Two Haiku for Rounds
نویسندگان
چکیده
منابع مشابه
Hitch Haiku: An Interactive Supporting System for Composing Haiku Poem
Human communication is fostered in environments of regional communities and cultures and in different languages. Cultures are rooted in their unique histories. Communication media have been developed to circulate these cultural characteristics. The theme of our research is “Cultural Computing”, which means the translation of cultures using scientific methods representing essential aspects of Ja...
متن کاملThe didactic haiku manifesto
It is not necessary to say that we are in the crossroads between the old socratic methods of medical education and the complete adoption of new philosophies such as collaborative learning (social media) or learner delivery co-design (flipped classroom). All these approaches are based on the fact that our learners and some of the teachers have a very millennial learning style, defined by the abi...
متن کاملHaiku: interactive comprehensible data mining
This paper discusses a novel data mining system devised and developed at Birmingham, which attempts to provide a more effective data mining system. It ties in with the workshop goals in a number of different areas. The system tries to allow users to see the big picture and not get caught up in irrelevant detail too early; it uses perception-based approaches to data mining, and it uses interacti...
متن کاملSet Reconciliation in Two Rounds of Communication
In this work, we propose an approach, known as the C2SS-BF method, to synchronizing similar sets of data that uses an Invertible Bloom Filter (IBF). The C2SS-BF method builds on previous work by Eppstein et al. in [6]. By allowing two rounds of communication, we show that in many cases the proposed approach requires substantially less throughput than the algorithm proposed in [6]. The C2SS-BF c...
متن کاملPerfectly Secure Message Transmission in Two Rounds
In the model that has become known as “Perfectly Secure Message Transmission” (PSMT), a sender Alice is connected to a receiver Bob through n parallel two-way channels. A computationally unbounded adversary Eve controls t of these channels, meaning she can acquire and alter any data that is transmitted over these channels. The sender Alice wishes to communicate a secret message to Bob privately...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Academic Emergency Medicine
سال: 2001
ISSN: 1069-6563,1553-2712
DOI: 10.1111/j.1553-2712.2001.tb01294.x