نتایج جستجو برای: gambit tokens
تعداد نتایج: 5899 فیلتر نتایج به سال:
We investigate the computational complexity of the following problem. We are given a graph in which each vertex has an initial and a target color. Each pair of adjacent vertices can swap their current colors. Our goal is to perform the minimum number of swaps so that the current and target colors agree at each vertex. When the colors are chosen from {1, 2, . . . , c}, we call this problem c-Col...
In this essay I respond to Quentin Smith’s charge that ‘the date-analysis version of the tenseless theory of time cannot give adequate accounts of the truth conditions of the statements made by tensed sentence-tokens’ (Smith 1999, 236). His argument is based on an analysis of certain counterfactual situations that is at odds with the date-analysis account of language and hence succeeds only in ...
We present a novel scheme for indexing “hot spots” in conversations, such as poster sessions, based on the reaction of the audience. Specifically, we focus on laughters and non-lexical reactive tokens, which are presumably related with funny spots and interesting spots, respectively. A robust detection method of these acoustic events is realized by combining BIC-based segmentation and GMM-based...
Pigeons' demand and preference for specific and generalized tokens was examined in a token economy. Pigeons could produce and exchange different colored tokens for food, for water, or for food or water. Token production was measured across three phases, which examined: (1) across-session price increases (typical demand curve method); (2) within-session price increases (progressive-ratio, PR, sc...
Resettable hardware tokens, usually in the form of smart cards, are used for a variety of security-critical tasks in open environments. Many of these tasks require trusted hardware tokens. With the complexity of hardware, however, it is not feasible to check if the hardware contains an internal state or gives away information over side channels. This inspires the question of the cryptographic s...
上室性,心室性期外収縮,心房細動,心房粗動など 日常臨床で遭遇する頻脈性不整脈に対して,治療を目 的としてさまざまな抗不整脈薬が用いられる.しかし これまでは,実際の薬剤選択に適用可能なプラクティ カルなガイドラインはほとんど示されておらず,各担 当医の知識と経験に負うところが大きかった.特に近年 新しい強力な抗不整脈薬が次々と開発され,数多くの 薬剤を臨床で用いることができるようになってからは, それまで治療に抵抗していた不整脈がコントロール 可能になった反面,個々の症例に対してこれらの薬 剤をどのように選択し,使い分けて行くかが実際上大 きな問題になってきた.さらに最近では薬物療法のみ ならず,カテーテルアブレーションや植え込み型除細 動器などの非薬物療法の進歩も著しく,治療現場にお ける選択肢がますます広がっている点も考慮しなけれ ばならない. 一方,近年欧米で行われた抗不整脈...
This paper explores conversational grunts in a face-to-face setting. The study investigates the prosody and turn-taking effect of fillers and feedback tokens that has been annotated for attitudes. The grunts were selected from the DEAL corpus and automatically annotated for their turn taking effect. A novel suprasegmental prosodic signal representation and contextual timing features are used fo...
We continue the recent trend in cryptography to study protocol design in presence of tamper-proof hardware tokens. We present a very efficient protocol for password-based authenticated key exchange based on the weak model of one-time memory tokens, recently introduced by Goldwasser et al. (Crypto 2008). Our protocol only requires four moves, very basic operations, and the sender to send ` token...
We investigate the reduction of the palatal affricate /t ͡ ɕ/ both word-initially and word-medially in spoken Mandarin, using the CALLHOME corpus of informal telephone conversations. An overwhelming majority of the tokens shows reduction in both environments. The processes of reduction include voicing, deletion of obstruent acoustic cues, glide formation, and complete deletion of the segment. We...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید