نتایج جستجو برای: 0114

تعداد نتایج: 175  

Journal: :IJMC 2008
Judith Gebauer Ya Tang

In this paper, we apply the theory of task technology fit to mobile technology, focusing specifi−cally on the role of user mobility. We describe the results of an empirical study of 216 business users of mobile devices that included various smart phones, personal digital assistants (PDAs), and laptop computers. Our findings suggest that (1) the relationship between task difficulty and functiona...

2000
Chandra Krintz Brad Calder

Chandra Krintz Brad Calder University of California, San Diego Department of Computer Science and Engineering La Jolla, CA 92093-0114 f krintz, alderg s.u sd.edu Abstra t Dynami ompilation and optimization are widely used in heterogenous omputing environments, in whi h an intermediate form of the ode is ompiled to native ode during exe ution. An important tradeo exists between the amount of tim...

2002
G. Koenigsberger G. Canalizo A. Arrieta M. G. Richer L. Georgiev

We present high-resolution spectroscopic observations of the massive X-ray binary system LS I+65 010 (2S 0114+650) in the optical wavelength region. A correlation between equivalent width and radial velocity of photospheric absorption lines is found. The systemic velocity, inferred from the weaker lines, is Vhelio −31 ± 5 km s, which, if attributed solely to the Galactic rotation curve, implies...

1996
Mihir Bellare Ran Canetti Hugo Krawczyk

Pseudorandom function families are a powerful cryptographic primitive, yielding, in particular, simple solutions for the main problems in private key cryptography. Their existence based on general assumptions (namely, the existence of one-way functions) has been established. In this work we investigate new ways of designing pseudorandom function families. The goal is to find constructions that ...

1996
Mihir Bellare Ran Canetti Hugo Krawczyk

The use of cryptographic hash functions like MD5 or SHA for message authentication has become a standard approach in many Internet applications and protocols. Though very easy to implement, these mechanisms are usually based on ad hoc techniques that lack a sound security analysis. We present new constructions of message authentication schemes based on a cryptographic hash function. Our schemes...

1996
Richard J. Fateman Taku Tokuyasu Benjamin P. Berman Nicholas Mitchell

There is a wealth of mathematical knowledge that could be potentially very useful in many computational applications, but is not available in electronic form. This knowledge comes in the form of mechanically typeset books and journals going back more than one hundred years. Besides these older sources, there are a great many current publications, filled with useful mathematical information, whi...

Journal: :Frontiers in Neurology 2023

Background Chronic subdural hematoma (CSDH) is a neurosurgical condition with high prevalence. Many surgical approaches are recommended for treating CSDH, but there needs to be consensus on the optimal technique. This network meta-analysis (NMA) compared efficacy and safety of different treatments CSDH. Methods Electronic databases, including PubMed, Embase, Cochrane Library, were searched rele...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید