نتایج جستجو برای: access restrictions to machines

تعداد نتایج: 10664006  

2015
Mathieu Blondel Akinori Fujino Naonori Ueda

Factorization machines are a generic framework which allows to mimic many factorization models simply by feature engineering. In this way, they combine the high predictive accuracy of factorization models with the flexibility of feature engineering. Unfortunately, factorization machines involve a non-convex optimization problem and are thus subject to bad local minima. In this paper, we propose...

Journal: :Азиатско-Тихоокеанский регион: экономика, политика, право 2018

Journal: :چغندرقند 0
صابر فتاحی کارشناس ارشد ترویج و آموزش کشاورزی- دانشگاه تهران اکرم بیناییان دانشجوی دکتری توسعه روستایی- دانشگاه رازی احمد رضوانفر استاد ترویج و آموزش دانشگاه تهران

because of world population increase and lack of appropriate food production, it is necessary that the developing countries make fundamental changes in their traditional production systems through utilizing new agronomical methods, farm management principles, and proper marketing. this study aimed to analyze factors involved in sugar beet production challenges in harsin city, kermanshah provinc...

Journal: :تحقیقات منابع آب ایران 0
علی ترابی حقیقی سینا خاتمی مهدی ضرغامی حسین هاشمی

0

2005
Vitorino Ramos Ajith Abraham

Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. There are two types of intruders: the external intruders who are unauthorized users of the machines they attack, and internal intruders, who have permission to...

1997
Andreas Uhl

Although block-based image compression techniques seem to be straightforward to implement on parallel MIMD architectures, problems might arise due to architectural restrictions on such parallel machines (e.g. memory constraints on distributed memory architectures). In this paper we discuss possible solutions to such problems occurring in diierent image compression techniques. Experimental resul...

2016
Jack M. Beard

Although remote-controlled robots flying over the Middle East and Central Asia now dominate reports on new military technologies, robots that are capable of detecting, identifying, and killing enemies on their own are quietly but steadily movingfrom the theoretical to the practical. The enormous difficulty in assigning responsibilities to humans and states for the actions ofthese machines grows...

2011
Pieter Van Gorp Steffen Mazanek

This paper describes how SHARE (Sharing Hosted Autonomous Research Environments) satisfies the criteria of the Elsevier 2011 Executable Paper Grand Challenge. This challenge aims at disseminating the use of systems that provide reviewers and fellow scientists a convenient way to reproduce computational results of research papers. This can involve among others the calculation of a number, the pl...

2003
Nazareno Aguirre Juan Bicarregui Theodosis Dimitrakos T. S. E. Maibaum

We study some restrictions associated with the mechanisms for structuring and modularising specifications in the B abstract machine notation. We propose an extension of the language that allows one to specify machines whose constituent modules (other abstract machines) may change dynamically, i.e., at run time. In this way, we increase the expressiveness of B by adding support for a common acti...

2000
Jens H. Weber Jörg Niere Jörg P. Wadsack

The Java programming language has gained increasing importance for the development of embedded systems. To be cost efficient, such systems have to cope with significant hardware restrictions which result in certain software programming restrictions. Recently, companies have started to apply Java component technology also in the area of embedded systems. Components are pieces of software with a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید