نتایج جستجو برای: isis

تعداد نتایج: 2014  

2000
Masaki Wakabayashi Hideharu Amano

Performance estimation is essential for designing and investigating of new architectures including multiprocessors. Software simulation is one of the most common methods, since there is no limitation on device technology nor hardware configuration. Although lots of software simulators have been developed and used, they must be modified for each distinct target system. For designers of new archi...

Journal: :Applied Computing and Informatics 2022

Purpose Social networks (SNs) have recently evolved from a means of connecting people to becoming tool for social engineering, radicalization, dissemination propaganda and recruitment terrorists. It is no secret that the majority Islamic State in Iraq Syria (ISIS) members are Arabic speakers, even non-Arabs adopt nicknames. However, literature researching subject deals with non-Arabic languages...

ژورنال: :گنجینه اسناد 0

0

Journal: :Journal of Aesthetics & Culture 2017

Journal: :Nature Biotechnology 2013

2008
Valérie Emin

This paper presents our research works and our proposal : ISiS model (Intentions, Strategies, interactional Situations), a conceptual framework elaborated to structure the design of learning scenarios using Information and Communication Technologies by teachers-designers. This framework is based on a goal-oriented approach and proposes to clearly identify intentional, strategic, tactical and op...

Journal: :Journal of chemical information and computer sciences 2004
Thomas Ott Albert Kern Ansgar Schuffenhauer Maxim Popov Pierre Acklin Edgar Jacoby Ruedi Stoop

For the clustering of chemical structures that are described by the Similog, ISIS count, and ISIS binary fingerprints, we propose a sequential superparamagnetic clustering approach. To appropriately handle nonbinary feature keys, we introduce an extension of the binary Tanimoto similarity measure. In our applications, data sets composed of structures from seven chemically distinct compound clas...

2016
Limin Zhou Zhengming Hu Fengju Lv

In this paper, we first present a new lattice-based PKE scheme on SIS, proving that it achieves CPA-security under DBi-ISIS assumption. Compared to some lattice-based schemes, ours has some advantages and is quite efficient as well as great simplicity. Similarly, we give a lattice-based PKE with multiple bits which is CPA secure under DBi-ISIS assumption. We hope that our contributions help to ...

2015
X. F. Miao L. Caron Z. Gercsi A. Daoud-Aladine N. H. van Dijk

X. F. Miao, L. Caron, Z. Gercsi, A. Daoud-Aladine, N. H. van Dijk, and E. Br€ uck Fundamental Aspects of Materials and Energy, Faculty of Applied Sciences, Delft University of Technology, Mekelweg 15, 2629 JB Delft, The Netherlands Max Planck Institute for Chemical Physics of Solids, N€ othnitzer Strabe 40, D-01187 Dresden, Germany Blackett Laboratory, Department of Physics, Imperial College Lo...

2009
V. R. Fanelli J. M. Lawrence C. H. Wang A. D. Christianson E. D. Bauer K. J. McClellan E. A. Goremychkin

V. R. Fanelli*, J. M. Lawrence, C. H. Wang, A. D. Christianson, E. D. Bauer, K. J. McClellan, E. A. Goremychkin and R. Osborn University of California Irvine, Irvine, CA 92697, USA Los Alamos National Laboratory, Los Alamos, NM 87545, USA Oak Ridge National Laboratory, Oak Ridge,TN 37831, USA Argonne National Laboratory, Argonne, IL 60439, USA ISIS Facility, Appleton Rutherford Laboratory, Chil...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید