نتایج جستجو برای: linear mix
تعداد نتایج: 511637 فیلتر نتایج به سال:
In this paper, we define locally matchable subsets of a group which are derived from the concept of matchings in groups and used as a tool to give alternative proofs for existing results in matching theory. We also give the linear analogue of a local matching property for subspaces in a field extension. Our tools mix additive number theory, combinatorics and algebra.
A linear time extension of deterministic pushdown automata is introduced that recognizes all deterministic context-free languages, but also languages such as {abc | n ≥ 0} and the MIX language. It is argued that this new class of automata, called λ-acyclic read-first deterministic stack+bag pushdown automata, has applications in natural language processing.
Mediation is an important application of XML. The MIX mediator uses Document Type De nitions (DTDs) to assist the user in query formulation and query processors in running queries more e ciently. We provide an algorithm for inferring the view DTD from the view de nition and the source DTDs. We develop a metric of the quality of the inference algorithm's view DTD by formalizing the notions of so...
Rival firms often cooperate horizontally in order to share risks and achieve scale advantages in production or in their research and development projects. The output of these strategic alliances is usually sold by the individual ally company under its own brand and using its own marketing mix strategies. Marketing strategies create a cumulative effect that is reflected in brand value. Although ...
A user is only anonymous within a set of other users. Hence, the core functionality of an anonymity providing technique is to establish an anonymity set. In open environments, such as the Internet, the established anonymity sets in the whole are observable and change with every anonymous communication. We use this fact of changing anonymity sets and present a model where we can determine the pr...
All voting protocols proposed so far, with the exception of a few, have the property that the privacy of the ballot is only computational. In this paper we outline a new and conceptually simple approach allowing us to construct a protocol in which the privacy of the ballot is unconditional. Our basic idea is to modify the protocol of Fujioka, Okamoto and Ohta[10], which uses blind signatures so...
INTRODUCTION External validation studies are essential to study the generalizability of prediction models. Recently a permutation test, focusing on discrimination as quantified by the c-statistic, was proposed to judge whether a prediction model is transportable to a new setting. We aimed to evaluate this test and compare it to previously proposed procedures to judge any changes in c-statistic ...
mebudipine is a new dihydropyridine calcium channel blocker, synthesized in our laboratory, for treatment of hypertension. it has shown a better efficacy than other drugs in this group. for assessing the risks of this drug, certain safety tests in the preclinical stage have been performed. in this study mutagenic effect of mebudipine was evaluated using ames assay that could assess the mutageni...
We present a system for efficient meta-data indexed querying of XML documents. Given the diversity of the information available in XML, it is very useful to annotate XML data with a wide variety of meta-data, such as quality and security assessments. We address the meta-data indexing problem of efficiently identifying the XML elements along a location step in an XPath query, that satisfy meta-d...
In our work we use queuing theory both for security (i.e. anonymity) and performance analysis. A well-known anonymity technique, the MIX method, which is the basis of most of today’s deployments, is the object of our investigation. We show shortcomings and problems in the MIX method and suggest possible workarounds. Our investigation reveals the level of security of MIX based systems and their ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید