نتایج جستجو برای: proxy modeling

تعداد نتایج: 414282  

Journal: :Telecommunication Systems 1999
Tony Przygienda Patrick Droz Colin H. West

ATM networks often carry other popular communication protocols such as TCP/IP. LAN emulation techniques, with LANE and MPOA being the most prominent ones, make it possible to support existing applications, but do not take advantage of many ATM capabilities. Furthermore, such server-based solutions often suffer from single point of failure problems. PNNI Augmented Routing (PAR), based on Private...

2017
Eric S Walsh Betty J Kreakie Mark G Cantwell Diane Nacci

Modeling the magnitude and distribution of sediment-bound pollutants in estuaries is often limited by incomplete knowledge of the site and inadequate sample density. To address these modeling limitations, a decision-support tool framework was conceived that predicts sediment contamination from the sub-estuary to broader estuary extent. For this study, a Random Forest (RF) model was implemented ...

Journal: :Risk analysis : an official publication of the Society for Risk Analysis 2017
Francesco Serinaldi Chris G Kilsby

Floods are a natural hazard evolving in space and time according to meteorological and river basin dynamics, so that a single flood event can affect different regions over the event duration. This physical mechanism introduces spatio-temporal relationships between flood records and losses at different locations over a given time window that should be taken into account for an effective assessme...

2007
WADE T. CROW

A novel methodology is introduced for quantifying the added value of remotely sensed soil moisture products for global land surface modeling applications. The approach is based on the assimilation of soil moisture retrievals into a simple surface water balance model driven by satellite-based precipitation products. Filter increments (i.e., discrete additions or subtractions of water suggested b...

Journal: :Journal of Law, Economics, and Organization 2000

2012
Sattar J Aboud Mohammad Al-fayoumi

The idea of a proxy signature scheme was first presented by Mambo et al. [1] in 1996. Their proxy signature scheme allows an original signer to delegate his signing right to a proxy signer to sign the message on behalf of an original signer. Later, the verifier, which knows the public keys of original signer and a proxy signer can check a validity of a proxy signature issued by a proxy signer. ...

Journal: :Materials Today 2007

Journal: :Proceedings of the ... AAAI Conference on Artificial Intelligence 2021

We study a model of proxy voting where the candidates, voters, and proxies are all located on real line, instead directly, each voter delegates its vote to closest proxy. The goal is find set that theta-representative, which entails for any anywhere favorite candidate within distance theta This property guarantees strong form representation as voters not required be fixed in advance, or even fi...

2011
C King L Garcia Alvarez A Holmes P Aylin

Methods A systematic literature review was employed to develop an evidence-based inventory of risk factors for HCA Clostridium difficile, surgical site infections, urinary tract infections, bloodstream infections and pneumonia. Data from multiple internal hospital databases were linked, using an encoded patient ID, into a coherent database with information on demographics, admissions, diagnosti...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید