نتایج جستجو برای: request

تعداد نتایج: 46382  

Journal: :research in applied linguistics 2010
zahra mehrabany lotfollah yarmohammadi ehya amalsaleh

the main objective of the present study is to elaborate the contrasts between males and females in their use of different strategies of request in english and persian and ascertain the degree to which independent variables like gender and language affect the application of these strategies during informal communication.furthermore, it offers comparable corpora which provide a good basis for cro...

1997

Issues affecting MARS Cluster Size Status of this Memo This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract IP multicast over ATM currently uses the MARS model [1] to manage the use of ATM pt-mpt SVCs for IP multicast packet forwarding. The scope of any given MARS services is the ...

2004

A 224-bit One-way Hash Function: SHA-224 Status of this Memo This memo provides information for the Internet community. It does not specify an Internet standard of any kind. Distribution of this memo is unlimited. Abstract This document specifies a 224-bit one-way hash function, called SHA-224. SHA-224 is based on SHA-256, but it uses a different initial value and the result is truncated to 224...

2010
Heping Zhu

Adjuvants have been used to improve pesticide application efficiency and effectiveness for many years. However, knowledge on quantitative reactions of adjuvant-amended pesticide droplets on Article Request Page http://asae.frymulti.com/azdez.asp?JID=5&AID=29662&CID=pitt2010&T=1[12/28/2010 12:43:57 PM] foliage is lacking. Evaporation rate and wetted area of 500 μm droplets with four different ad...

2001
Arup Acharya Anees Shaikh Renu Tewari Dinesh Verma

Current high-volume, high-availability data centers and content distribution networks use clusters of Web servers or caches to achieve scalability and reliability. In such environments a front-end dispatcher (or router) directs incoming client requests to one of the server machines. The request-routing decision can be based on a number of criteria, including server load, client request, or clie...

1997
Chunming ZHANG

are computed by averaging over 100 replications and are reported in Table 1. Clearly, the PB method performs well and less well for large k and small k values, respectively, because of the choice of the “moderately big” model. Evidently, the estimator μ̂full estimates μ well for small k values but poorly for large k values, depending on the true model. In terms of the accuracy of prediction, Êrr...

2010
R. Despres

IPv6 rapid deployment on IPv4 infrastructures (6rd) builds upon mechanisms of 6to4 to enable a service provider to rapidly deploy IPv6 unicast service to IPv4 sites to which it provides customer premise equipment. Like 6to4, it utilizes stateless IPv6 in IPv4 encapsulation in order to transit IPv4-only network infrastructure. Unlike 6to4, a 6rd service provider uses an IPv6 prefix of its own in...

2004
Brian D. Davison

Most requests on the Web are made on behalf of human users, and like other human-computer interactions, the actions of the user can be characterized by identifiable regularities. Much of these patterns of activity, both within a user, and between users, can be identified and exploited by intelligent mechanisms for learning Web request patterns. Our focus is on Markov-based probabilistic techniq...

2009

Although this document was produced with partial funding by the United States Environmental Protection Agency under Assistance Award CR–83234701 to the Health Effects Institute, it has not been subjected to the Agency’s peer and administrative review and therefore may not necessarily reflect the views of the Agency, and no official endorsement by it should be inferred. The contents of this docu...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید