نتایج جستجو برای: time evaluation
تعداد نتایج: 2597729 فیلتر نتایج به سال:
Following recent studies of iterative voting and its effects on plurality vote outcomes, we provide characterisations and complexity results for three models of iterative voting under the plurality rule. Our focus is on providing a better understanding regarding the set of equilibria attainable by iterative voting processes. We start with the basic model of plurality voting. We first establish ...
A connection is established between uniform rational approximation and approximation in the mean by polynomials on compact nowhere dense subsets of the complex plane C. Peak points for R(X) and bounded point evaluations for Hp(X, dA), 1 ≤ p < ∞, play a fundamental role.
Agreed message delivery is an important service in distributed systems, especially when dealing with fault-tolerant applications. This work studies factors influencing protocols that provide global order in Wide Area Networks. Performance evaluation in real network conditions was conducted in order to compare two recently published algorithms. It was found that loss rate and variations in messa...
Often, when conducting programme evaluations or studying the effects of policy changes, researchers may only have access to aggregated time series data, presented as observations spanning both the pre- and post-intervention periods. The most basic analytic model using these data requires only a single group and models the intervention effect using repeated measurements of the dependent variable...
This paper explores the firewall security and performance relationship for distributed systems. Experiments are conducted to set firewall security into seven different levels and to quantify their performance impacts. These firewall security levels are formulated, designed, implemented, and tested phase by phase under an experimental environment in which all performed tests are evaluated and co...
Smooth decomposable negation normal form (s-DNNF) circuits are a compact form of representing many Boolean functions, that permit linear time satisfiability checking. Given a constraint defined by an s-DNNF circuit, we can create a propagator for the constraint by decomposing the circuit using a Tseitin transformation. But this introduces many additional Boolean variables, and hides the structu...
When it comes to the inequality-growth relationship, the empirical literature offers contradictory assessments: Estimators based on time-series variation only (i.e., differencesbased estimators) indicate a strong positive link while estimators also exploiting the crosssectional variation (i.e., level-based estimators) suggest a negative relationship. Taking advantage of a new dataset, the prese...
Iris authentication is a popular method where persons are accurately authenticated. During authentication phase the features are extracted which are unique. Iris authentication uses IR images for authentication. This proposed work uses color iris images for authentication. Experiments are performed using ten different color models. This paper is focused on performance evaluation of color models...
This paper formulates dynamic R&D investment decisions of private firms as an optimal stochastic control problem. It derives explicitly R&D investment decision rule and the cross equations parameter restrictions imposed by the rational expectations hypothesis, using the Riccati equations only and not requiring the use of Wiener-Kolmogorov prediction formula. Identification and estimation of the...
Despite the prominence of time in influential aging theories and the ubiquity of stress across the life span, research addressing how time perspective (TP) and adversity are associated with well-being across adulthood is rare. Examining the role of TP in coping with life events over the life span would be best accomplished after large-scale population-based exposure to a specific event, with re...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید