منابع مشابه
A Mind That Found Itself
Mind that Found Itself. By Clifford Whittingham Beers. New York and London: Longmans, Green & Co., 1908. Pp. 362. "A Mind that Found Itself" is a wonderfully graphic account of the wandering of a mind set adrift, recorded by that mind after it had once more found its moorings. The author describes, as only one who has experienced them can describe, the vividly realistic hallucinations and terri...
متن کاملA Production Line that Balances Itself
In \bucket brigade" manufacturing, such as recently introduced to the apparel industry, a production line has n workers moving among m stations, where each worker independently follows a simple rule that determines what to do next. Our analysis suggests and experiments con rm that if the workers are sequenced from slowest to fastest then, independently of the stations at which they begin, a sta...
متن کاملPublishing Data that Links Itself: A Conjecture
With the advent of RDFa and the at least partial support by major search engines, semantically structured data is more and more appearing on the Web. To enable high value use cases, links between entity descriptions need to be established. The linked data model suggests that links should be state explicitly by those who expose entity descriptions, but unlike on the normal web, incentives for do...
متن کاملThe Brain that Changes Itself
When I turned on my computer the other day, a notification greeted me to update my software. I clicked " okay " and marveled at the computer's capacity to improve itself. An hour or so later, my computer had improved its programs to run faster, cleaned up its layout to appear more modern, and deleted several useless programs. On many occasions, the brain has been compared to a computer in its v...
متن کاملSPHINX: A Password Store that Perfectly Hides from Itself
Password managers (aka stores or vaults) represent a security technique that allows a user to store and retrieve (usually high-entropy) passwords for her multiple passwordprotected services by interacting with a “device” serving the role of the manager (e.g., a smartphone or an online third-party service) on the basis of a single (low-entropy) master password. Existing password managers work we...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 2017
ISSN: 0028-0836,1476-4687
DOI: 10.1038/nature21907