A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Modeling the effect of flow-induced mechanical erosion during coffee filtration
2021
Physics of Fluids
ACKNOWLEDGEMENT This research is supported by the Illycaffe' S.p.a. through the project "Modelling and simulating espresso coffee extraction at the mesoscopic scales". ...
The Gabriel graph 55 is obtained after all edges are examined. The neighboring grains are defined as those sharing an edge of the Gabriel graph. ...
Let's look at the microscopic picture of the erosion. As shown in Fig. 1 , we pick one surface particle for analysis. ...
doi:10.1063/5.0059707
fatcat:ec7gkkatcvdyzi5q3yeclyxd4y
Modular analysis and modelling of risk scenarios with dependencies
2010
Journal of Systems and Software
Acknowledgements The research presented in this report has been partly funded by the Research Council of Norway through the research projects COMA 160317 (Component-oriented model-based security analysis ...
risk analysis) and SECURIS (152839/ 220). ...
The UML use case diagram in Figure 9 shows the actors interacting with the instant messaging component. ...
doi:10.1016/j.jss.2010.05.069
fatcat:pn7zaslh2bg6lkea6lxua6obxq
COST IC1404 WG1 Deliverable WG1.1: State-of-the-art on Current Formalisms used in Cyber-Physical Systems Development
2019
Zenodo
It consists of a catalog of formalisms, modelling languages and tools for cyberphysical systems development. ...
Deliverable WG1.1 of working group 1 on foundations for multi-paradigm modeling for cyber-physical systems. ...
The members of WG1 envisage a collaboration with experts in the ontology domains to harness their knowledge in this matter. ...
doi:10.5281/zenodo.2538711
fatcat:itthyvenhfhmdn3f3jap7yf42y
Estimating Occupancy from Measurements and Knowledge Using the Bayesian Network for Energy Management
2019
Journal of Sensors
This algorithm makes use of domain knowledge gathered via questionnaires and recorded sensor data for motion detection, power, and hot water consumption as well as indoor CO2 concentration. ...
A general approach is proposed to determine occupant behavior (occupancy and activity) in offices and residential buildings in order to use these estimates for improved energy management. ...
Acknowledgments This work is supported by the French National Research Agency in the framework of the investissements d'avenir program (ANR-15-IDEX-02) (INVOVED and Eco-SESA, Comepos projects). ...
doi:10.1155/2019/7129872
fatcat:zb5cafba2bepzp6e2ikwfputni
Social and temporal structures in everyday collaboration
2004
Proceedings of the 2004 conference on Human factors in computing systems - CHI '04
interact, or even more heterogeneous graphs. ...
Social network analysis, as used in this discussion, is a way of interpreting sets of individual relationships and combining them into a collective picture of the structure of social interaction. ...
• the recipients and participants in interactions In order to simplify graph analysis, the sender's name is also stored in the receiver table. ...
doi:10.1145/985692.985762
dblp:conf/chi/FisherD04
fatcat:cx2jwuz3uvaino7vsayjbdo2zm
Polychronous design of embedded real-time applications
2007
ACM Transactions on Software Engineering and Methodology
Because of the difficulty in creating these systems and the consequences of failure, they require rigorous and reliable design approaches. ...
In particular, it shows promising results about the design of applications from the avionics domain. ...
ACKNOWLEDGMENTS We wish to thank David Berner and anonymous reviewers for their valuable comments on the previous versions of this article. ...
doi:10.1145/1217295.1217298
fatcat:jtos7pkvtnfnlbr6vgp2z6cr5m
Fusion-based register allocation
2000
ACM Transactions on Programming Languages and Systems
Graph fusion integrates spilling, splitting, and register assignment in a seamless fashion. Fusion-based register allocation is sensitive to the ordering of control-flow edges that connect regions. ...
Fusion-style register allocation starts off with constructing regions and applies graph fusion along control-flow edges to combine the interference graphs of regions into the interference graph for the ...
This knowledge is especially useful if the order of fusing graphs reflects either program structure or execution frequency. ...
doi:10.1145/353926.353929
fatcat:26k7trrefzfzjhwr7bzn3ul5ly
Proceedings of the 17th Dutch-Belgian Information Retrieval Workshop
[article]
2018
arXiv
pre-print
The committee accepted 4 short papers presenting novel work, 3 demo proposals, and 8 compressed contributions (summaries of papers recently published in international journals and conferences). ...
DIR aims to serve as an international platform (with a special focus on the Netherlands and Belgium) for exchange and discussions on research & applications in the field of information retrieval and related ...
ACKNOWLEDGMENTS The authors wish to thank the employees of Legal Intelligence for their cooperation in this research.
ACKNOWLEDGEMENTS Supported by "Google Digital News Initiative" 5 ...
arXiv:1812.04265v1
fatcat:ezpjxeybmnfhlooy6sk4yo62lm
People-to-People-to-Geographical-Places: The P3 Framework for Location-Based Community Systems
2004
Computer Supported Cooperative Work (CSCW)
ActiveMap) or on a matching virtual space that enables online interaction linked to physical location (e.g. Geonotes). In addition, each feature can be instantiated synchronously or asynchronously. ...
In this paper we examine an emerging class of systems that link People-to-People-to-Geographical-Places; we call these P3-Systems. ...
Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect those of the National Science Foundation. ...
doi:10.1007/s10606-004-2803-7
fatcat:z2qjav5xxbgxfj5zxehtv7mh74
Educational Technologies and Mathematics: Signature Pedagogies and Learner Impacts
2012
Computers in The Schools
In this article the author focuses on signature pedagogies that are associated with different forms of educational technologies. ...
The author categorizes forms of technologies that support the teaching and learning of mathematics in different ways, and identifies signature pedagogies associated with each category. ...
This category of technology can also be used in different knowledge handling ways (highlighting tools can be used and peer interactions often enable reformulation of knowledge); allows the mentor to select ...
doi:10.1080/07380569.2012.651092
fatcat:e4wcsh3m2fe6xlyvlhdahaiek4
A Systematic Mapping Study of Coffee Quality throughout the Production-to-Consumer Chain
2022
Journal of Food Quality
Coffee is one of the most consumed beverages in the world and is crucial in the economy of many developing countries. ...
In this work, we conducted a systematic mapping study of 1,470 articles to identify the aspects of quality that are the most important in the scientific literature to evaluate coffee throughout the processing ...
due to limited knowledge of the method. ...
doi:10.1155/2022/8019251
doaj:04471d0d5f42435dbddaf1fa487d24b9
fatcat:ovpsbc25qrf4nleq2gl4fmcjoi
Association between Caffeine Intake and All-Cause and Cause-Specific Mortality: An Analysis of the National Health and Nutrition Examination Survey (NHANES) 1999–2014 Database
2021
Nursing Reports
Sixty-four percent of adults in America drink coffee daily, and caffeine is the main reason people tend to drink coffee habitually. ...
The HRs for all-cause mortality were significantly lower in the participants with a caffeine intake of 100–200 mg/day (HR, 0.78; 95% CI, 0.67–0.91), and those with a caffeine intake of >200 mg/day (HR, ...
In the US, the standard value of caffeine quantity is 96 mg for an 8-oz cup of ground roasted coffee, 64 mg for instant coffee, 48 mg for tea, 30 mg for a 12-oz cola, 64 mg/oz for espresso, and 3 mg for ...
doi:10.3390/nursrep11040083
pmid:34968277
pmcid:PMC8715461
fatcat:qk3z4443mbaujlc6of7novqtlm
The Evolution of Android Malware and Android Analysis Techniques
2017
ACM Computing Surveys
With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. ...
This article presents a comprehensive survey on leading Android malware analysis and detection techniques, and their effectiveness against evolving malware. ...
Different types of static analysis, such as feature, graph, or structure-based (details in Section 4), may also be combined for a richer, more robust analysis. ...
doi:10.1145/3017427
fatcat:f2vdpgntincgvd4xv52l2ovray
Caffeine exposure during pregnancy, small for gestational age birth and neonatal outcome – results from the Norwegian Mother and Child Cohort Study
2019
BMC Pregnancy and Childbirth
We suggest diversity in neonatal outcomes of SGA infants according to the underlying cause of low birth weight. ...
Caffeine consumption from different sources was self-reported in gestational week 22. ...
Acknowledgements We are grateful to all participating families in Norway who take part in this on-going cohort study. ...
doi:10.1186/s12884-019-2215-9
pmid:30808339
pmcid:PMC6390347
fatcat:5uh3zcb4ovejvhlkneqr7apkpi
The language of privacy
2005
ACM Transactions on Computer-Human Interaction
I illustrate this method in several case studies that generate further analytical knowledge about privacy in video media spaces. ...
In this thesis I describe four major contributions that fundamentally change our understanding of the nature of privacy, its role in people's daily lives, and how it may be realised in computer supported ...
and in many instant messenger systems. ...
doi:10.1145/1067860.1067868
fatcat:zrkyacghsfdmzpn6zm7r442bke
« Previous
Showing results 1 — 15 out of 112 results