Narrow Domains Sample Clauses

Narrow Domains versus the Broader Context Second, being a narrow form of AI, ATR systems merely recognise predefined target types based on pre-programmed criteria,291 but generally cannot discern the surrounding context.292 This is crucial, as a recognisable object like a rifle may have a 285 Ibid. 286 That is, to recognise specifically targetable buildings, infrastructure or terrain, but without relying on fragile and deniable communications links. 287 Xxxxx X. Xxxxxxx, ‘Review of Current Aided/Automatic Target Acquisition Technology for Military Target Acquisition Tasks’ (2011) 50 Optical Engineering 1. 288 Xxxxxxxxxx Xxxxxxxx, ‘Distributed Automatic Target Recognition Using Multi-Agent UAV Swarms’, Proceedings of the Fifth International Joint Conference on Autonomous Agents and Multiagent Systems (8-12 May 2006), 479 (describing a distributed search with ‘tipping and cueing’ behaviour. Thus, when one micro-drone senses a potentially targetable object, others swarm towards it to collectively perform ATR and detection-confirmation, thereby benefiting from more sensors, data-collection and data- processing capabilities). 289 See 2.4.2. 290 Ghost imaging is an application of quantum physics, which derives an artificially-generated, but vastly improved holographic image of an object that might be two or so miles away on a smoky battlefield. See ‘The Newest Thing in Quantum Imaging’, DoD Armed with Science (3 January 2014) <xxxx://xxxxxxx.xxxxxxx.xxx/2014/01/03/the-newest-thing-in-quantum-imaging> accessed 14 May 2018. 291 Boulanin and Verbruggen (n 19). 292 Xxxxxxx (n 13). number of contrasting uses, from perfectly innocuous ones293 through to offensive attack. Assessing which of these applies in a given scenario requires an understanding of context and intuition, which currently only humans have.294 As Xxxxxxxxx points out, “determining the gist of a scene and doing so as well as an experienced image analyst is proving difficult to automate”.295 The situation is even more acute where foreign cultures and customs present additional sources of misunderstanding.296 Such narrowness of object recognition highlights the fact that ATRs perform quantitative interpretations of observed data, but they do not understand the underlying reality or context that produces those data. This counsels against any over-reliance on ATR and it points to the need for human input,297 either to supervise the system with a man-on-the-loop, or to restrict its autonomous operation to relatively simpl...
AutoNDA by SimpleDocs

Related to Narrow Domains

  • Contractor Sensitive Information 17.1 The Authority must:

  • DISCLOSURE OF TBS ACCESS CODE TO THIRD PARTY (a) The Account Holder must exercise all care to ensure that the TBS Access Code is not disclosed to any person and shall take all steps to prevent forgery or fraud in connection with the use of his TBS Access Code and/or the operation of the TBS. If the TBS Access Code is disclosed to any person, the Account Holder must forthwith give the Bank written notice thereof, thereupon the Account Holder shall immediately cease to use the TBS Access Code.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Confidential Information The Executive shall hold in a fiduciary capacity for the benefit of the Company all secret or confidential information, knowledge or data relating to the Company or any of its affiliated companies, and their respective businesses, which shall have been obtained by the Executive during the Executive's employment by the Company or any of its affiliated companies and which shall not be or become public knowledge (other than by acts by the Executive or representatives of the Executive in violation of this Agreement). After termination of the Executive's employment with the Company, the Executive shall not, without the prior written consent of the Company or as may otherwise be required by law or legal process, communicate or divulge any such information, knowledge or data to anyone other than the Company and those designated by it. In no event shall an asserted violation of the provisions of this Section 10 constitute a basis for deferring or withholding any amounts otherwise payable to the Executive under this Agreement.

  • CONFIDENTIAL, PROPRIETARY, AND TRADE SECRET INFORMATION AND MATERIALS a. Buyer and Seller shall each keep confidential and protect from unauthorized use and disclosure all (i) confidential, proprietary and/or trade secret information of a Party or third party disclosed by a Party; (ii) software provided under this Contract in source code form or identified as subject to this Article; and (iii) tooling identified as subject to this Article: in each case that is obtained, directly or indirectly, from the other in connection with this Contract or Buyer’s contract with its customer, if any, (collectively referred to as "Proprietary Information and Materials"). Proprietary Information and Materials excludes information that is, as evidenced by competent records provided by the receiving Party, known to the receiving party or lawfully in the public domain, in the same form as disclosed hereunder, disclosed to the receiving Party without restriction by a third party having the right to disclose it, or developed by the receiving Party independently without use of or reference to the disclosing Party’s Proprietary Information and Materials.

  • Sensitive Information Buyer will inform Licensor if Personal Data falls into any special categories of personal data as defined in Article 9(1) of Regulation (EU) 2016/679.

  • Unauthorised Use of Intellectual Property a) The Supplier/Service Provider agrees to notify Transnet in writing of any conflicting uses of, and applications of registrations of Patents, Designs and Trade Marks or any act of infringement, unfair competition or passing off involving the Intellectual Property of Transnet of which the Supplier/Service Provider acquires knowledge and Transnet shall have the right, as its own option, to proceed against any party infringing its Intellectual Property.

  • Use of Intellectual Property The Adviser grants to the Sub-Adviser a sublicense to use the trademarks, service marks, logos, names, or any other proprietary designations of the Adviser (“AdvisorShares Marks”) on a non-exclusive basis. The Sub-Adviser will acquire no rights in the AdvisorShares Marks, and all goodwill of the AdvisorShares Marks shall inure to and remain with the Adviser. The Sub-Adviser agrees that neither it, nor any of its affiliates, will knowingly in any way refer directly or indirectly to its relationship with the Trust, the Fund(s), the Adviser or any of their respective affiliates or use AdvisorShares Marks in offering, marketing or other promotional materials without the prior express written consent of the Adviser, which approval will not be unreasonably withheld or delayed, except as required by rule, regulation or upon the request of a governmental authority. Notwithstanding the forgoing, the Sub-Adviser and its affiliates may, without obtaining the Adviser’s prior approval, refer directly or indirectly to its relationship with the Trust, the Fund(s), the Adviser or any of their respective affiliates and use AdvisorShares Marks in offering, marketing or other promotional materials provided that such materials were previously approved by the Adviser and remain in substantially the same form.

  • Sensitive data Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B.

  • Compelled Disclosure of Confidential Information Notwithstanding anything in the foregoing to the contrary, the Receiving Party may disclose Confidential Information pursuant to any governmental, judicial, or administrative order, subpoena, discovery request, regulatory request or similar method, provided that the Receiving Party promptly notifies, to the extent practicable, the Disclosing Party in writing of such demand for disclosure so that the Disclosing Party, at its sole expense, may seek to make such disclosure subject to a protective order or other appropriate remedy to preserve the confidentiality of the Confidential Information; provided in the case of a broad regulatory request with respect to the Receiving Party’s business (not targeted at Disclosing Party), the Receiving Party may promptly comply with such request provided the Receiving Party give (if permitted by such regulator) the Disclosing Party prompt notice of such disclosure. The Receiving Party agrees that it shall not oppose and shall cooperate with efforts by, to the extent practicable, the Disclosing Party with respect to any such request for a protective order or other relief. Notwithstanding the foregoing, if the Disclosing Party is unable to obtain or does not seek a protective order and the Receiving Party is legally requested or required to disclose such Confidential Information, disclosure of such Confidential Information may be made without liability.

Time is Money Join Law Insider Premium to draft better contracts faster.