نتایج جستجو برای: constraining factors

تعداد نتایج: 1088404  

1996
Joost N. Kok Elena Marchiori Massimo Marchiori Claudio Rossi

In this paper we study how global optimization methods (like genetic algorithms) can be used to train neural networks. We introduce the notion of regularity, for studying properties of the error function that expand the search space in an artiicial way. Regularities are used to generate constraints on the weights of the network. In order to nd a satissable set of constraints we use a constraint...

1997
Evaggelia Pitoura Aidong Zhang Bharat Bhargava

| Although, concurrency control in database systems is primarily based on serializability, many recent applications have rendered traditional serializability-based criteria ineecient or inappropriate. However, non-serializable executions may violate database consistency. In this paper, we propose a new approach to ensuring the correctness of non-serializable executions. The approach is based on...

Journal: : 2022

For the effective development of poultry farming in Kazakhstan, it is necessary to overcome a number constraining factors, one which insufficient modern safety control system throughout meat production chain. The article develops flowchart semi-finished product process based on meat-broiler with soy flour, examines possible risks (hazards) for management measures products, identifies three crit...

Journal: :Psychological science 2005
Arthur B Markman C Miguel Brendl

Influences of perceptual and motor activity on evaluation have led to theories of embodied cognition suggesting that putatively complex judgments can be carried out using only perceptual and motor representations. We present an experiment that revisited a movement-compatibility effect in which people are faster to respond to positive words by pulling a lever than by pushing a lever and are fast...

2012
Jinwei Hu Khaled M. Khan Yun Bai Yan Zhang

Authorization provenance concerns how an authorization is derived. It appears important to define authorization provenance to (1) analyze policy bases, (2) defend against a class of attacks, and (3) audit authorizations. In this paper, we study a notion of authorization provenance, based on a recently proposed logic in the literature. By examining a collection of properties, we show this defini...

2013
Asumu Takikawa T. Stephen Strickland Sam Tobin-Hochstadt

Most programming languages provide abstractions for non-local control flow and access to the stack by using continuations, coroutines, or generators. However, their unrestricted use breaks the local reasoning capability of a programmer. Gradual typing exacerbates this problem because typed and untyped code co-exist. We present a contract system capable of protecting code from control flow and s...

Journal: :Academy of Management Perspectives 1995

Journal: :Geophysical Research Letters 2020

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید