the worm incomplete \(em andstill hungrily looking for new segments..FQ.spJohn Brunner's science fiction story \fIThe shockwave rider\fR presaged justsuch an uncontrollable worm.Of course, extermination is always possible in principle by switching off orsimultaneously rebooting every machine on the network, although this may notbe an option in practice.Secondly, in the light of our earlier discussion of teleology and autopoiesis,it is interesting to find the clear separation of the maintenance mechanism\(em the autopoietic part \(em from the the application code \(em the``purposive'' part \(em of the worm.It can be viewed quite separately as an autopoietic or an application(teleological?) system..pp.ulSelf-replicating Trojan horses.In his Turing Award lecture, Thompson (1984) raised the specter ofineradicable programs residing within a computer system \(em ineradicable inthe sense that although they are absent from all source code, they can surviverecompilation and reinstallation of the entire system!.[Thompson 1984 reflections trust.]Most people's reaction is ``impossible! \(em it must be a simple trick'',but Thompson showed a trick that is extremely subtle and sophisticated, andeffectively impossible to detect or counter.The natural application of such a device is to compromise a system's security,and Thompson's conclusion was that there can be no technical substitute fornatural trust.From a system-theoretic viewpoint, however, this is an interesting exampleof how a parasite can survive despite all attempts by its host to eliminateit..ppTo understand what is involved in creating such an organism, consider firstself-replicating programs.When compiled and executed, these print out themselves (say in source codeform); no more and no less.Although at first sight they seem to violate some fundamental intuitiveprinciple of information \(em that to print oneself one needs\fIboth\fR ``oneself'' \fIand, in addition\fR, something to print it out,this is not so.Programmers have long amused themselves with self-replicating programs, oftensetting the challenge of discovering the shortest such program in any givencomputer language.Moreover, it is easy to construct a self-replicating program that includesany given piece of text.Such a program divides naturally into the self-replicating part and thepart that is to be reproduced, in much the same way that a worm programseparates the worm maintenance mechanism from the application part..ppView self-replication as a source program ``hiding'' in executable binarycode.Normally when coaxed out of hiding it prints itself.But imagine one embedded in a language compiler, which when activatedinterpolates itself into the input stream for the compiler, causing itselfto be compiled and inserted into the binary program being produced.Now it has transferred itself from the executable version of the compilerto the executable version of the program being compiled \(em without everappearing in source form.Now imagine that the program being compiled is itself the compiler \(em avirgin version, uncorrupted in any way.Then the self-replicating code transfers itself from the old version ofthe compiler to the new version, without appearing in source form.It remains only for the code to detect when it is the compiler that is beingrecompiled, and not to interfere with other programs.This is well known as a standard Trojan Horse technique.The result is a bug that lives only in the compiled version and replicatesitself whenever the compiler is recompiled..ppIf autopoiesis is the ability of a system to develop and maintain its ownorganization, the self-replicating Trojan horse seems to be a remarkableexample of it.It is an organism that it extremely difficult to destroy, even when onehas detected its presence.However, it cannot be autonomous, but rather survives as a parasite on alanguage compiler.It does not have to be a compiler:  any program that handles other programs(including itself) will do\u4\d..FN4.\ \ As Thompson (1984) remarks, a well-installed microcode bug will bealmost impossible to detect..EFAlthough presented as a pathological example of computer use, it is possibleto imagine non-destructive applications \(em such as permanently identifyingauthorship or ownership of installed software even though the source code isprovided.In the natural world, parasites can have symbiotic relationships with theirhosts.It would be interesting to find analogous circumstances for self-replicatingTrojan horses, but I do not know of any \(em these examples of benevolentuse do not seem to benefit the host program directly, but rather its author orowner..pp.ulVirusesare perhaps less subtle but more pervasive kinds of bugs.They spread infection in a computer system by attaching themselves tofiles containing executable programs.The virus itself is a small piece of code which gains control whenever thehost is executed, performs its viral function, and then passes control tothe host.Generally the user is unaware that anything unusual is happening:  as far ashe is concerned, the host program executes exactly as normal\u5\d..FN5.\ \ The only difference is a small startup delay which probably goesunnoticed..EFAs part of its function, a virus spreads itself.When it has control, it may attach itself to one or several other filescontaining executable programs, turning them into viruses too.Under most computer protection schemes, it has the unusual advantage ofrunning with the privileges of the person who invoked the host, not withthe privileges of the host program itself.Thus it has a unique opportunity to infect other files belonging to thatperson.In an environment where people sometimes use each others programs, this allowsit to spread rapidly throughout the system\u6\d..FN6.\ \ More details of the construction of both viruses and self-replicatingTrojan horses are given by Witten (1987)..[Witten 1987 infiltrating open systems.].EF.ppUnlike self-replicating Trojan horses, a virus can be killed by recompilingthe host.(Of course, there is no reason why a virus should not be dispatched to installa self-replicating Trojan horse in the compiler.)  \cIf all programs are recompiled ``simultaneously'' (ie without executing any ofthem between compilations), the virus will be eradicated.However, in a multi-user system it is extremely hard to arrange for everyoneto arrange a massive recompilation \(em in the same way as it is difficult toreboot every machine on a network simultaneously to stamp out a worm..ppViruses do not generally remain in touch with each other and therefore,unlike worms, are not really autopoietic.But there is no intrinsic reason why they should not be.They provide a basic and effective means of reproduction which could beutilized for higher-level communicating systems.As with the other devices reviewed above, when one hears about viruses onecannot help thinking of pathological uses.However, there are benevolent applications.They could assist in system maintenance by recording how often programs wereused and arranging optimization accordingly, perhaps migrating little-usedones to slower memory devices or arranging optimization of frequently-usedprograms.Such reorganizations could take place without users being aware of it, quietlymaking the overall system more efficient..sh "Conclusions".ppWe have examined two rather different directions in which autonomy can bepursued in computer systems.The first concerns representation and manipulation of goals.Examination of some current AI systems shows that they do not escape theold criticism that their goals and aspirations are merely planted thereby the programmer.Indeed, it is not easy to see how it could be different, unless goals weregenerated randomly in some sense.Random exploration is also being investigated in current AI systems, and theseshow that syntactic mutation can be an extremely powerful technique whencombined with semantically dense representations..ppBut according to modern biological thinking, the lower-level goals of peopleand animals are also implanted in their brains in a remarkably literal sense.Higher-level goals are not so easy to pin down.According to one school of psychological thought they stem from asingle ``super-goal'' called self-actualization.This is remarkably in tune with the architecture of some prominent discoveryprograms in AI which strive to maximize the ``interestingness'' of theconcepts being developed.While one may be reluctant to equate self-actualization with interestingness,the resemblance is nevertheless striking..ppThe second direction concerns organizational independence in a sense ofwholeness which is distinct from goal-seeking.The concept of autopoiesis formalizes this notion.Organizational independence can be identified in certain computer systemslike worm programs, self-replicating Trojan horses, and viruses.It is remarkable that such applications have been constructed becausethey offer practical advantages and not in pursuit of any theoreticalinvestigation of autonomy;in this way they are quite different from contrived games.In some sense self-replicating programs do have a goal, namely \fIsurvival\fR.A damaged worm exhibits this by repairing itself.But this is a weak form of goal-seeking compared with living organisms, whichactively sense danger and take measures to prevent their own demise..ppThe architecture of these systems is striking in that the mechanism whichmaintains the artificial organism (be it the worm maintenance code,the self-replicating part of a Trojan horse, or the viral infection-spreader)is quite separate from the application part of the organism.Most people think of such programs as somehow pathological, and theapplication as a harmful or subversive one, but this need not be so:  thereare benign examples of each.In any case, separation of the organism's maintenance from its purpose isinteresting because the concept of autopoiesis has sparked a debate insystem-theoretic circles as to whether teleological descriptions are evenlegitimate, let alone necessary.In both domains a clear separation seems to arise naturally between theautopoietic and teleological view of organisms..ppThere have been no attempts to build computer programs which combine these twodirections.The AI community which developed techniques of goal-seeking has historicallybeen somewhat separate from the system software community which has createdrobust self-replicating programs like worms and viruses.What will spring from the inevitable combination and synthesis of the twotechnologies of autonomy?.sh "Acknowledgements".ppFirst and foremost I would like to thank Brian Gaines for suggesting andencouraging this line of research.I am grateful to Saul Greenberg and Roy Masrani for many insights into topicsdiscussed here, and to Bruce MacDonald for making some valuable suggestions.This research is supported by the Natural Sciences and Engineering ResearchCouncil of Canada..sh "References".ls1.sp.in+4n.[$LIST$.].in0

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
欧美高清www午色夜在线视频| 三级一区在线视频先锋 | 亚洲自拍偷拍欧美| 成人黄动漫网站免费app| 欧美伊人精品成人久久综合97 | 在线观看日韩一区| 国产精品第五页| 丁香六月久久综合狠狠色| 久久蜜臀精品av| 成人av网址在线| 中文字幕一区不卡| 91麻豆精品视频| 亚洲高清免费观看| 69堂亚洲精品首页| 日本特黄久久久高潮| 欧美亚洲国产一区在线观看网站 | 日本精品裸体写真集在线观看 | 欧美性受极品xxxx喷水| 亚洲一区二区在线免费看| 欧美性猛片xxxx免费看久爱| 日韩成人一级片| 欧美电影免费观看高清完整版| 麻豆精品视频在线观看视频| 欧美大胆人体bbbb| 91香蕉国产在线观看软件| 亚洲激情在线播放| 欧美精品1区2区| 五月天激情综合网| 精品国偷自产国产一区| 国产传媒欧美日韩成人| 国产精品毛片高清在线完整版| 91精品福利在线| 蜜桃av噜噜一区| 国产日韩影视精品| 欧美影视一区在线| 国产精品一二三四五| 国产精品久久久久aaaa| 一本大道久久a久久综合| 日韩高清一区二区| 国产清纯在线一区二区www| 91亚洲精品一区二区乱码| 亚洲欧美电影院| 91麻豆精品国产91久久久更新时间| 伦理电影国产精品| 自拍偷拍国产亚洲| 国产日韩精品一区二区三区在线| 色综合久久久久久久| 男男视频亚洲欧美| 一区二区三区电影在线播| 日韩欧美激情四射| 色综合 综合色| 午夜精品一区二区三区三上悠亚| 亚洲国产精品精华液ab| 欧美日韩成人激情| 成人性生交大片免费看中文网站| 青椒成人免费视频| 亚洲女同ⅹxx女同tv| 精品成a人在线观看| 日本久久一区二区三区| 美女性感视频久久| 亚洲欧美偷拍卡通变态| 2020国产精品自拍| 精品视频一区二区三区免费| 国产91综合一区在线观看| 午夜在线成人av| 亚洲激情一二三区| 国产精品免费网站在线观看| 欧美嫩在线观看| 日本高清免费不卡视频| 国产精品一区二区三区99| 亚洲午夜久久久久久久久久久 | 成人免费电影视频| 国产白丝精品91爽爽久久| 亚洲美女屁股眼交3| 久久精品一区八戒影视| 日韩久久久久久| 欧美日韩国产片| 色一情一伦一子一伦一区| 国模大尺度一区二区三区| 日产国产高清一区二区三区| 夜夜夜精品看看| 中文字幕亚洲精品在线观看| 亚洲欧美视频在线观看| 国产精品久久久久久久午夜片 | 国产主播一区二区| 天堂午夜影视日韩欧美一区二区| 亚洲国产精品一区二区久久 | 国产精品国产三级国产普通话蜜臀| 精品女同一区二区| 日韩欧美一区二区视频| 欧美日韩国产精选| 色婷婷亚洲婷婷| 欧美午夜电影在线播放| 欧美三区免费完整视频在线观看| 91美女福利视频| 欧美日韩国产高清一区二区三区 | 久久免费美女视频| 日本一区二区三区四区在线视频| 久久综合九色综合欧美亚洲| 精品少妇一区二区三区在线视频| 国产91精品欧美| 一本久久a久久免费精品不卡| av一二三不卡影片| 91玉足脚交白嫩脚丫在线播放| 91碰在线视频| 欧美亚洲日本国产| 欧美精品久久一区二区三区| 91精品国产免费| 精品国产成人在线影院| 国产亚洲欧美中文| 久久精品人人做人人爽97| 国产日韩欧美精品一区| 亚洲私人黄色宅男| 一区二区免费看| 韩国av一区二区| www.综合网.com| 欧美专区在线观看一区| 精品99久久久久久| 国产欧美精品国产国产专区| 国产精品美女久久福利网站 | 欧美日韩国产一级| 国产婷婷色一区二区三区在线| 亚洲欧洲无码一区二区三区| 一区二区久久久久| 亚洲激情在线播放| 国产综合一区二区| 99久久久久久| 在线综合视频播放| 中文字幕亚洲一区二区va在线| 中文字幕一区二区三区四区 | 国产精品国产三级国产a | 91亚洲资源网| 欧美日韩国产成人在线免费| 国产色产综合产在线视频| 一区二区高清免费观看影视大全| 日韩高清不卡一区二区| 91免费版在线| 日韩一区二区影院| 最新欧美精品一区二区三区| 午夜精品福利视频网站| 国产99久久久精品| 在线不卡免费欧美| 国产精品国产三级国产有无不卡| 日韩黄色免费网站| 国产高清精品久久久久| 欧美日韩视频在线第一区| 久久精品一区二区三区av| 一区二区三区日韩欧美精品| 麻豆freexxxx性91精品| 色婷婷综合久久久中文一区二区| 日韩免费高清av| 一区二区三区欧美日| 成人中文字幕在线| 久久久精品免费网站| 久久国产精品免费| 4hu四虎永久在线影院成人| 亚洲专区一二三| 91黄色免费看| 一级特黄大欧美久久久| 91小视频免费观看| 亚洲欧美aⅴ...| 色欧美88888久久久久久影院| 1024成人网| 91在线观看污| 亚洲日本免费电影| 一本大道综合伊人精品热热| 亚洲黄色av一区| 日本道精品一区二区三区| 亚洲欧美日韩一区| 在线一区二区三区四区五区| 亚洲一区二区三区精品在线| 欧美性色综合网| 日产国产高清一区二区三区| 日韩亚洲欧美中文三级| 狠狠色丁香婷婷综合久久片| 久久欧美一区二区| 成人永久看片免费视频天堂| 成人免费一区二区三区视频| 91天堂素人约啪| 亚洲国产精品久久久久婷婷884| 欧美系列日韩一区| 日韩精品一卡二卡三卡四卡无卡| 日韩一区二区免费在线观看| 久久97超碰色| 国产精品人妖ts系列视频| 91免费视频观看| 亚洲成人免费在线观看| 在线综合亚洲欧美在线视频| 国产自产v一区二区三区c| 中文字幕av一区 二区| 99久久精品国产精品久久| 亚洲电影一区二区| 日韩免费视频一区二区| 粉嫩av一区二区三区在线播放| 亚洲品质自拍视频网站| 欧美久久一二区| 国产一区二区三区精品欧美日韩一区二区三区 | 久久亚洲私人国产精品va媚药| 成人性生交大片免费看中文网站| 一区二区三区在线免费播放|