نتایج جستجو برای: retrievability

تعداد نتایج: 250  

Journal: :dental research journal 0
farahnaz nejatidanesh omid savabi maziar ebrahimi ghazal savabi

background: with regard to potential retrievability of cement-retained implant restorations, the retentive strength of the luting agents is critical. the aim of this study was to evaluate the retention values of implant-supported metal copings using different luting agents. materials and methods: twenty iti implant analogs and solid abutments of 5.5-mm height were embedded vertically in autopol...

Journal: :Psychology and aging 1992
A Cronin-Golomb M M Keane A Kokodis S Corkin J H Growdon

Three hypotheses that could account for deficits in the retrieval of category information in Alzheimer's disease (AD) were evaluated: abnormal organization, class- or category-specific vulnerability, and limitation by general factors, such as decreased processing speed. Relative to 18 elderly control subjects, 18 patients with AD produced fewer items in a category fluency task and had longer re...

Journal: :British journal of psychology 2013
Miguel A Vadillo Cristina Orgaz David Luque Pedro L Cobos Francisco J López Helena Matute

Current associative theories of contingency learning assume that inhibitory learning plays a part in the interference between outcomes. However, it is unclear whether this inhibitory learning results in the inhibition of the outcome representation or whether it simply counteracts previous excitatory learning so that the outcome representation is neither activated nor inhibited. Additionally, th...

2014
Kochumol Abraham

Outsourcing data to a remote Cloud Service Provider (CSP) is a growing trend for numerous organizations alleviating the burden of local data storage and maintenance. While Cloud computing makes these advantages more appealing than ever, it also brings new challenging security threats towards user’s outsourced data. It’s of crucial importance to customers to have strong evidence that they actual...

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2011
Mohammad Iftekhar Husain Steven Y. Ko Atri Rudra Steve Uurtamo

We consider the following problem that arises in outsourced storage: a user stores her data x on a remote server but wants to audit the server at some later point to make sure it actually did store x. The goal is to design a (randomized) verification protocol that has the property that if the server passes the verification with some reasonably high probability then the user can rest assured tha...

2013
Michael R. Line Heather Knutson Aaron S. Wolf Yuk L. Yung

Secondary eclipse spectroscopy provides invaluable insights into the temperatures and compositions of exoplanetary atmospheres. We carry out a systematic temperature and abundance retrieval analysis of eight exoplanets (HD189733b, HD149026b, GJ436b, WASP-12b, WASP-19b, WASP-43b, TrES-2b, and TrES-3b) observed in secondary eclipse using a combination of spaceand ground-based facilities. Our goal...

2011
Siavosh Benabbas Rosario Gennaro Yevgeniy Vahlis

We study the problem of computing on large datasets that are stored on an untrusted server. We follow the approach of amortized verifiable computation introduced by Gennaro, Gentry, and Parno in CRYPTO 2010. We present the first practical verifiable computation scheme for high degree polynomial functions. Such functions can be used, for example, to make predictions based on polynomials fitted t...

Journal: :Energiepolitik und Klimaschutz 2023

Abstract The Netherlands pursues a ‘dual strategy’—national and international—with regard to the management of radioactive waste spent fuel. On national level an above-ground facility was built in 1990s store for period at least 100 years. By around year 2130 geological disposal is envisaged be operational. also international strategy, which leaves possibility open collaboration with other Euro...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید