نتایج جستجو برای: discussion section

تعداد نتایج: 340432  

2000
Jutta Eckstein

Overview The structure of these patterns is similar to the one introduced by Andreas Rueping [6] . The problem section formulates an issue as a question. The forces are the considerations that lead to the solution. The solution answers the question of the problem section. In the discussion section, some examples are presented or drawbacks of the solution are discussed. Some of the patterns have...

1991
Uday S. Rao Peter L. Jackson

This paper reviews a cyclic scheduling model of repetitive manufacturing environments consisting of exible machines and multi-stage jobs. We explicitly model two system performance measures, throughput and ow time, while incorporating variability arising from uncertainty in operation processing times. We present an iterative approximation scheme to estimate the two moment behavior of our perfor...

2017
A. H. Freeland Barbour

By A. H. Freeland Barbour, M.D., F.R.C.P. Ed. The Venezuela frontier question has not given rise to more discussion than the delimitation of the area of the body of the uterus in labour. The story of the dispute with Venezuela goes back to the map on which Schomburg drew his now famous line. The discussion which has gone on for five and twenty years round the disputed area in the lower portion ...

2008
Charles Siewert

My response to Witmer comes in three sections: In the first I address concerns about my book's blindsight thought-experiment, remarking specifically on the role imagination plays in it, and my grounds for thinking (in the face of Witmer's doubts) that a first-person approach is valuable here. In Section Two I consider the relation of the thought-experiment to theses regarding possibility and ne...

Journal: :Developmental science 2004
Sylvain Sirois

This paper presents autoassociator neural networks. A first section reviews the architecture of these models, common learning rules, and presents sample simulations to illustrate their abilities. In a second section, the ability of these models to account for learning phenomena such as habituation is reviewed. The contribution of these networks to discussions about infant cognition is highlight...

1998
Ulrika Wiss David Carr

ion: how does the design support information structuring and information hiding? Affordances: how does the design show the users what they can do with it? The rest of this paper is divided into four sections. Section 2 discusses the three cognitive aspects used to classify 3D information visualization designs. In Section 3, fifteen important designs are described and compared using the three co...

2004
RONALD S. LITMAN

Abdominal surgery in infants and children presents a number of unique anesthetic challenges that are reviewed in this chapter. The first section consists of a discussion of anesthetic concerns for intraabdominal procedures, especially in neonates and small infants.This discussion is general in nature, and the reader should remember that there exists a wide spectrum of patient conditions and sur...

2001
George E. Andrews J. B. Olsson

In this paper we shall discuss three topics in partitions. Section 2 is devoted to partitions with difference conditions and is an elucidation of joint work with J. B. Olsson [16]. In Section 3 we discuss certain partition problems which have their origins in statistical mechanics. We take as the theme for this section Euler’s article: Exemplum Memorabile Inductionis Fallacis [23]. The material...

2001
M. Barake P. Chardaire G. P. McKeown

We consider the application of a new metaheuristic technique that we have proposed, known as PROBE (Population Reinforced Optimization Based Exploration), to the multiconstraint knapsack problem (MKP). In the current section, we begin by giving a brief introduction to PROBE; we then briefly review other metaheuristic approaches for the MKP. In Section 2, we describe our PROBE approach for the M...

2010
Jean Bacon David M. Eyers Jatinder Singh

This chapter examines techniques for securing various types of event-based systems. The first section discusses typical application requirements. The following section examines specific event dissemination approaches. Applying applicationlevel security to event-based systems is introduced at first, along with an overview of Role-Based Access Control. Application-level security is a perimeter de...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید