نتایج جستجو برای: keywords oriented perfect
تعداد نتایج: 2127587 فیلتر نتایج به سال:
Bugs are inevitable in any software development life cycle. Most bugs are detected and removed in the testing phase. In software, we can classify bugs into two categories: (1) bugs of different severity (2) bugs of different complexity. Prior knowledge of bug distribution of different complexity in software can help project managers in allocating testing resources and tools. Various researchers...
The main problem when going from taskoriented dialogue systems to interactive restricted-domain question answering systems is that the lack of task structure prohibits making simplifying assumptions as in task-oriented dialogue systems. In order to address this issue, we propose a solution that combines representations based on keywords extracted from the user utterances with machine learning t...
Normal graphs are defined in terms of cross-intersecting set families: a graph is normal if it admits a clique cover Q and a stable set cover S s.t. every clique in Q intersects every stable set in S. Normal graphs can be considered as closure of perfect graphs by means of co-normal products (K ̈orner [6]) and graph entropy (Czisz ́ar et al. [5]). Perfect graphs have been recently characterized a...
Recently, the quality of intrinsic CVD Diamond (CVD-D) has tremendously been improved. The replacement of the previous used silicon substrates for growth by ultra-pure HPHT Single-Crystal (SC) {100}-oriented diamond provides homo-epitaxial grown material almost free of structural defects. Nevertheless, all substrates nominally {100}oriented show a certain amount of off-angle declination from th...
The quantum error correction theory is as a rule formulated in a rather convoluted way, in comparison to classical algebraic theory. This work revisits the error correction in a noisy quantum channel so as to make it intelligible to engineers. An illustrative example is presented of a naïve perfect quantum code (Hamming-like code) with five-qubits for transmitting a single qubit of information....
The aim of this paper is to introduce a protocol for multicast distribution of secrets providing perfect forward and backward secrecy. The protocol is based on pairings on elliptic curves and has low cost communications and key storage. It is shown how this protocol improves some alternatives existing for real time communications. Keywords—Information security, multicast communications, ellipti...
Orthogonal arrays (OAs) are basic combinatorial structures, originally studied by statisticians motivated by their applications to design of experiments. In recent years, they have found numerous applications in computer science. Among their applications are derandomization of algorithms, random pattern testing of VLSI chips, authentication codes, universal hash functions, threshold schemes, an...
islam is a comprehensive school and covering some doctrine out of time and placefocusing on the issue of foreign policy as a matter of fundamental importanceattention. explaining the behavioral norms of islam in general subject of foreignpolicy, in particular in the most perfect expression in the teachings of the quran andis manifested in the tradition of the household. accordingly, by descript...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید