نتایج جستجو برای: alice code

تعداد نتایج: 173826  

2002
D. Mískowiec P. Braun-Munzinger

The rate of jets expected in ALICE was determined using PYTHIA. We first calculated the inclusive jet cross section in pp̄ collision at √ s=1.8 TeV and compared it to the data of the D0 experiment[1]. As shown in Fig. 1, the PYTHIA calculation, up-scaled by K=1.5, describes the data reasonably well. The calculation was performed in three runs differing by the value of the CKIN(50) parameter whic...

2004
K. Schwarz

Zusammenfassung: ALICE ist eines der vier Experimente des Large Hadron Colliders LHC, die derzeit am CERN in Genf gebaut werden. Wenn das Experiment seinen Betrieb aufnimmt, wird es Daten mit einer Rate von bis zu 2 Petabyte pro Jahr aufzeichnen. Die hieraus resultierenden Anforderungen an das LHC Computing Modell führten zur Ausbildung mehrerer Grid-Projekte, u.a. dem gemeinsamen Grid-Projekt ...

2016
Vahid Sedighi Jessica J. Fridrich Rémi Cogranne

Steganographic schemes for digital images are routinely designed and benchmarked based on feedback obtained on the standard image set called BOSSbase 1.01. While standardized image sets are important for advancing the field, relying on results from a single source may not provide fair benchmarking and may even lead to designs that are overoptimized and highly suboptimal on other image sources. ...

Journal: :CoRR 2017
Sainbayar Sukhbaatar Ilya Kostrikov Arthur Szlam Rob Fergus

We describe a simple scheme that allows an agent to learn about its environment in an unsupervised manner. Our scheme pits two versions of the same agent, Alice and Bob, against one another. Alice proposes a task for Bob to complete; and then Bob attempts to complete the task. In this work we will focus on two kinds of environments: (nearly) reversible environments and environments that can be ...

2010
Leah Schultz

This research investigates the implementation of the programming language Alice to teach computer programming logic to computer information systems students. Alice has been implemented in other university settings and has been reported to have many benefits including object-oriented concepts and an engaging and fun learning environment. In this study, students were surveyed on their opinions ab...

Journal: :CoRR 2016
Yang Zhang

In public key cryptography, the security of traditional methods is based on number theoretic problems, and suffers from high computational cost due to problems such as dealing with large numbers. Each user in a public key system has a pair of cryptographic keys, consisting a public key and a private key. These are related through a hard mathematical inversion problem, so that the private key ca...

Journal: :IEEE Trans. Information Theory 1998
Sivarama Venkatesan Venkat Anantharam

We study the following problem: two agents Alice and Bob are connected to each other by independent discrete memoryless channels. They wish to generate common randomness, i.e., agree on a common random variable, by communicating interactively over the two channels. Assuming that Alice and Bob are allowed access to independent external random sources at rates (in bits per step of communication) ...

Journal: :Climacteric 2015

Journal: :Revista Eletrônica de Comunicação, Informação e Inovação em Saúde 2015

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید