نتایج جستجو برای: proxy modeling
تعداد نتایج: 414282 فیلتر نتایج به سال:
ATM networks often carry other popular communication protocols such as TCP/IP. LAN emulation techniques, with LANE and MPOA being the most prominent ones, make it possible to support existing applications, but do not take advantage of many ATM capabilities. Furthermore, such server-based solutions often suffer from single point of failure problems. PNNI Augmented Routing (PAR), based on Private...
Modeling the magnitude and distribution of sediment-bound pollutants in estuaries is often limited by incomplete knowledge of the site and inadequate sample density. To address these modeling limitations, a decision-support tool framework was conceived that predicts sediment contamination from the sub-estuary to broader estuary extent. For this study, a Random Forest (RF) model was implemented ...
Floods are a natural hazard evolving in space and time according to meteorological and river basin dynamics, so that a single flood event can affect different regions over the event duration. This physical mechanism introduces spatio-temporal relationships between flood records and losses at different locations over a given time window that should be taken into account for an effective assessme...
A novel methodology is introduced for quantifying the added value of remotely sensed soil moisture products for global land surface modeling applications. The approach is based on the assimilation of soil moisture retrievals into a simple surface water balance model driven by satellite-based precipitation products. Filter increments (i.e., discrete additions or subtractions of water suggested b...
The idea of a proxy signature scheme was first presented by Mambo et al. [1] in 1996. Their proxy signature scheme allows an original signer to delegate his signing right to a proxy signer to sign the message on behalf of an original signer. Later, the verifier, which knows the public keys of original signer and a proxy signer can check a validity of a proxy signature issued by a proxy signer. ...
We study a model of proxy voting where the candidates, voters, and proxies are all located on real line, instead directly, each voter delegates its vote to closest proxy. The goal is find set that theta-representative, which entails for any anywhere favorite candidate within distance theta This property guarantees strong form representation as voters not required be fixed in advance, or even fi...
Methods A systematic literature review was employed to develop an evidence-based inventory of risk factors for HCA Clostridium difficile, surgical site infections, urinary tract infections, bloodstream infections and pneumonia. Data from multiple internal hospital databases were linked, using an encoded patient ID, into a coherent database with information on demographics, admissions, diagnosti...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید