نتایج جستجو برای: in adequate details

تعداد نتایج: 16984920  

Journal: :Mathematical Problems of Computer Science 2018

Journal: :Proceedings of the Edinburgh Mathematical Society 1981

2006
P. Y. A. Ryan

I describe the challenges involved in designing and evaluating high assurance, verifiable voting systems. I describe the Pret a Voter scheme that provides voterverifiablity with minimal trust in officials, software etc. I also describe a number of threats against voting schemes and the extent to which they apply to the basic Pret a Voter scheme. Some enhancements to the scheme designed to count...

2007
Venkatesh Prasad Ranganath

Program Slicing is a technique of identifying parts (slice) of a program that may influence or be influenced by a given set of program points (slice criteria). This technique has been extensively applied to program understanding. In the Bandera project [7], the application of program slicing was considered to reduce the size of the model extracted from concurrent Java programs for the purpose o...

2007
Henry Muccini Alexander Romanovsky

Building trustworthy (dependable) systems is a major challenge faced by software developers. To this end, various fault tolerance mechanisms have been developed by researchers and used in industry. Unfortunately, more often than not these solutions ignore earlier development phases most importantly, the architecture design to exclusively focus on the implementation instead. This creates a dange...

2014
Kalyaperumal Muruganandham Avijit Kumar Santosh Kumar

Crossed fused renal ectopia is a rare anomaly and may be associated with pelvic ureteric junction obstruction (PUJO). The L-shaped fusion variety is even rarer. We report such a case with a crossed fused ectopic pelvic kidney (L-type) with PUJO and its successful laparoscopic management. Through this report we emphasize the importance of adequate preoperative imaging and intraoperative details ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید