نتایج جستجو برای: abstractin this article

تعداد نتایج: 6208878  

2009
Hong Yu Shashank Agarwal Mark Johnston Aaron Cohen

BACKGROUND Biomedical scientists need to access figures to validate research facts and to formulate or to test novel research hypotheses. However, figures are difficult to comprehend without associated text (e.g., figure legend and other reference text). We are developing automated systems to extract the relevant explanatory information along with figures extracted from full text articles. Such...

2017
Michael Weisberg

Although most philosophical accounts about model/world relations focus on structural mappings such as isomorphism, similarity has long been discussed as an alternative account. Despite its attractions, proponents of the similarity view have not provided detailed accounts of what it means that a model is similar to a realworld target system. This article gives the outlines of such an account, dr...

2005
F. Nerling

The light signal measured by fluorescence telescopes receives strongly depending on the shower geometry with respect to the detector a non-negligible contribution from additionally produced Cherenkov light. This Cherenkov contribution has to be accounted for to determine primary parameters properly. In comparison to the previous ansatz used by other experiments, the impact of a new analytical d...

2006
A. Chiavassa W. Walkowiak

Data taken during half a year of operation of 10 LOPES antennas (LOPES-10), triggered by EAS observed with KASCADE-Grande have been analysed. We report about the analysis of correlations of radio signals measured by LOPES-10 with extensive air shower events reconstructed by KASCADE-Grande, including shower cores at large distances. The efficiency of detecting radio signals induced by air shower...

Journal: :Lecture Notes in Computer Science 2022

AbstractIn this paper, we follow the line of existing study on cryptographic enforcement Role-Based Access Control (RBAC). Inspired by relation between security definitions for such system, identify two different types attacks which cannot be captured ones. Therefore, propose new towards goal appropriately modelling policies and our In addition, show that cost supporting dynamic policy update i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید