1,296 research outputs found

    2-Amino-4,6-dimeth­oxy­pyrimidin-1-ium 2,2-dichloro­acetate

    Get PDF
    In the title salt, C6H10N3O2 +·C2HCl2O2 −, two cations and two anions are linked by N—H⋯O hydrogen bonds, forming chains along the c axis

    Comparing the Behavioral Models in Cyber-World Using Social Roles

    Get PDF
    Cyber-world is a typical form of social syndication. Although the future of cyber-world seems bright, not all efforts have succeeded. Therefore, knowing how to motivate users and keep them continually visiting is an important challenge for creating successful cyber-world Web sites. Since that human behaviour varies according to people’s different social roles, this study investigated four social roles (habitual, active, personal, and lurker) in the cyber-worlds. 729 users of i-Partment were used to test the research model. This study empirically confirms the existence of different behavioural models, and revealed the implications for theory and practice

    Task granularity analysis in logic programs

    Get PDF
    While logic programming languages offer a great deal of scope for parallelism, there is usually some overhead associated with the execution of goals in parallel because of the work involved in task creation and scheduling. In practice, therefore, the "granularity" of a goal, i.e. an estimate of the work available under it, should be taken into account when deciding whether or not to execute a goal concurrently as a sepárate task. This paper describes a method for estimating the granularity of a goal at compile time. The runtime overhead associated with our approach is usually quite small, and the performance improvements resulting from the incorporation of grainsize control can be quite good. This is shown by means of experimental results

    Exploring users’ behavioral model in Web 2.0 applications - The moderating effects of hedonic versus utilitarian motivations

    Get PDF
    The Web 2.0 trend has enhanced the overwhelming demand for more pervasive human space in online social interaction. Therefore, it is imperative for the practitioners of Web 2.0 websites to understand users’ motivations to participate and develop specific services to stimulate a long-term usage. This study has proposed a research model that explores the factors affecting users’ intentions to use Web 2.0 applications. In addition, user’s usage motivations (i.e. hedonic versus utilitarian) are also compared. The results revealed that users’ intentions to use Web 2.0 applications is influenced by usefulness, ease of use, enjoyment, and social presence. In addition, users’ hedonic versus utilitarian motivations has the moderating influences on the research model

    A WORLD OF PARADOX: IS THAT THE PUBLIC STATEMENT OR PRIVATE TALK IN VIRTUAL COMMUNITY?

    Get PDF
    Past studies mostly suggest that virtual community be the platform especially applicable for private exchange because people express themselves through hiding their real images and identities in online interaction. On the other hand, the anonymously private opinions at cyberspace are easily cited and forwarded as public ones because of the powerful search engines and hyperlink connections of internet. We consider that both public and private aspects coexist in the interaction of virtual community. This study is conducted as an interpretive research and uses the views of “front region” and “back region” in dramaturgical theory to unobtrusively observe a virtual community. We analyze the data upon hermeneutic circle to find out that the point of reference of the stage in virtual community is shaky. The virtual community can be both public and private channel at the same time just as the front region and back region overlapping. We also expect that the administrative team of every virtual community recognize the subject matter and elaborate an appropriate online environment for their members

    Efficient learning of tt-doped stabilizer states with single-copy measurements

    Full text link
    One of the primary objectives in the field of quantum state learning is to develop algorithms that are time-efficient for learning states generated from quantum circuits. Earlier investigations have demonstrated time-efficient algorithms for states generated from Clifford circuits with at most log(n)\log(n) non-Clifford gates. However, these algorithms necessitate multi-copy measurements, posing implementation challenges in the near term due to the requisite quantum memory. On the contrary, using solely single-qubit measurements in the computational basis is insufficient in learning even the output distribution of a Clifford circuit with one additional TT gate under reasonable post-quantum cryptographic assumptions. In this work, we introduce an efficient quantum algorithm that employs only nonadaptive single-copy measurement to learn states produced by Clifford circuits with a maximum of O(logn)O(\log n) non-Clifford gates, filling a gap between the previous positive and negative results.Comment: 6 page
    corecore