نتایج جستجو برای: alice code
تعداد نتایج: 173826 فیلتر نتایج به سال:
The rate of jets expected in ALICE was determined using PYTHIA. We first calculated the inclusive jet cross section in pp̄ collision at √ s=1.8 TeV and compared it to the data of the D0 experiment[1]. As shown in Fig. 1, the PYTHIA calculation, up-scaled by K=1.5, describes the data reasonably well. The calculation was performed in three runs differing by the value of the CKIN(50) parameter whic...
Zusammenfassung: ALICE ist eines der vier Experimente des Large Hadron Colliders LHC, die derzeit am CERN in Genf gebaut werden. Wenn das Experiment seinen Betrieb aufnimmt, wird es Daten mit einer Rate von bis zu 2 Petabyte pro Jahr aufzeichnen. Die hieraus resultierenden Anforderungen an das LHC Computing Modell führten zur Ausbildung mehrerer Grid-Projekte, u.a. dem gemeinsamen Grid-Projekt ...
Steganographic schemes for digital images are routinely designed and benchmarked based on feedback obtained on the standard image set called BOSSbase 1.01. While standardized image sets are important for advancing the field, relying on results from a single source may not provide fair benchmarking and may even lead to designs that are overoptimized and highly suboptimal on other image sources. ...
We describe a simple scheme that allows an agent to learn about its environment in an unsupervised manner. Our scheme pits two versions of the same agent, Alice and Bob, against one another. Alice proposes a task for Bob to complete; and then Bob attempts to complete the task. In this work we will focus on two kinds of environments: (nearly) reversible environments and environments that can be ...
This research investigates the implementation of the programming language Alice to teach computer programming logic to computer information systems students. Alice has been implemented in other university settings and has been reported to have many benefits including object-oriented concepts and an engaging and fun learning environment. In this study, students were surveyed on their opinions ab...
In public key cryptography, the security of traditional methods is based on number theoretic problems, and suffers from high computational cost due to problems such as dealing with large numbers. Each user in a public key system has a pair of cryptographic keys, consisting a public key and a private key. These are related through a hard mathematical inversion problem, so that the private key ca...
We study the following problem: two agents Alice and Bob are connected to each other by independent discrete memoryless channels. They wish to generate common randomness, i.e., agree on a common random variable, by communicating interactively over the two channels. Assuming that Alice and Bob are allowed access to independent external random sources at rates (in bits per step of communication) ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید