نتایج جستجو برای: implementation

تعداد نتایج: 361910  

2016
Amy Streater Aimee Spector Elisa Aguirre Jacki Stansfeld Martin Orrell

BACKGROUND Research reporting results of clinical trials, psychosocial or technological interventions frequently omit critical details needed to inform implementation in practice. The aim of this article is to develop an Implementation Readiness (ImpRess) checklist, that includes criteria deemed useful in measuring readiness for implementation and apply it to trials of cognitive stimulation in ...

2013
Joey Huchette

Fig. 1. A scatterplot with extreme overplotting (left), with random jitter (middle) and the result from our constraint-based layout framework (right). Abstract—This work explores the connection between statistical data visualization problems and simulated physical systems. Applying techniques for constraint-based layout, data points are treated as physical objects under the influence of forces ...

Journal: :Frontiers in psychiatry 2016
Theresa M. Fleming Derek de Beurs Yasser Khazaal Andrea Gaggioli Giuseppe Riva Cristina Botella Rosa M. Baños Filippo Aschieri Lynda M. Bavin Annet Kleiboer Sally Merry Ho Ming Lau Heleen Riper

Internet interventions for mental health, including serious games, online programs, and apps, hold promise for increasing access to evidence-based treatments and prevention. Many such interventions have been shown to be effective and acceptable in trials; however, uptake and adherence outside of trials is seldom reported, and where it is, adherence at least, generally appears to be underwhelmin...

2017
Matus Telgarsky

Currently in the course we are showing that we can approximate continuous functions on compact sets with piecewise constant functions; in other words, with boxes. We will finish this today. Remaining in the representation section we still have: polynomial fit of continuous functions, functions we can fit succinctly, and GANs. Remark 1.1 (Homework comment.). A brief comment about problem 2(c); i...

2016
Jana-Rebecca Rehse Philip Hake Peter Fettke Peter Loos

Reference modeling offers attractive bene®ts for both research and practice. The inductive strategy for reference model development derives reference models by generalizing individual enterprise models. It has recently gained attention in research, however, its practical application still faces numerous challenges. The objective of the article at hand is to identify recent contributions to the ...

Journal: :Neural Networks 1989
Etienne Deprit

The recurrent buck-propagation ulgorithm for nearal nefwaorks has been implemerr~etl on the C’orlnecrion Machine. a massively purullel processor. Two fandamerr~ully different Lqq&~ architectlrrt~s underlying the nets Klere trsted: one bused on arcs. the other on node\. Confirming the predominunce of’ (,o1~11111(tIi(,(ltioll over compururion. peyformunce meusuremenls nnderscore Ihe necessi& lo m...

2012
Cynthia C. S. Liem Nicola Orio Geoffroy Peeters Markus Schedl

In this paper, we give an overview of the MusiClef Brave New Task at MediaEval 2012. After introducing the background of the task and related initiatives in the music information retrieval domain, we give an overview of the actual task and baseline results obtained for a reference implementation by the task organizers.

1996
Anders Åström Erik Åstrand

This paper shows the power of the combination of smart sensor technique and real-time parallel processing. This implementation results in a very compact system which consists only of four cameras and an extension board to a PC.

2005
Kent Inge Simonsen Vebjørn Moen Kjell Jørgen Hole

Key generation on resource-constrained devices is a challenging task. This paper describes a proof-of-concept implementation of an attack on Sun’s reference implementation of the Mobile Information Device Profile (MIDP). It is known that this implementation has a flaw in the generation of the premaster secret in SSL. The attack recovers the symmetric keys and plaintext from an SSL session.

2007
Diego Zamboni James Riordan Milton Yates

We propose a system for detecting scanning-worm infected machines in a local network. Infected machines are detected after a few unsuccesful connection attempts, and in cooperation with the border router, their traffic is redirected to a honeypot for worm identification and capture. We discuss the architecture of the system and present a sample implementation based on a Linux router. We discuss...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید