Results 1 to 10 of about 7,141,900 (207)

On the Input-Degradedness and Input-Equivalence Between Channels [PDF]

open access: yes2017 IEEE International Symposium on Information Theory (ISIT), 2017
A channel $W$ is said to be input-degraded from another channel $W'$ if $W$ can be simulated from $W'$ by randomization at the input. We provide a necessary and sufficient condition for a channel to be input-degraded from another one.
Nasser, Rajai
core   +4 more sources

Input invariants

open access: yesProceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022
How can we generate valid system inputs? Grammar-based fuzzers are highly efficient in producing syntactically valid system inputs. However, programs will often reject inputs that are semantically invalid. We introduce ISLa, a declarative specification language for context-sensitive properties of structured system inputs based on context-free grammars.
Dominic Steinhöfel, Andreas Zeller
openaire   +2 more sources

Importance of Electrode Selection and Number in Reconstructing Standard Twelve Lead Electrocardiograms

open access: yesBiomedicines, 2023
Many clinical and consumer electrocardiogram (ECG) devices collect fewer electrodes than the standard twelve-lead ECG and either report less information or employ algorithms to reconstruct a full twelve-lead signal.
Adam A. Butchy   +4 more
doaj   +1 more source

Integrasi Sistem ERP, Arus Informasi Dan Kualitas Informasi

open access: yesJurnal Akademi Akuntansi, 2022
This paper aims to provide empirical evidence regarding the relationship between the level of integration of ERP systems and the quality of information perceived by managers directly and indirectly. The quality of information is affected by the presence
Muhammad Nawawi, Edward Fazri
doaj   +1 more source

Models for Generation of Proof Forest in zk-SNARK Based Sidechains

open access: yesCryptography, 2023
Sidechains are among the most promising scalability and extended functionality solutions for blockchains. Application of zero knowledge techniques (Latus, Mina) allows for reaching high level security and general throughput, though it brings new ...
Yuri Bespalov   +4 more
doaj   +1 more source

Decision Support System for Supplier Selection on Time Concept with AHP and SAW Method

open access: yesJurnal Riset Informatika, 2022
Seeing the rapid development of global business causes companies to compete as the best to meet global market demands. In the current era of globalization, technological development is beneficial for human life.
Warih Dwi Cahyo   +3 more
doaj   +1 more source

First Genomic Evidence of a Henipa-like Virus in Brazil

open access: yesViruses, 2022
The viral genus Henipavirus includes two highly virulent zoonotic viruses of serious public health concern. Hendra henipavirus and Nipah henipavirus outbreaks are restricted to Australia and Southeast Asia, respectively.
Leonardo H. Almeida Hernández   +9 more
doaj   +1 more source

Debugging inputs

open access: yesProceedings of the ACM/IEEE 42nd International Conference on Software Engineering: Companion Proceedings, 2020
When a program fails to process an input, it need not be the program code that is at fault. It can also be that the input data is faulty, for instance as result of data corruption. To get the data processed, one then has to debug the input data—that is, (1) identify which parts of the input data prevent processing, and (2) recover as much of the ...
Lukas Kirschner   +2 more
openaire   +2 more sources

Determining the Environmental Effects of Bean and Lentil Production by Life Cycle Assessment Method) Case Study: Yasuj City( [PDF]

open access: yesJournal of Agricultural Science and Sustainable Production, 2021
Background and Objective: The study was conducted to evaluate the environmental effects of the production process of two types of the most important legumes (beans and lentils) in Yasuj.
Madineh Vahabipoor   +2 more
doaj   +1 more source

Input Independence

open access: yes, 2023
We establish the following input independence principle. If a quantum circuit $\mathcal C$ computes a unitary transformation $U_μ$ along a computation path $μ$, then the probability that computation of $\mathcal C$ follows path $μ$ is independent of the input.
Gurevich, Yuri, Blass, Andreas
openaire   +2 more sources

Home - About - Disclaimer - Privacy