نتایج جستجو برای: chal

تعداد نتایج: 220  

2002
Ludmila Cherkasova Yun Fu Wenting Tang Amin Vahdat

Understanding and measuring end to end service performance perceived by the clients is a chal lenging task Client perceived web site responses are downloaded web pages Typically a web page is composed from multiple objects a main HTML le and several embedded objects such as images However HTTP does not provide any means to delimit the beginning or the end of a web page to e ectively measure the...

2013
Ioan Alexandru Ivan Gilgueng Hwang Joel Agnus Nicolas Chaillet Stéphane Régnier

Date of publication: 8 October 2012 The Fastest Mobile Microrobots in the World R ecent advances in micro/nanotechnologies and microelectromechanical systems have enabled micromachined mobile agents. Highly dynamic mobile microrobots are believed to open the gate for various future applications. However, at the submillimeter scale, the adhesion effects dominate physics, especially in the air en...

Journal: :Journal of artificial intelligence and technology 2023

This empirical study examines ChatGPT as an educational and learning tool. It investigates the opportunities chal-lenges that provides to students instruc-tors of communication, business writing, composition courses. also strives provide recommendations. After conducting 30 theory-based application-based tests, it is found has potential replacing search engines accurate relia-ble input students...

Journal: :Karbala international journal of modern science 2023

Development of an accurate forecasting model for effective prediction Quality Service (QoS) parameters inter-net things (IoT) based web services is highly desired, such that it improves service management and user experience. Mostly, QoS are volatile in nature which make the IoT recommendation process chal-lenging. Artificial neural network (ANN) models found to be worthy modeling nonlinear par...

Journal: :IACR Cryptology ePrint Archive 2014
Ari Juels Thomas Ristenpart

We introduce honey encryption (HE), a simple, general approach to encrypting messages using low min-entropykeys such as passwords. HE is designed to produce a ciphertext which, when decrypted with any of a number ofincorrect keys, yields plausible-looking but bogus plaintexts called honey messages. A key benefit of HE is that itprovides security in cases where too little entropy...

2006
Thierry Hennet Giuseppe Bertoni Christoph Richter Ernst Peterhans

Tumor necrosis factor (TNF) kills some types of tumor cells in vitro and participates in tumor elimination in vivo. TNF has been shown to kill cells by altering their mitochondria structurally and functionally. The oncogene l<( I -2 codes for a protein located in the inner membrane of mitochondria which is able to inhibit the commitment to cell death in various cell types. We have therefore inv...

2005
Tore A. Nielsen

The notion that dreaming is isolated from sensory activity is chal/~ng~d by demonstrations that somatosensory stimuli are frequently incorporated illlo dreiUlI colllent. To further study such effects, four volunteers were administered pressure stimulation to either the left or the right leg during REM sleep and awakened to report tlu:ir dreams. These dreams were rated and compared to non-stimul...

1997
Prasad Chalasani Somesh Jha Kevin Sullivan

Prototyping is often used to predict, or reduce the uncertainty over, the future profitability of a software design choice. Boehm [1] pioneered the use of techniques from statistical decision theory to provide a basis for making prototyping decisions. However his approach does not apply to situations where the software engineer has the flexibility of waiting for more information before making a...

2007
Yann Laigle-Chapuy

1 Finding new classes of permutation polynomials is a chal-lenging problem with applications in cryptography, coding theory andin combinatorial designs [1]. We will here focus on a specific instanceraised by Patarin in his paper introducig HFE [2], namely characterizingquadratic permutation polynomials. After a survey of existing results, wewill present our extension of some...

1998
Pieter J Mosterman Eric J Manders

This paper reviews our work on monitoring prediction and fault isolation methods for complex dynamic sys tems a ected by abrupt faults The key to this work has been our ability to model the transient behavior in response to these faults in a qualitative framework where the predicted transient e ects of hypothesized faults are captured in the form of signatures that spec ify future behavior for ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید