نتایج جستجو برای: implementation
تعداد نتایج: 361910 فیلتر نتایج به سال:
BACKGROUND Research reporting results of clinical trials, psychosocial or technological interventions frequently omit critical details needed to inform implementation in practice. The aim of this article is to develop an Implementation Readiness (ImpRess) checklist, that includes criteria deemed useful in measuring readiness for implementation and apply it to trials of cognitive stimulation in ...
Fig. 1. A scatterplot with extreme overplotting (left), with random jitter (middle) and the result from our constraint-based layout framework (right). Abstract—This work explores the connection between statistical data visualization problems and simulated physical systems. Applying techniques for constraint-based layout, data points are treated as physical objects under the influence of forces ...
Internet interventions for mental health, including serious games, online programs, and apps, hold promise for increasing access to evidence-based treatments and prevention. Many such interventions have been shown to be effective and acceptable in trials; however, uptake and adherence outside of trials is seldom reported, and where it is, adherence at least, generally appears to be underwhelmin...
Currently in the course we are showing that we can approximate continuous functions on compact sets with piecewise constant functions; in other words, with boxes. We will finish this today. Remaining in the representation section we still have: polynomial fit of continuous functions, functions we can fit succinctly, and GANs. Remark 1.1 (Homework comment.). A brief comment about problem 2(c); i...
Reference modeling offers attractive bene®ts for both research and practice. The inductive strategy for reference model development derives reference models by generalizing individual enterprise models. It has recently gained attention in research, however, its practical application still faces numerous challenges. The objective of the article at hand is to identify recent contributions to the ...
The recurrent buck-propagation ulgorithm for nearal nefwaorks has been implemerr~etl on the C’orlnecrion Machine. a massively purullel processor. Two fandamerr~ully different Lqq&~ architectlrrt~s underlying the nets Klere trsted: one bused on arcs. the other on node\. Confirming the predominunce of’ (,o1~11111(tIi(,(ltioll over compururion. peyformunce meusuremenls nnderscore Ihe necessi& lo m...
In this paper, we give an overview of the MusiClef Brave New Task at MediaEval 2012. After introducing the background of the task and related initiatives in the music information retrieval domain, we give an overview of the actual task and baseline results obtained for a reference implementation by the task organizers.
This paper shows the power of the combination of smart sensor technique and real-time parallel processing. This implementation results in a very compact system which consists only of four cameras and an extension board to a PC.
Key generation on resource-constrained devices is a challenging task. This paper describes a proof-of-concept implementation of an attack on Sun’s reference implementation of the Mobile Information Device Profile (MIDP). It is known that this implementation has a flaw in the generation of the premaster secret in SSL. The attack recovers the symmetric keys and plaintext from an SSL session.
We propose a system for detecting scanning-worm infected machines in a local network. Infected machines are detected after a few unsuccesful connection attempts, and in cooperation with the border router, their traffic is redirected to a honeypot for worm identification and capture. We discuss the architecture of the system and present a sample implementation based on a Linux router. We discuss...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید