نتایج جستجو برای: alice code

تعداد نتایج: 173826  

2007
Dale Parsons Patricia Haden

Computer science educators continue to develop new ways to support the teaching of introductory programming. Among some of the most popular new tools are Visual Programming Languages (VPL), which provide graphical interfaces for code construction and program display. In this paper we explore the use of Alice, a sophisticated VPL for building 3D animated scenes. When used in conjunction with a t...

2014
Thanumalayan Sankaranarayana Pillai Vijay Chidambaram Ramnatthan Alagappan Samer Al-Kiswany Andrea C. Arpaci-Dusseau Remzi H. Arpaci-Dusseau

We present the first comprehensive study of applicationlevel crash-consistency protocols built atop modern file systems. We find that applications use complex update protocols to persist state, and that the correctness of these protocols is highly dependent on subtle behaviors of the underlying file system, which we term persistence properties. We develop a tool named BOB that empirically tests...

2016
Masahito Hayashi

We assume that Eve and Bob are connected to Alice with additive white Gaussian noise, and their noises are correlated. We mathematically formulate the correlation between their noises, and optimize Eve’s strategy. We give a necessarily and sufficient condition to generate the agreed secure key between Alice and Bob even with the Eve’s optimal strategy. Further, in this setting, we give a concre...

Behrang Torabi Laleh Masiha

The present research tries to show how race, class, and gender and intersectionality in general, have their decisive impact on the black- American women; and how Alice Walker as a womanist, in her selected short stories, tries to show that black women in the U.S. suffer two-fold acts of oppression and discrimination, i.e. male violence affects all women in social life, irrespective of age or so...

Journal: :Anuário de Literatura 2012

2012
Indradip Banerjee Souvik Bhattacharyya Gautam Sanyal

Encrypted messages sending frequently draws the attention of third parties, perhaps causing attempts to break and reveal the original messages. Steganography is introduced to hide the existence of the communication by concealing a secret message in an appropriate carrier like text, image, audio or video. Quantum steganography where the sender (Alice) embeds her steganographic information into t...

2015
Taehong Cho Daejin Kim Sahyang Kim

This study explores the relationship between prosodic strengthening and linguistic contrasts in English by examining temporal realization of nasals in CVN# and #NVC, and their coarticulatory influence on vowels. Results show that different sources of prosodic strengthening bring about different types of linguistic contrasts. Prominence increased N-duration ([nasality]) but the vowel’s [orality]...

Journal: :HNPS Advances in Nuclear Physics 2023

Experimental excitation functions of isotopes produced in reactions p + natSi are compared with the results nuclear reaction program TALYS 1.95 and semi-empirical cross section formulas. We consider 7 (28Mg, 26Al, 24,22Na, 18F 10,7Be) at bombarding energies 20-144 MeV. They predictions code 1.95, formulas Silberberg-Tsao (code yieldx) SPACS. Comparisons previously published ALICE made. The pred...

2003
F. Carminati A. Morsch

ALICE, the experiment dedicated to the study of heavy ion collisions at the LHC, uses an object-oriented framework for simulation, reconstruction and analysis (AliRoot) based on ROOT. Here, we describe the general ALICE simulation strategy and those components of the framework related to simulation. Two main requirements have driven the development of the simulation components. First, the possi...

Journal: :Revista Letras Raras 2018

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید