نتایج جستجو برای: linear mix

تعداد نتایج: 511637  

Journal: :Australasian J. Combinatorics 2018
Mohsen Aliabadi Mano Vikash Janardhanan

In this paper, we define locally matchable subsets of a group which are derived from the concept of matchings in groups and used as a tool to give alternative proofs for existing results in matching theory. We also give the linear analogue of a local matching property for subspaces in a field extension. Our tools mix additive number theory, combinatorics and algebra.

2009
Anders Søgaard

A linear time extension of deterministic pushdown automata is introduced that recognizes all deterministic context-free languages, but also languages such as {abc | n ≥ 0} and the MIX language. It is argued that this new class of automata, called λ-acyclic read-first deterministic stack+bag pushdown automata, has applications in natural language processing.

1999
Yannis Papakonstantinou Pavel Velikhov

Mediation is an important application of XML. The MIX mediator uses Document Type De nitions (DTDs) to assist the user in query formulation and query processors in running queries more e ciently. We provide an algorithm for inferring the view DTD from the view de nition and the source DTDs. We develop a metric of the quality of the inference algorithm's view DTD by formalizing the notions of so...

Journal: :JORS 2011
Mercedes Esteban-Bravo Nora Lado

Rival firms often cooperate horizontally in order to share risks and achieve scale advantages in production or in their research and development projects. The output of these strategic alliances is usually sold by the individual ally company under its own brand and using its own marketing mix strategies. Marketing strategies create a cumulative effect that is reflected in brand value. Although ...

2002
Dogan Kesdogan Dakshi Agrawal Stefan Penz

A user is only anonymous within a set of other users. Hence, the core functionality of an anonymity providing technique is to establish an anonymity set. In open environments, such as the Internet, the established anonymity sets in the whole are observable and change with every anonymous communication. We use this fact of changing anonymity sets and present a model where we can determine the pr...

2010
Jeroen van de Graaf

All voting protocols proposed so far, with the exception of a few, have the property that the privacy of the ballot is only computational. In this paper we outline a new and conceptually simple approach allowing us to construct a protocol in which the privacy of the ballot is unconditional. Our basic idea is to modify the protocol of Fujioka, Okamoto and Ohta[10], which uses blind signatures so...

2016
Daan Nieboer Tjeerd van der Ploeg Ewout W. Steyerberg Gary Collins

INTRODUCTION External validation studies are essential to study the generalizability of prediction models. Recently a permutation test, focusing on discrimination as quantified by the c-statistic, was proposed to judge whether a prediction model is transportable to a new setting. We aimed to evaluate this test and compare it to previously proposed procedures to judge any changes in c-statistic ...

Journal: :iranian journal of pharmaceutical research 0
s gholami f soleimani f hoseini shirazi m touhidpour m mahmoudian

mebudipine is a new dihydropyridine calcium channel blocker, synthesized in our laboratory, for treatment of hypertension. it has shown a better efficacy than other drugs in this group. for assessing the risks of this drug, certain safety tests in the preclinical stage have been performed. in this study mutagenic effect of mebudipine was evaluated using ames assay that could assess the mutageni...

2005
SungRan Cho Nick Koudas Divesh Srivastava

We present a system for efficient meta-data indexed querying of XML documents. Given the diversity of the information available in XML, it is very useful to annotate XML data with a wide variety of meta-data, such as quality and security assessments. We address the meta-data indexing problem of efficiently identifying the XML elements along a location step in an XPath query, that satisfy meta-d...

2001
Dogan Kesdogan

In our work we use queuing theory both for security (i.e. anonymity) and performance analysis. A well-known anonymity technique, the MIX method, which is the basis of most of today’s deployments, is the object of our investigation. We show shortcomings and problems in the MIX method and suggest possible workarounds. Our investigation reveals the level of security of MIX based systems and their ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید