نتایج جستجو برای: good enough

تعداد نتایج: 511039  

2002
Gorm Salomonsen

Recently, Ivan Damgaard and Mads Jurik proposed a protocol for protecting Internet voters against hackers. The protocol ensures that hackers with full control of the computer of a voter will be unable to see what the voter votes. Further, if the hacker tampers with the vote and tricks the voter to vote for a different candidate, the vote will be for an arbitrary candidate (uniformly distributed...

2005
Maxim Mozgovoy Kimmo Fredriksson Daniel R. White Mike Joy Erkki Sutinen

Introduction. The large class sizes typical for an undergraduate programming course mean that it is nearly impossible for a human marker to accurately detect plagiarism, particularly if some attempt has been made to hide the copying. While it would be desirable to be able to detect all possible code transformations we believe that there is a minimum level of acceptable performance for the appli...

1996
Juan Carlos Candeal Juan Ramo

We study continuity in extensive measurement which is related to the existence of continuous additive utility functions on semigroups. In the particular case of groups we obtain a continuous version of the classical Ho lder's theorem on Archimedeaness, and in the general case we introduce some conditions that guarantee additive representability, and then we analyze when they are good enough to ...

2001
P. Natoli

We present a parallel implementation of a map-making algorithm for CMB anisotropy experiments which is both fast and efficient. We show for the first time a Maximum Likelihood, minimum variance map obtained by processing the entire data stream expected from the Planck Surveyor, under the assumption of a symmetric beam profile. Here we restrict ourselves to the case of the 30 GHz channel of the ...

2014
Zheng Wang Ruimin Hu Chao Liang Qingming Leng Kaimin Sun

Person re-identification, aiming to identify images of the same person from various cameras configured in difference places, has attracted plenty of attention in the multimedia community. Previous work mainly focuses on feature presentation and distance measure, and achieves promising results on some standard databases. However, the performance is still not good enough due to appearance changes...

2003
Konstantin Beznosov

This paper examines practices of eXtreme Programming (XP) on the subject of their application to the development of security solutions. We introduce eXtreme Security Engineering (XSE), an application of XP practices to security engineering, and discuss its potential benefits and the scope of its applicability. We argue that XSE could help achieve “good enough security” while avoiding defining a...

Journal: :Management Science 2007
John D. Sterman Rebecca Henderson Eric D. Beinhocker Lee I. Newman

Neoclassical models of strategic behavior have yielded many insights into competitive behavior, despite the fact that they often rely on a number of assumptions—including instantaneous market clearing and perfect foresight—that have been called into question by a broad range of research. Researchers generally argue that these assumptions are “good enough” to predict an industry’s probable equil...

2008
Pierre Métral N Ducret A Patris P Steunou

Introduction Rehabilitation and post-acute geriatry is a large field with a large panel of hospitals in France (1800). The French specific classification Groupes Homogène de Journées (GHJ280 groups), developed in 1996, is neither good enough for easy use in health politics nor for funding. A new casemix model, based on the same medical dataset and on analytic cost data, has been developed with ...

2013
Michel Botbol

Person centeredness appears increasingly as a major concept for the health systems in most parts of the world. But its definition and the ways to implement it are still too vague to warrant good enough programs and policies to reach this ambition. The aim of “A practical guide to delivering personalization” is obviously to fill in this gap as indicated by the book’s subtitle: “person-centered p...

Journal: :Pattern Recognition 2006
María T. López Antonio Fernández-Caballero Miguel Angel Fernández José Mira Mira Ana E. Delgado

This paper describes a method for visual surveillance based on biologically motivated dynamic visual attention in video image sequences. Our system is based on the extraction and integration of local (pixels and spots) as well as global (objects) features. Our approach defines a method for the generation of an active attention focus on a dynamic scene for surveillance purposes. The system segme...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید