نتایج جستجو برای: alice code
تعداد نتایج: 173826 فیلتر نتایج به سال:
Computer science educators continue to develop new ways to support the teaching of introductory programming. Among some of the most popular new tools are Visual Programming Languages (VPL), which provide graphical interfaces for code construction and program display. In this paper we explore the use of Alice, a sophisticated VPL for building 3D animated scenes. When used in conjunction with a t...
We present the first comprehensive study of applicationlevel crash-consistency protocols built atop modern file systems. We find that applications use complex update protocols to persist state, and that the correctness of these protocols is highly dependent on subtle behaviors of the underlying file system, which we term persistence properties. We develop a tool named BOB that empirically tests...
We assume that Eve and Bob are connected to Alice with additive white Gaussian noise, and their noises are correlated. We mathematically formulate the correlation between their noises, and optimize Eve’s strategy. We give a necessarily and sufficient condition to generate the agreed secure key between Alice and Bob even with the Eve’s optimal strategy. Further, in this setting, we give a concre...
The present research tries to show how race, class, and gender and intersectionality in general, have their decisive impact on the black- American women; and how Alice Walker as a womanist, in her selected short stories, tries to show that black women in the U.S. suffer two-fold acts of oppression and discrimination, i.e. male violence affects all women in social life, irrespective of age or so...
Encrypted messages sending frequently draws the attention of third parties, perhaps causing attempts to break and reveal the original messages. Steganography is introduced to hide the existence of the communication by concealing a secret message in an appropriate carrier like text, image, audio or video. Quantum steganography where the sender (Alice) embeds her steganographic information into t...
This study explores the relationship between prosodic strengthening and linguistic contrasts in English by examining temporal realization of nasals in CVN# and #NVC, and their coarticulatory influence on vowels. Results show that different sources of prosodic strengthening bring about different types of linguistic contrasts. Prominence increased N-duration ([nasality]) but the vowel’s [orality]...
Experimental excitation functions of isotopes produced in reactions p + natSi are compared with the results nuclear reaction program TALYS 1.95 and semi-empirical cross section formulas. We consider 7 (28Mg, 26Al, 24,22Na, 18F 10,7Be) at bombarding energies 20-144 MeV. They predictions code 1.95, formulas Silberberg-Tsao (code yieldx) SPACS. Comparisons previously published ALICE made. The pred...
ALICE, the experiment dedicated to the study of heavy ion collisions at the LHC, uses an object-oriented framework for simulation, reconstruction and analysis (AliRoot) based on ROOT. Here, we describe the general ALICE simulation strategy and those components of the framework related to simulation. Two main requirements have driven the development of the simulation components. First, the possi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید