نتایج جستجو برای: کد alice

تعداد نتایج: 12588  

2018
Seung-Hun Chon Rabi Datta Sabrina Hilgers Thomas Dratsch Patrick Plum Hakan Alakus Hans Schlößer Christoph Schramm Daniel Pinto dos Santos Christiane Bruns Robert Kleinert

Background: OSCE (Objective Structured Clinical Examination) is a standard method of testing declarative and process knowledge in clinical core competencies. It is desirable that students undergo OSCE training before participating in the exam. However, establishing OSCE training is resource intensive and often limited in practice time. Web-based immersive patient simulators like ALICE (Artifici...

2012
Sanjam Garg Abishek Kumarasubramanian Rafail Ostrovsky Ivan Visconti

Consider a setting of two mutually distrustful parties Alice and Bob who want to securely evaluate some function on pre-specified inputs. The well studied notion of two-party secure computation allows them to do so in the stand-alone setting. Consider a deterministic function (e.g., 1-out-of-2 bit OT) that Alice and Bob can not evaluate trivially and which allows only Bob to receive the output....

2006
Chao-Guang HUANG Han-Ying GUO

In the literature, a uniformly accelerated reference frame is defined as a set of observers who remain at rest with respect to a given observer Alice who is accelerating at a constant rate with respect to the instantaneously comoving inertial frames. Two observers Alice and Bob are said to be at rest with respect to each other if the time elapses on the clock of Alice during the passage of a li...

Journal: :Archivos de la Sociedad Espanola de Oftalmologia 2014
V M Asensio-Sánchez

CASE REPORT A case of Alice in Wonderland syndrome is described as the only sign of Epstein-Barr virus infection. DISCUSSION Epstein-Barr virus infection may include visual symptoms as the first or only signs of disease. All patients presenting with a clinical picture consistent with the Alice in Wonderland syndrome should undergo serological testing for Epstein-Barr virus infection.

2002
D. Mískowiec P. Braun-Munzinger

The rate of jets expected in ALICE was determined using PYTHIA. We first calculated the inclusive jet cross section in pp̄ collision at √ s=1.8 TeV and compared it to the data of the D0 experiment[1]. As shown in Fig. 1, the PYTHIA calculation, up-scaled by K=1.5, describes the data reasonably well. The calculation was performed in three runs differing by the value of the CKIN(50) parameter whic...

2004
K. Schwarz

Zusammenfassung: ALICE ist eines der vier Experimente des Large Hadron Colliders LHC, die derzeit am CERN in Genf gebaut werden. Wenn das Experiment seinen Betrieb aufnimmt, wird es Daten mit einer Rate von bis zu 2 Petabyte pro Jahr aufzeichnen. Die hieraus resultierenden Anforderungen an das LHC Computing Modell führten zur Ausbildung mehrerer Grid-Projekte, u.a. dem gemeinsamen Grid-Projekt ...

2016
Vahid Sedighi Jessica J. Fridrich Rémi Cogranne

Steganographic schemes for digital images are routinely designed and benchmarked based on feedback obtained on the standard image set called BOSSbase 1.01. While standardized image sets are important for advancing the field, relying on results from a single source may not provide fair benchmarking and may even lead to designs that are overoptimized and highly suboptimal on other image sources. ...

Journal: :CoRR 2017
Sainbayar Sukhbaatar Ilya Kostrikov Arthur Szlam Rob Fergus

We describe a simple scheme that allows an agent to learn about its environment in an unsupervised manner. Our scheme pits two versions of the same agent, Alice and Bob, against one another. Alice proposes a task for Bob to complete; and then Bob attempts to complete the task. In this work we will focus on two kinds of environments: (nearly) reversible environments and environments that can be ...

2010
Leah Schultz

This research investigates the implementation of the programming language Alice to teach computer programming logic to computer information systems students. Alice has been implemented in other university settings and has been reported to have many benefits including object-oriented concepts and an engaging and fun learning environment. In this study, students were surveyed on their opinions ab...

Journal: :CoRR 2016
Yang Zhang

In public key cryptography, the security of traditional methods is based on number theoretic problems, and suffers from high computational cost due to problems such as dealing with large numbers. Each user in a public key system has a pair of cryptographic keys, consisting a public key and a private key. These are related through a hard mathematical inversion problem, so that the private key ca...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید