نتایج جستجو برای: and re

تعداد نتایج: 16851058  

1985
John Perry

In th is paper I introduce a contrast between homomorphic and non-homomorphic ascript ions of informational content to representations. In the former case there is a mapping from the parts of the representation onto the constituents of the content. In the l a t t e r case, there is not; some of the constituents of the content are set t led bj background factors. I contrast th is d i s t i nc t ...

2004
Catherine J. Stevens David Brennan Simon Parker

Auditory icons – or environmental sounds – have the potential to convey information by non-verbal means quickly and accurately. In addition, human listeners are quick to determine many qualities of an auditory object, such as location, distance, size, and motion, from acoustics of the signal. An experiment tests these two coupled assumptions in a controlled laboratory context. Stimuli consisted...

Introduction: Bone metastases are the most common cause of cancer-related pain in various primary malignant tumors, most often, breast and prostate. 188Re-hydroxyethylidene diphosphonate (188Re-HEDP) is a new and less expensive bone seeking radiopharmaceutical with favorable physical characteristics of the radionuclide such as short half life of 16.9h, maximal β energy of ...

Journal: :Theor. Comput. Sci. 1999
Ahmed Bouajjani Peter Habermehl

We address the veriication problem of FIFO-channel systems. We apply the symbolic analysis principle to these systems. We represent their sets of conngurations using structures called CQDD's combining nite-state automata with linear arith-metical constraints on number of occurrences of symbols. We show that CQDD's allow forward and backward reachability analysis of systems with nonregular sets ...

2016
Rui Pinheiro Nuno Roma Pedro Tomás

An accurate performance predictor to identify the most suitable core-architecture to execute each thread/workload in a heterogeneous many-core structure is proposed. The devised predictor is based on a linear regression model that considers several different parameters of the many-core processor architectures, including the cache size, issuewidth, re-order buffer size, load/store queues size, e...

2011
N. D. Vvedenskaya

The multi-server systems with dynamic routing protocol were investigated in a number of papers, see for example [1]-[9], in particular different asymptotic properties of such systems were investigated. Consider a system S with k servers {si}, i = 1, ..., k, and ` input Poisson flows {fj}, j = 1, ..., `, of intensity λj. Each flow is assigned to some subgroup Sj of mj, servers sj1 , ..., sjmj , ...

Journal: :CoRR 2012
Keying Li

Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into an encryption of the same message intended for Bob. Song Luo, Jianbin Hu, and Zhong Chen presented a novel ciphertext policy attribute-based proxy re-encryption (CP-AB-PRE) scheme. The ciphertext policy realized in their scheme is ANDgates policy supporting multi-value attributes, ne...

Journal: :INFORMS Journal on Computing 2013
Manuel A. Alba Martínez Jean-François Cordeau Mauro Dell'Amico Manuel Iori

The double traveling salesman problem with multiple stacks is a variant of the pickup and delivery traveling salesman problem in which all pickups must be completed before any of the deliveries. In addition, items can be loaded on multiple stacks in the vehicle and each stack must obey the last-in-first-out policy. The problem consists in finding the shortest Hamiltonian cycles covering all pic...

Journal: :international journal of reproductive biomedicine 0
nasrin majidi gharenaz mansoureh movahedin zohreh mazaheri shahram pour beiranvand

background: nowadays, oocytes and embryos vitrification has become a routine technique. based on clinical judgment, re-vitrification maybe required. but little is known about re-vitrification impact on genes expression. objective: the impact of re-vitrification on apoptotic and implanting genes, bax, bcl-2 and erbb4, at compaction stage embryos were evaluated in this study. materials and method...

2009
Hongbing Wang Zhenfu Cao

In a proxy re-encryption scheme, a ciphertext for Alice can be converted into a ciphertext for Bob with the help of a semi-trusted proxy, while the proxy gets no information about the messages encrypted under either key during the conversion. Proxy re-encryption has become more and more popular these years due to its practical applications. In this paper, we propose a fully secure proxy re-encr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید