نتایج جستجو برای: line completion number

تعداد نتایج: 1564894  

2008
MAKOTO MATSUMOTO

Fix a prime number l. In this paper we prove a conjecture [16, p. 300], which Ihara attributes to Deligne, about the action of the absolute Galois group on the pro-l completion of the fundamental group of the thrice punctured projective line. It is stated below. Similar techniques are also used to prove part of a conjecture of Goncharov [11, Conj. 2.1], also about the action of the absolute Gal...

پایان نامه :0 1374

the rationale behind the present study is that particular learning strategies produce more effective results when applied together. the present study tried to investigate the efficiency of the semantic-context strategy alone with a technique called, keyword method. to clarify the point, the current study seeked to find answer to the following question: are the keyword and semantic-context metho...

2003
Mabel Chou Maurice Queyranne David Simchi-Levi

| Jobs arriving over time must be nonpreemptively processed on one of m parallel machines, each of which running at its own speed, so as to minimize a weighted sum of the job completion times. In this on-line environment, the processing requirement and weight of a job are not known before the job arrives. The Weighted Shortest Processing Requirement (WSPR) on-line heuristic is a simple extensio...

Journal: :Electr. J. Comb. 2006
Mariana Raykova

We consider the problem of permutation reconstruction, which is a variant of graph reconstruction. Given a permutation p of length n, we delete k of its entries in each possible way to obtain (n k ) subsequences. We renumber the sequences from 1 to n−k preserving the relative size of the elements to form (n−k)-minors. These minors form a multiset Mk(p) with an underlying set M ′ k(p). We study ...

Journal: :Electr. J. Comb. 2008
Alexandr V. Kostochka Michael Stiebitz

Erdős and Lovász conjectured in 1968 that for every graph G with χ(G) > ω(G) and any two integers s, t ≥ 2 with s+ t = χ(G)+1, there is a partition (S, T ) of the vertex set V (G) such that χ(G[S]) ≥ s and χ(G[T ]) ≥ t. Except for a few cases, this conjecture is still unsolved. In this note we prove the conjecture for line graphs of multigraphs.

Journal: :international journal of information, security and systems management 2015
mohammad abdolshah

nowadays project management is a key component in introductory operations management. the educators and the researchers in these areas advocate representing a project as a network and applying the solution approaches for network models to them to assist project managers to monitor their completion. in this paper, we evaluated project’s completion time utilizing the q-learning algorithm. so the ...

Nowadays project management is a key component in introductory operations management. The educators and the researchers in these areas advocate representing a project as a network and applying the solution approaches for network models to them to assist project managers to monitor their completion. In this paper, we evaluated project’s completion time utilizing the Q-learning algorithm. So the ...

Journal: :Philosophical Transactions of the Royal Society B: Biological Sciences 2018

Journal: :IEEE Sensors Journal 2021

Depth completion aims to generate a dense depth map from the sparse and aligned RGB image. However, current methods use extremely expensive 64-line LiDAR(about $100,000) obtain maps, which will limit their application scenarios. Compared with LiDAR, single-line LiDAR is much less more robust. Therefore, we propose method tackle problem of completion, in aim info A dataset proposed based on exis...

Journal: :I. J. Network Security 2016
Samant Saurabh Ashok Singh Sairam

Probabilistic Packet Marking (PPM ) is one of the most promising schemes for performing IP Traceback. PPM reconstructs the attack graph in order to trace back to the attackers. Finding the Completion Condition Number (i.e. precise number of packets required to complete the traceback) is very important. Without a proper completion-condition, we might reconstruct a wrong attack-graph and attacker...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید