نتایج جستجو برای: competition

تعداد نتایج: 85745  

2000
Lee H. Wurm

This study compared models of auditory word recognition as they relate to the processing of polymorphemic pseudowords. Semantic transparency ratings were obtained in a preliminary rating study. The effects of morphological structure, semantic transparency, prefix likelihood, and morphemic frequency measures were examined in a lexical decision experiment. Reaction times and errors were greater f...

Journal: :Archives of sexual behavior 2004
Todd K Shackelford Aaron T Goetz Craig W LaMunyon Brian J Quintus Viviana A Weekes-Shackelford

We explored aspects of men's and women's short-term sexual psychology as a function of a potential short-term partner's relationship status. A total of 209 men and 288 women reported how likely they would be to pursue a casual sexual relationship with an attractive member of the opposite sex who was (1) married, (2) not married but has casual sexual partners, or (3) not married and has no casua...

Journal: :J. Philosophical Logic 2004
David J. Anderson Edward N. Zalta

∗This paper was published in the Journal of Philosophical Logic, 33/1 (2004): 1–26. The authors would like to thank C.A. Anderson, Thomas Hofweber, Jeffrey Kegler, and Kai Wehmeier for their comments on this paper. The paper was presented in its current form at the Seminar für Philosophie, Logik, und Wissenschaftstheorie, Universität München. We gratefully acknowledge the audience feedback. †An...

Journal: :Trends in ecology & evolution 2005
Menno Schilthuizen

Love darts are hard 'needles' that many snails and slugs use to pierce their partner during mating. In a few species, darts have been shown to play a role in sperm competition. Two new papers, by Davison et al., and Koene and Schulenburg, might further pique researchers' interest, because they show how the full potential of darts can be tapped for studies of sexual selection in hermaphrodites.

Journal: :IACR Cryptology ePrint Archive 2016
Jos Wetzels

In this document we present an overview of the background to and goals of the Password Hashing Competition (PHC) as well as the design of its winner, Argon2, and its security requirements and properties.

Journal: :Health policy 2013
Kieke G H Okma Luca Crivelli

This article addresses three topics. First, it reports on the international interest in the health care reforms of Switzerland and The Netherlands in the 1990s and early 2000s that operate under the label "managed competition" or "consumer-driven health care." Second, the article reviews the behavior assumptions that make plausible the case for the model of "managed competition." Third, it anal...

Journal: :The Hastings Center report 2008
David DeGrazia

Common sense and empirical evidence suggest that single-payer health insurance, combined with competitive private delivery, would be the most cost-effective way of achieving the major, widely accepted goals of health care reform. Among the current presidential candidates, Kucinich and Gravel have the most promising reform proposals, with Edwards's and Obama's as fall-backs.

Journal: :Australasian J. Combinatorics 2000
Béla Bollobás Chula J. Jayawardene Jiansheng Yang Yi Ru Huang Cecil C. Rousseau Zhang Ke Min

It has been conjectured that r(Cnl Km) = (m 1)(n 1) + 1 for all (n, m) =1= (3,3) satisfying n ~ m. We prove this for the case m = 5. * This author is currently pursuing post-doctoral studies under Prof. Bollobas Australasian Journal of Combinatorics 22(2000), pp.63-71

2009
Kate Smith-Miles

Copyright c ©2009, Australian Computer Society, Inc. This paper appeared at the Eighth Australasian Data Mining Conference (AusDM 2009), Melbourne, Australia. Conferences in Research and Practice in Information Technology (CRPIT), Vol. 101, Paul J. Kennedy, Kok-Leong Ong and Peter Christen, Ed. Reproduction for academic, not-for profit purposes permitted provided this text is included. Proc. of...

2015
Christian Forler Eik List Stefan Lucks Jakob Wenzel

In this work we provide an overview of the candidates of the Password Hashing Competition (PHC) regarding to their functionality, e.g., client-independent update and server relief, their security, e.g., memory-hardness and side-channel resistance, and its general properties, e.g., memory usage and flexibility of the underlying primitives. Furthermore, we formally introduce two kinds of attacks,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید