Can they be trusted?

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Reliability of Computer Predictions: Can They Be Trusted?

The issue of reliability of computer predictions of physical events is examined as the goal of verification and validation processes. It is argued that verification, both solution and code verification, can be carried out with a high degree of confidence, even though much remains to be done to improve and advance verification procedures. It is validation of mathematical models that stands as th...

متن کامل

Can CLI be trusted?

Calling Line Identification (CLI) tells the recipient of a telephone call the number at the other end of the line. However, various insecurities mean that even on traditional telephone systems, CLI cannot be entirely relied upon to be accurate. Once Voice-overIP (VoIP) enters the picture, CLI validity effectively depends upon the integrity of Internet traceability, and must therefore be treated...

متن کامل

Fluctuation Analysis: Can Estimates Be Trusted?

The estimation of mutation rates and relative fitnesses in fluctuation analysis is based on the unrealistic hypothesis that the single-cell times to division are exponentially distributed. Using the classical Luria-Delbrück distribution outside its modelling hypotheses induces an important bias on the estimation of the relative fitness. The model is extended here to any division time distributi...

متن کامل

How can secure software be trusted?

The security of software applications is a major concern, especially for information owners, software developers and users. Increasingly, these stakeholders need to be confident that the software applications being developed are secure and can be trusted when used in the intended environment. However, a problem exists in terms of how to confidently address the security of software applications ...

متن کامل

Can Elliptic Curve Cryptography Be Trusted?

Many smart card, cell phone, Internet of Things (IoT) and Bitcoin businesses have already implemented elliptic curve cryptography (ECC), and for good reason. This asymmetric encryption and decryption method is shown by the US National Institute of Standards and Technology (NIST) and third-party studies to significantly outperform its biggest competitors, offering significantly shorter keys, low...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: African Journal of Health Professions Education

سال: 2018

ISSN: 2078-5127

DOI: 10.7196/ajhpe.2018.v10i4.1173