Television: silly box or magical box?

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Uncertainty propagation or box propagation

This paper discusses the use of recently developed techniques and software in the numerical propagation of uncertainties in initial coordinates and/or parameters for initial value problems. We present an approach based on several validated numerical integration techniques but focusing on the propagation of boxes. The procedure uses a multivariable high order Taylor series development of the sol...

متن کامل

Black Box , State Box , and Clear Box Concepts

M a y / J u n e 2 0 0 0 I E E E S O F T W A R E 71 This was the situation in a company I worked for some years ago: people were whispering in the corners, discussing explanations and scapegoats—half-hearted attempts to put out the fire. We were rapidly losing money and self-respect, until one manager stepped forward and admitted: “This piece of software is fatal for us. We must completely rebui...

متن کامل

LMOs: treasure chest or Pandora's box?

PrimerZ (http://genepipe.ngc.sinica.edu.tw/primerz/) is a web application dedicated primarily to primer design for genes and human SNPs. PrimerZ accepts genes by gene name or Ensembl accession code, and SNPs by dbSNP rs or AFFY_Probe IDs. The promoter and exon sequence information of all gene transcripts fetched from the Ensembl database (http://www.ensembl.org/) are processed before being pass...

متن کامل

Whether or not to open Pandora’s box

Weitzman’s [13] search model requires that, conditional on stopping, theagent only takes boxes which have already been inspected. We relax thisassumption and allow the agent to take any uninspected box without in-specting its contents when stopping. Thus, each uninspected box is nowa potential outside option. This introduces a new trade-off: every timethe agent inspects a bo...

متن کامل

White-Box Cryptography in the Gray Box

Implementations of white-box cryptography aim to protect a secret key in a white-box environment in which an adversary has full control over the execution process and the entire environment. Its fundamental principle is the map of the cryptographic architecture, including the secret key, to a number of encoded tables that shall resist the inspection and decomposition of an attacker. In a gray-b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Comunicar

سال: 2005

ISSN: 1134-3478,1988-3293

DOI: 10.3916/c25-2005-182