نتایج جستجو برای: روش ivy

تعداد نتایج: 370394  

2003
Steven D. Resnick

From the Department Poison-ivy and poison-oak dermatitis are entities well-known to of Dermatology, Un iall primary care physicians, dermatologists, and most of the genrqersity of California, era1 populace in this country. Much has been written about this San Francisco, problem-probably the commonest of all allergic diseases in the School of Medicine. United States. It is a significant occupati...

2013
Tim Güneysu Tobias Oder Thomas Pöppelmann Peter Schwabe

Novel public-key cryptosystems beyond RSA and ECC are urgently required to ensure long-term security in the era of quantum computing. The most critical issue on the construction of such cryptosystems is to achieve security and practicability at the same time. Recently, lattice-based constructions were proposed that combine both properties, such as the lattice-based digital signature scheme pres...

Journal: :IEEE Trans. Human-Machine Systems 2016
José Creissac Campos Manuel Sousa Miriam C. Bergue Alves Michael D. Harrison

This paper describes the application of the IVY workbench to the formal analysis of a user interface for a safetycritical aerospace system. The operations manual of the system was used as a requirements document and this made it possible to build a reference model of the user interface, focusing on navigation between displays, the information provided by each display and how they are interrelat...

2013
Michael Wu Guohui Wang Bei Yin Christoph Studer Joseph R. Cavallaro

This paper compares two implementations of reconfigurable and high-throughput turbo decoders. The first implementation is optimized for an NVIDIA Kepler graphics processing unit (GPU), whereas the second implementation is for an Intel Ivy Bridge processor. Both implementations support max-log-MAP and log-MAP turbo decoding algorithms, various code rates, different interleaver types, and all blo...

2013
Yao Zhang Mark Sinclair Andrew A. Chien

We study the performance portability of OpenCL across diverse architectures including NVIDIA GPU, Intel Ivy Bridge CPU, and AMD Fusion APU. We present detailed performance analysis at assembly level on three exemplar OpenCL benchmarks: SGEMM, SpMV, and FFT. We also identify a number of tuning knobs that are critical to performance portability, including threads-data mapping, data layout, tiling...

Journal: :Journal of Polymer Science Part A: Polymer Chemistry 2000

2013
Gianni ARIOLI Filippo GAZZOLA

The spectacular collapse of the Tacoma Narrows Bridge, which occurred in 1940, has attracted the attention of engineers, physicists, and mathematicians in the last 70 years. There have been many attempts to explain this amazing event. Nevertheless, none of these attempts gives a satisfactory and universally accepted explanation of the phenomena visible the day of the collapse. The purpose of th...

Journal: :Human reproduction update 2015
Carlos Simon Denny Sakkas David K Gardner Hilary O D Critchley

Carlos Simon1,2,, Denny Sakkas3, David K. Gardner4, and Hilary O.D. Critchley5 Igenomix, Parc Cientific Universitat de Valencia, Valencia, Spain Department of Obstetrics and Gynecology, University of Valencia, INCLIVA Health Research Institute, Fundación IVI, Valencia, Spain Boston IVF, Waltham, MA, USA School of BioSciences, University of Melbourne, Parkville, VIC, Australia MRC Centre for Rep...

2011
Emma V White Birgitta Gatersleben

Recently there has been a surge in the number of green roofs and façades (vegetation on the roofs & walls of a building) installed in the UK, with advocation of their use by policy-makers and claims that they are aesthetically pleasing and promote restoration. But these claims rely on generalisations from different landscapes, raising concerns about validity. The present study examined whether ...

2004
Piyush Agarwal Harry C. Li

We survey four secure fault-tolerance distributed file systems: Farsite, OceanStore, Ivy, and Frangipani. We analyze each with respect to fault-tolerance, scalability, usability, maintenance overhead, and consistency. Finally, we present a taxonomy for such file systems based upon their failure models, update mechanisms, and data location schemes.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید