نتایج جستجو برای: کد alice

تعداد نتایج: 12588  

2009
Pooya Farshim

Intuition. Suppose that your lecturer writes the number 25927 on the board and asks everyone in the class for its prime factorisation. Immediately Alice, who is incidentally a friend of the lecturer, shouts 11 × 2357. What conclusion can be drawn from this? Can we conclude that Alice is very good at factoring integers? It might haven been the case that Alice’s favourite primes are 11 and 2357 a...

2010
Stephan Dominique Andres

This type of game was introduced by Bodlaender [2]. He considers a variant, which we will call game g, in which Alice must move first and passing is not allowed. In order to obtain upper and lower bounds for a parameter associated with game g, two other variants are useful. In the game B Bob may move first. He may also miss one or several turns, but Alice must always move. In the other variant,...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه زنجان - دانشکده علوم پایه 1390

وانادیم-48 ( %50=+? و %50=ec و d 16= t1/2) ساطع کننده اشعه گاما و پوزیترون می باشد. این رادیودارو نقش مهمی در پزشکی هسته ای به عنوان رادیوداروی درمانی دارد.. وانادیم-48 برای جلوگیری از گرفتگی عروق خون رسان کلیه مورد استفاده قرار می گیرد. در این پروژه تابع برانگیختگی وانادیم-48 توسط دو کد محاسباتی alice/ash و talys-1.0 برای واکنش های هسته ای 48ti(p,n)48v، 48ti(d,2n)48v،natti(p,x)48v و 49ti(p,2...

Journal: :Extended Outlooks: The Iowa Review Collection of Contemporary Writing by Women 1981

2009
Elizabeth V. Howard Donna Evans Jill Courte

In previous studies, we have used quantitative methods to examine the effectiveness of the Alice programming language in terms of student enjoyment, confidence, and learning outcomes. However, in terms of the overall quality of a learning experience, quantitative measures provide only part of the story. This paper reports on the use of Alice from a student perspective using qualitative data gat...

Journal: :Australasian J. Combinatorics 2012
Andrés Cordón-Franco Hans van Ditmarsch David Fernández-Duque Joost J. Joosten Fernando Soler-Toscano

Consider three players Alice, Bob and Cath who hold a, b and c cards, respectively, from a deck of d = a+ b+ c cards. The cards are all different and players only know their own cards. Suppose Alice and Bob wish to communicate their cards to each other without Cath learning whether Alice or Bob holds a specific card. Considering the cards as consecutive natural numbers 0, 1, ..., we investigate...

Journal: :iranian journal of science and technology (sciences) 2009
m. haji-shafeieha

beryllium chemical combination has a considerable effect on the design and fabrication of the241am9be neutron source. in this investigation the beryllium combinations were studied as a generator ofneutrons with various mass percentage, and the neutron yields were also calculated using the results of thealice and srim codes calculations per unit incident charge. the neutron yields of beryllium ...

Journal: :CoRR 2016
Abhinav Aggarwal Varsha Dani Thomas P. Hayes Jared Saia

Alice and Bob are connected via a two-way binary channel. This paper describes an algorithm to enable Alice to send a message to Bob when 1) an oblivious adversary flips an unknown number of bits, T , on the channel; and 2) the message length L, and a desired error probability, ǫ are public knowledge. With probability at least 1− ǫ, our algorithm ensures that Bob receives the correct message, a...

1998
Adam Meyers Catherine Macleod Roman Yangarber Ralph Grishman Leslie Barrett Ruth Reeves

This paper describes how NOMLEX, a dictionary of nominalizations, can be used in Information Extraction (IE). This paper details a procedure which maps syntactic and semantic information designed for writing an IE pattern for an active clause (IBM appointed Alice Smith as vice president) into a set of patterns for nominaliza-tions (e.g., IBM's appointment of Alice Smith as vice president and Al...

2010
Nebojsa Milosavljevic

In this work we study the problem of confidential communication when different resources of randomness are available. We start with the relay channel where source observations are available at each terminal. We study the scenario where the transmitter (Alice) sends a private message to the destination (Bob), which is confidential to the relay (Eve). Alice and Bob also want to agree on a secret ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید