نتایج جستجو برای: year

تعداد نتایج: 592979  

Journal: :Numerical Lin. Alg. with Applic. 2017
Silvia Noschese Lothar Reichel

Pseudospectra and structured pseudospectra are important tools for the analysis of matrices. Their computation, however, can be very demanding for all but small matrices. A new approach to compute approximations of pseudospectra and structured pseudospectra, based on determining the spectra of many suitably chosen rank-one or projected rank-one perturbations of the given matrix is proposed. The...

2001
Robert J. Harder Alan Barrick Daniel Hocking

At the end of the twentieth century, the year 2000 (Y2K) date change problem threatened computers and digital systems around the world. Y2K refers to computer and automated control system malfunctions that could have occurred when the year changed from 1999 to 2000. Many computers and automated systems were engineered to handle only two-digit year formats, and would have made mistakes or stoppe...

2018
M. Castellani J. Gilbey

This article has been accepted for publication and undergone full peer review but has not been through the copyediting, typesetting, pagination and proofreading process, which may lead to differences between this version and the Version of Record. Please cite this article as doi: 10.1111/eva.12615 This article is protected by copyright. All rights reserved. DR. KEVIN A GLOVER (Orcid ID : 0000-0...

Journal: :Information Systems Frontiers 1999
Robert A. Prentice

The legal system will ultimately determine where much of the huge losses that will be occasioned by the Millennium Bug will land. Seemingly minor glitches, such as a computerized inventory control system's wrongfully rejecting an order of chemicals as expired since 1900 (when the real expiration date is in the year 2000) can create a myriad of lawsuits among manufacturers, suppliers, customers,...

Journal: :Softw., Pract. Exper. 2012
J. Shane Culpepper Matthias Petri Simon J. Puglisi

The Burrows-Wheeler Transform (bwt) produces a permutation of a string X, denoted X∗, by sorting the n cyclic rotations of X into full lexicographical order, and taking the last column of the resulting n× n matrix to be X∗. The transformation is reversible in O(n) time. In this paper, we consider an alteration to the process, called k-bwt, where rotations are only sorted to a depth k. We propos...

2000
Ray Kammer

As we approached the year 2000, concerns about the Y2K “bug” focused attention on the importance of high quality, reliable software in supporting the economic foundation of the US and world economy. Additionally, security attacks against systems have been escalating, as hackers exploit known software vulnerabilities that have not been patched. Public attention on the quality of software is incr...

2017
Andreas Frommer Claudia Schimmel Marcel Schweitzer

It is known that in many functions of banded, and more generally, sparse Hermitian positive definite matrices, the entries exhibit a rapid decay away from the sparsity pattern. This is in particular true for the inverse, and based on results for the inverse, bounds for Cauchy–Stieltjes functions of Hermitian positive definite matrices have recently been obtained. We add to the known results by ...

2014
JAMES C. SNYDER

By JAMES C. SNYDER JR A fight between brothers of the Editor in Chief Kappa Sigma Fraternity and Police Department and the Wake Forest Public Safety Office said an off-duty officer should show his badge, which neither of the two men did. Head football coach Al Groh Despite a student protest which received extensive members of the athletic communimedia coverage and a petition submitted with well...

Journal: :Trans. Emerging Telecommunications Technologies 2012
Boaz Ghelber Ron Dabora

We study the discrete, memoryless multiple-access channel with two independent sources, two relays and a single destination. We refer to this configuration as the multiple-access channel with multiple relays (MACMR), which is a generalization of the multiple-access relay channel (MARC) model obtained by adding a relay node. We present inner and outer bounds on the capacity region of the MACMR. ...

Journal: :Softw. Test., Verif. Reliab. 2017
Pedro Delgado-Pérez Sergio Segura Inmaculada Medina-Bulo

Mutation testing is an effective but costly testing technique. Several studies have observed that some mutants can be redundant and therefore removed without affecting its effectiveness. Similarly, some mutants may be more effective than others in guiding the tester on the creation of high-quality test cases. Based on these findings, we present an assessment of C++ class mutation operators by c...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید