نتایج جستجو برای: only
تعداد نتایج: 1357814 فیلتر نتایج به سال:
A large number of encrypted German Army radio messages, from 1941 and 1945, have survived the end of the Second World War to the present day. Most of these messages are enciphered on the three-wheel, steckered Wehrmacht Enigma. We present an account of a ciphertext-only cryptanalysis of these messages and give details of the Enigma procedures used in the networks.
Copyright held by the owner/author(s). CHI’18 Extended Abstracts, April 21–26, 2018, Montreal, QC, Canada ACM 978-1-4503-5621-3/18/04. https://doi.org/10.1145/3170427.3188563 Abstract We present Codestrate Packages, a package-based system to create extensible software within Codestrates. Codestrate Packages turns content creation from an applicationcentric model into a document-centric model. C...
We introduce a nominal actor-based language and study its expressive power. We have identified the presence/absence of fields as a relevant feature: the dynamic creation of names in combination with fields gives rise to Turing completeness. On the other hand, restricting to stateless actors gives rise to systems for which properties such as termination are decidable. Such decidability result ho...
In process mining, one of the main challenges is to discover a process model, while balancing several quality criteria. This often requires repeatedly setting parameters, discovering a map and evaluating it, which we refer to as process exploration. Commercial process mining tools like Disco, Perceptive and Celonis are easy to use and have many features, such as log animation, immediate paramet...
Barriers to use health related quality of life measuring systems include the time needed to complete the forms and the need for staff to be trained to understand the results. An ideal system of health assessment needs to be clinically useful, timely, sensitive to change, culturally sensitive, low burden, low cost, involving for the patient and built into standard procedures. A new generation of...
We present an enumerative technique for encoding and decoding dc-free runlength-limited sequences. This technique enables the encoding and decoding of sequences approaching the maxentropic performance bounds very closely in terms of code rate and low-frequency suppression capability. Use of finite-precision floating-point notation to express the weight coefficients results in channel encoders a...
Controlling object graphs and giving specific semantics to references (such as read-only, ownership, scoped sharing) has been the focus of a large body of research in the context of static type systems. Controlling references to single objects and to graphs of objects is essential to be able to build more secure systems, but is notoriously hard to achieve in absence of static type systems. In t...
BACKGROUND The ankle is frequently injured in sporting activities, and therefore it is frequently protected with prophylactic ankle taping. This study aimed first, to compare the mechanical fatigue of two types of prophylactic ankle taping after 30 minutes of intense exercise, one made with elastic tape (ET) and the other with inelastic tape (IT), and second, to investigate the subjects' percep...
Methods Retrospective study was conducted at WH. This included a total of 1806 women who underwent to C-section from Jan 2008 to Dec 2009. The risk factor data were collected from I.C surveillance notification form of each patient’s SSI. The risk factors which were studied included: age, SSI bundles, type of C-section elective or emergency, duration of operation (less or more than 57 minutes), ...
Dobson JL, Linderholm T, Yarbrough MB. Self-testing produces superior recall of both familiar and unfamiliar muscle information. Adv Physiol Educ 39: 309–314, 2015; doi:10.1152/advan.00052.2015.— Dozens of studies have found learning strategies based on the “testing effect” promote greater recall than those that rely solely on reading; however, the advantages of testing are often only observed ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید