نتایج جستجو برای: hb jenkins
تعداد نتایج: 16563 فیلتر نتایج به سال:
The existence of a Kodaira fibration, i.e., of a fibration of a compact complex surface S onto a complex curve B which is a differentiable but not a holomorphic bundle, forces the geographical slope ν(S) = c 1 (S)/c2(S) to lie in the interval (2, 3). But up to now all the known examples had slope ν(S) ≤ 2 + 1/3. In this paper we consider a special class of surfaces admitting two such Kodaira fi...
Although there are many ways to deploy the Jenkins open-source automation server on Amazon Web Services (AWS), this whitepaper focuses on two specific approaches. First, the traditional deployment on top of Amazon Elastic Compute Cloud (Amazon EC2). Second, the containerized deployment that leverages Amazon EC2 Container Service (Amazon ECS). These approaches enable customers to take advantage ...
Previous Studies Although the operation of leucotomy is now over 20 years old only a few attempts at a controlled assessment of its therapeutic effect have been made (Penrose, 1944; Mettler, 1949, 1952; Friedman, Moore, Ranger, and Russman, 1951; Livingston, 1953; Jenkins and Holsopple, 1953; Freeman, Davis, East, Tait, Johnson, and Rogers, 1954; Jenkins, Holsopple, and Lorr, 1954; Medina, Pear...
MJ Fonseca, A Moreira, P Moreira, L Delgado, V Teixeira, P Padrão Faculty of Nutrition and Food Sciences, University of Porto, Porto, Portugal Department of Immunology, Faculty of Medicine, University of Porto, Porto, Portugal Department of Immunoallergology, Hospital of São João, Porto, Porto, Portugal Research Centre in Physical Activity, Health and Leisure, University of Porto, Porto, Portug...
Model identification is an important and complicated step within the autoregressive integrated moving average (ARIMA) methodology framework. This step is especially difficult for integrated series. In this article first investigate Box-Jenkins methodology and its faults in detecting model, and hence have discussed the problem of outliers in time series. By using this optimization method, we wil...
HB and HB+ are a shared secret-key authentication protocols designed for low-cost devices such as RFID tags. HB+ was proposed by Juels and Weis at Crypto 2005. The security of the protocols relies on the learning parity with noise (LPN) problem, which was proven to be NP-hard. The best known attack on LPN by Levieil and Fouque [13] requires subexponential number of samples and sub-exponential n...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید