Ernst L Wynder MD DrSc hc (mult) Dr med hc, 1922-1999

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ernst Wynder: citation analysis.

Ernst Wynder published nearly 800 papers during his lifetime. I used the ISI Web of Science to analyze his publications and the subsequent literature citing his work. More than half of his papers were published in just ten journals, including Cancer, Preventive Medicine (which he founded and edited), JNCI, and Cancer Research. The 87 papers in Cancer covered all of the major cancer sites includ...

متن کامل

MICAL Analyses HC-Gammon

We analyse Pollack and Blair’s HC-Gammon backgammon program using a new technique that performs Monte Carlo simulations to derive a Markov Chain model for Imperfect Comparison ALgorithms, called the MICAL method, which models the behavior of the algorithm using a Markov chain, each of whose states represents a class of players of similar strength. The Markov chain transition matrix is populated...

متن کامل

Stream Cipher HC - 256 ?

HC-256 is a software-efficient stream cipher. It generates keystream from a 256-bit secret key and a 256-bit initialization vector. The encryption speed of the C implementation of HC-256 is about 1.9 bits per clock cycle (4.2 cycles/byte) on the Intel Pentium 4 processor.

متن کامل

M2ICAL Analyses HC-Gammon

We analyse Pollack and Blair’s HC-Gammon backgammon program using a new technique that performs Monte Carlo simulations to derive a Markov Chain model for Imperfect Comparison ALgorithms, called the MICAL method, which models the behavior of the algorithm using a Markov chain, each of whose states represents a class of players of similar strength. The Markov chain transition matrix is populated...

متن کامل

Some observations on HC-128

In this paper, we use linear approximations of the addition modulo 2 of three n-bit integers to identify linear approximations of g1, g2, the feedback functions of HC-128. This, in turn, shows that the process of keystream output generation of HC-128 can be well approximated by linear functions. In this direction, we show that the “least significant bit” based distinguisher (presented by the de...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Tobacco Control

سال: 1999

ISSN: 0964-4563

DOI: 10.1136/tc.8.4.444