نتایج جستجو برای: gaming
تعداد نتایج: 8061 فیلتر نتایج به سال:
The framework of dependency pairs allows automated termination and innermost termination proofs for many TRSs where such proofs were not possible before. In this paper we present a reenement of this framework in order to prove termination in a modular way. Our mod-ularity results signiicantly increase the class of term rewriting systems where termination resp. innermost termination can be prove...
Hardware forensic analysis involves the process of analyzing digital evidence derived from digital sources. The analysis is done to facilitate and prove either the device is used to commit crime, whether it contains evidence of a crime or is the target of a crime. Gambling machines serve as the main source by which illegal games are conducted. This paper presents a method for retrieving informa...
Serious video games have been proposed as a means to engage students with the Science, Technology, Engineering, Mathematics (STEM) curriculum, but there is limited research on the required game elements and teaching practices. In particular, there is limited evidence on the effects of the storytelling element and of student involvement in making games on the learning performance and on the atti...
Operator product expansion technique is analyzed in abelian and nonabelian field theoretical models with confinement. Special attention is paid to the regimes where nonzero virtuality of vacuum fields is felt by external currents. It is stressed that despite the physics of confinement is sometimes considered as being caused by " soft " fields, it can exhibit the pronounced " hard " effects in OPE.
The known solutions to the equation τ(p) ≡ 0 (mod p) were p = 2, 3, 5, 7, and 2411. Here we present our method to compute the next solution, which is p = 7758337633. There are no other solutions up to 10.
Therefore 0 + l)* s P + 1 mod p\ Now put t=<r + vp, (0 < c r < p 1). Then ^ = cr̂ , 0 + l)*' s (er + 1)*" mod p. Therefore (er + l)* = a + 1 mod p, (0 < a < p 1). This is relation (7) of my previous note; from this follows (1) as in the earlier treatment. Hence (1) is satisfied by all primes of the form Qn + 1. Therefore the test can be useful only when the exponent p is 3 or is of the form 6n — 1.
The importance of virtual team (VT) identification for the success of theteam is widely recognized in literature. However, the antecedents of identifi-cation in virtual teams have remained understudied thus far. This study aimsat filling this gap by examining how identification with VTs is related to struc-tural factors such as the degree of virtuality, team size, cultural d...
Gambling machines serve as the principal means by which illegal games are conducted. This paper presents a method for retrieving information from seized gaming machines along with an analysis of the interpreted information to prove that the gaming machine was used illegally. The process is illustrated using a machine seized from a suspected illegal gambling operation. A detailed gambling machin...
Background and aims The paper "Chaos and confusion in DSM-5 diagnosis of Internet Gaming Disorder: Issues, concerns, and recommendations for clarity in the field" by Kuss, Griffiths, and Pontes (in press) critically examines the DSM-5 diagnostic criteria for Internet gaming disorder (IGD) and addresses the issue of whether IGD should be reconceptualized as gaming disorder, regardless of whether...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید