نتایج جستجو برای: party program

تعداد نتایج: 492855  

Journal: :College & Research Libraries News 2021

What is currently on your librarian backburner? We’d be willing to make a few bets the content of those pots growing cold. Maybe we would find weeding project pause, draft an article gathering dust, or that meeting agenda you know can throw together only hours before actual meeting. LibGuides maintenance probably found most our backburners, too.When academic year begins and instruction requests...

Journal: :CoRR 2016
Markus Wagner Marius Lindauer Mustafa Misir Samadhi Nallaperuma Frank Hutter

Many real-world problems are composed of several interacting components. In order to facilitate research on such interactions, the Traveling Thief Problem (TTP) was created in 2013 as the combination of two wellunderstood combinatorial optimization problems. With this article, we contribute in four ways. First, we create a comprehensive dataset that comprises the performance data of 21 TTP algo...

2011
Yuan Hong Jaideep Vaidya Haibing Lu

In today’s networked world, resource providers and consumers are distributed globally and locally. However, with resource constraints, optimization is necessary to ensure the best possible usage of such scarce resources. Distributed linear programming (DisLP) problems allow collaborative agents to jointly maximize profits (or minimize costs) with a linear objective function while conforming to ...

Journal: :CoRR 2010
Glenn Langford

The Traveling Tournament Problem (TTP) is a challenging combinatorial optimization problem that has attracted the interest of researchers around the world. This paper proposes an improved search neighbourhood for the TTP that has been tested in a simulated annealing context. The neighbourhood encompasses both feasible and infeasible schedules, and can be generated efficiently. For the largest T...

2007
Radim Burget Dan Komosny Milan Simek

The current state of the RFC 3550 RTP/RTCP standard is not optimal for large-scale streaming sessions employing sourcespecific multicast and is currently the subject of research in many research laboratories. The most promising optimization for the RTP/RTCP protocol seems to be hierarchical aggregation [2], [3], [5], [6], [10], [11]. However, hierarchical aggregation has not yet completely solv...

Journal: :Studies in health technology and informatics 2004
Franz Ruderich Matthias Bauch Martin Haag Jörn Heid Franz Josef Leven Reiner Singer Heinrich Konrad Geiss Jana Jünger Burkhard Tönshoff

Care for patients is the best way to learn medicine and medical methods and skills. But the availability of real patients for learners is limited. Often the appropriate patient is missed or he can not be demonstrated to all students because of practical or ethical problems. A possible solution is the presentation of a clinical problem by a virtual patient using a simulative computer program. Bu...

Journal: :JSW 2014
Ye Guo Mingyu Wang Yangxia Luo

Due to the low performance caused by the traditional "embedded" watermark and the shortages about low accuracy and weak anti-aggressive of single-attribute birthmark in checking obfuscated software theft, a software identification scheme is proposed which is based on classification of multi-dimensional features. After disassembly analysis and static analysis on protecting software and its resis...

Journal: :Computer Networks 2014
Cosimo Anglano Marco Guazzone Matteo Sereno

In this paper, we deal with the problem of maximizing the profit of Network Operators (NOs) of green cellular networks in situations where Quality-of-Service (QoS) guarantees must be ensured to users, and Base Stations (BSs) can be shared among different operators. We show that if NOs cooperate among them, by mutually sharing their users and BSs, then each one of them can improve its net profit...

2013
Kong Xiangying Zhuang Yi

The existing trustworthiness attestation methods are not only difficult to be applied to the embedded system because they are mainly based on virtual machine technology, but have some problems such shat evidence is not obtained in time, protecting the privacy need trusted third party and trust measurement efficiency is low. In this paper, an embedded system dynamic trustworthiness attestation m...

2015

1. The Parties and Public Policy. Throughout this report political parties are treated as indispensable instruments of government. That is to say, we proceed on the proposition that popular government in a nation of more than 150 million people requires political parties which provide the electorate with a proper range of choice between alternatives of action. The party system thus serves as th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید