منابع مشابه
Uncertainty propagation or box propagation
This paper discusses the use of recently developed techniques and software in the numerical propagation of uncertainties in initial coordinates and/or parameters for initial value problems. We present an approach based on several validated numerical integration techniques but focusing on the propagation of boxes. The procedure uses a multivariable high order Taylor series development of the sol...
متن کاملBlack Box , State Box , and Clear Box Concepts
M a y / J u n e 2 0 0 0 I E E E S O F T W A R E 71 This was the situation in a company I worked for some years ago: people were whispering in the corners, discussing explanations and scapegoats—half-hearted attempts to put out the fire. We were rapidly losing money and self-respect, until one manager stepped forward and admitted: “This piece of software is fatal for us. We must completely rebui...
متن کاملLMOs: treasure chest or Pandora's box?
PrimerZ (http://genepipe.ngc.sinica.edu.tw/primerz/) is a web application dedicated primarily to primer design for genes and human SNPs. PrimerZ accepts genes by gene name or Ensembl accession code, and SNPs by dbSNP rs or AFFY_Probe IDs. The promoter and exon sequence information of all gene transcripts fetched from the Ensembl database (http://www.ensembl.org/) are processed before being pass...
متن کاملWhether or not to open Pandora’s box
Weitzman’s [13] search model requires that, conditional on stopping, theagent only takes boxes which have already been inspected. We relax thisassumption and allow the agent to take any uninspected box without in-specting its contents when stopping. Thus, each uninspected box is nowa potential outside option. This introduces a new trade-off: every timethe agent inspects a bo...
متن کاملWhite-Box Cryptography in the Gray Box
Implementations of white-box cryptography aim to protect a secret key in a white-box environment in which an adversary has full control over the execution process and the entire environment. Its fundamental principle is the map of the cryptographic architecture, including the secret key, to a number of encoded tables that shall resist the inspection and decomposition of an attacker. In a gray-b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Comunicar
سال: 2005
ISSN: 1134-3478,1988-3293
DOI: 10.3916/c25-2005-182