نتایج جستجو برای: composition of generating func tions

تعداد نتایج: 21185134  

2006
Pamela E. Bechtel Robert J. Hickey Lauren Schnaper Jennifer W. Sekowski Brian J. Long Robert Freund Ni Liu Carla Rodriguez-Valenzuela Linda H. Malkas

Despite extensive research efforts to identify unique molecular alter ations in breast cancer, to date, no characteristic has emerged that cor relates exclusively with malignancy. Recently, it has been shown that the multiprotein DNA replication complex (synthesome) from breast cancer cells has a significantly decreased replication fidelity compared to that of nonmalignant breast cells. Prolife...

Journal: :PVLDB 2010
Guy Sagy Daniel Keren Izchak Sharfman Assaf Schuster

The goal of a threshold query is to detect all objects whose scoreexceeds a given threshold. This type of query is used in many set-tings, such as data mining, event triggering, and top-k selection.Often, threshold queries are performed over distributed data. Givendatabase relations that are distributed over many nodes, an object’sscore is computed by aggregating the value o...

2003
MALGORZATA CHRZANOWSKA

Layout driven logic synthesis combines logical and physical design to minimize in terconnect length for speed noise and power critical applications The lattice diagram synthesis approach constructs for combinational functions regular lat tices with only local connections and input buses Lattice diagrams are directly mappable to hardware without additional layout steps This synthesis approach de...

2003
A. ARDIZZONI S. CAENEPEEL C. MENINI G. MILITARU

We introduce and discuss the notion of naturally full func-tor. The definition is similar to the definition of separable functor: a naturally full functor is a functorial version of a full functor, while a separable functor is a functorial version of a faithful functor. We study general properties of naturally full functors. We also discuss when func-tors between module categories and between c...

1994
Marios D. Dikaiakos Anne Rogers Kenneth Steiglitz

In this paper we extend the practical range of simulations of parallel executions by what we call \func-tional algorithm simulation," that is, simulation without actually performing most of the numerical computations involved. We achieve this by introducing a new approach for generating and collecting communication and computation characteristics for a class of parallel scientiic algorithms. We...

2007
Markus Mohnen

FUNC is a functional language with the ability to incorporate C++ components. Unlikèmostly-functional' languages, like Scheme or SML, FUNC does not provide an assignment statement or statement sequences. Our approach to the integration of the functional and imperative paradigms is the concept of mixed-language programming on a module level. 1 Introduction Although the practical advantages of fu...

Journal: :Acta Arithmetica 2022

We determine all degree-$4$ rational functions $f(X)\in \mathbb {F}_q(X)$ which permute $\mathbb {P}^1(\mathbb {F}_q)$, and answer two questions of Ferraguti Micheli about the number such equivalence classes func

Journal: :Informatica 2023

– While the core quality of SVM comes from its ability to get global optima, classification performance also depends on computing kernels. However, while this kernel-complexity generates power machine, it is responsible for compu- tational load execute kernel. Moreover, insisting a similarity function be positive definite kernel demands some properties satisfied that seem unproductive sometimes...

Journal: :Revista De Historia Industrial 2023

The configuration of a “modern” production structure requires there to be sufficient en-ergy supply at competitive costs. Since the last third nineteenth century, coal produc-tion and better natural conditions for generating electric energy low cost explain – least partially differences in favour New Zealand with respect Uruguay. However, in-stitutional arrangements are another relevant factor ...

2014
Sebastian Mödersheim Luca Viganò

Vertical composition of security protocols means that an ap-plication protocol (e.g., a banking service) runs over a chan-nel established by another protocol (e.g., a secure channel provided by TLS). This naturally gives rise to a compositionality question: given a secure protocol P1 that providesa certain kind of channel as a goal and another secure proto-col P2 that assumes th...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید