Results 11 - 20
of
94
unknown title
"... Tips on writing a good report A good report of your project is like a short scientific paper. It should therefore have a title, abstract, introduction, material & methods (or model) section, results, discussion, and list of references. There are courses and booklets on how to write a good paper, ..."
Abstract
- Add to MetaCart
, and we trust you all know the basic things like, number your pages, label your axis, use a spelling-checker, etcetera. Here we basically provide a short list of suggestions to turn your report into an exciting story. • Most importantly, a good paper reads like a good story. Do not paste a large number
and
, 2015
"... Effective support for custom proof automation is essential for large-scale interactive proof develop-ment. However, existing languages for automation via tactics either (a) provide no way to specify the behavior of tactics within the base logic of the accompanying theorem prover, or (b) rely on adva ..."
Abstract
- Add to MetaCart
of typed tactical primitives. We avoid the need to touch the trusted kernel type-checker of Coq by encapsulating uses of these new tactical primitives in a monad, and instrumenting Coq so that it executes monadic tactics during type inference. 1
A Study of User-Friendly Hash Comparison Schemes
"... Abstract—Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans may make a mistake or require significant time and patience to accurately compare the hash values. To improve usab ..."
Abstract
- Add to MetaCart
Abstract—Several security protocols require a human to compare two hash values to ensure successful completion. When the hash values are represented as long sequences of numbers, humans may make a mistake or require significant time and patience to accurately compare the hash values. To improve usability during comparison, a number of researchers have proposed various hash representations that use words, sentences, or images rather than numbers. This is the first work to perform a comparative study of these hash comparison schemes to determine which scheme allows the fastest and most accurate comparison. To evaluate the schemes, we performed an online user study with more than 400 participants. Our findings indicate that only a small number of schemes allow quick and accurate comparison across a wide range of subjects from varying backgrounds. Keywords-Security; Human factors I.
Towards Secure Electronic Workflows Examples of Applied PKI Supervisor:
, 2006
"... Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006 ..."
Abstract
- Add to MetaCart
Hiermit versichere ich, die vorliegende Diplomarbeit selbstständig und unter ausschliesslicher Verwendung der angegebenen Quellen und Hilfsmittel angefertigt zu haben. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehörde vorgelegen. Darmstadt, 14. Februar 2006
unknown title
"... One of the many conundrums for leaders, particularly for those in small businesses, is that innovation and risk are virtually inseparable. Without constant innovation, a business may be overtaken rapidly by more nimble competitors – and the pace at which this leapfrogging takes place appears to be i ..."
Abstract
- Add to MetaCart
well and making the changes that will keep you ahead of the market is exceedingly difficult, especially when the cost of failure may be the future of the business. Leaders need three key resources to keep on top of this balance: • the space to step back, reflect and refocus • trusted peers who they can
Secure Geographic Routing in Wireless Sensor Networks
, 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract
- Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.
(School of Social Sciences)
"... This study would not have been possible without the continued support from several people whose contributions I heartily acknowledge: Prof. Sylvester N. S. Madu, my supervisor, under whose scholarly guidance I studied. I admired his calmness during difficult times of restructuring my work. His commi ..."
Abstract
- Add to MetaCart
commitment to his work and the ability to give firm advice were graciously expressed through his interest in African psychotherapy; his love for research and his experience in working therapeutically in Africa. Your efforts are more valuable than words can say. Without your support at that crucial time
Welcome Dear Colleagues,
"... Like it or not, the transition to eLearning is occurring at a rapid pace. Our children are growing up with eLearning and, indeed, are being called “digital natives. ” College students can barely remember living without computers and may well be making decisions about Sebastian Vos which courses to t ..."
Abstract
- Add to MetaCart
'll find three articles making up the first installment of Library Connect’s new “Next Gen ” section. Isn’t it fitting, while talking about eLearning, to hear from Next Gen librarians Erika Bennett, Megan Curran and Guofu Qian discussing the subject? (You can see their fulltext articles at www
RICE UNIVERSITY Regime Change: Sampling Rate vs. Bit-Depth in Compressive Sensing
, 2011
"... The compressive sensing (CS) framework aims to ease the burden on analog-to-digital converters (ADCs) by exploiting inherent structure in natural and man-made signals. It has been demon-strated that structured signals can be acquired with just a small number of linear measurements, on the order of t ..."
Abstract
- Add to MetaCart
The compressive sensing (CS) framework aims to ease the burden on analog-to-digital converters (ADCs) by exploiting inherent structure in natural and man-made signals. It has been demon-strated that structured signals can be acquired with just a small number of linear measurements, on the order
Title of Document: QUANTUM MECHANICS AND QUANTUM INFORMATION THEORY
"... The principle aim of this dissertation is to investigate the philosophical application of quantum information theory to interpretational issues regarding the theory of quantum mechanics. Recently, quantum information theory has emerged as a potential source for such an interpretation. The main quest ..."
Abstract
- Add to MetaCart
question with which this dissertation will be concerned is whether or not an information-theoretic interpretation can serve as a conceptually acceptable interpretation of quantum mechanics. It will be argued that some of the more obvious approaches – that quantum information theory shows us that ultimately
Results 11 - 20
of
94