نتایج جستجو برای: exaggeration and arbitrary
تعداد نتایج: 16836013 فیلتر نتایج به سال:
The many metrics employed for the evaluation of search engine results have not themselves been conclusively evaluated. We propose a new measure for a metric’s ability to identify user preference of result lists. Using this measure, we evaluate the metrics Discounted Cumulated Gain, Mean Average Precision and classical precision, finding that the former performs best. We also show that consideri...
We present the O(α) and O(α ln α) corrections to the total decay width of orthopositronium in closed analytic form, in terms of basic transcendental numbers, which can be evaluated numerically to arbitrary precision. PACS numbers: 12.20.Ds, 31.30.J-, 36.10.Dr ∗On leave of absence from Bogoliubov Laboratory for Theoretical Physics, JINR, 141980 Dubna (Moscow region), Russia.
The throughput and delay characteristics of a landmobile satellite channel are analyzed for both slotted ALOHA and slotted direct-sequence CDMA (code division multiple access), using binary phase shift keying (BPSK) modulation and forward error correction coding (FEC). In the case of CDMA, the application of path diversity techniques-maximal ratio combining and selection diversity-is also taken...
The GNU Multi-Precision library is a widely used, safetycritical, library for arbitrary-precision arithmetic. Its source code is written in C and assembly, and includes intricate state-of-the-art algorithms for the sake of high performance. Formally verifying the functional behavior of such highly optimized code, not designed with verification in mind, is challenging. We present a fully verifie...
Most existing implementations ofmultiple precision arithmetic demand that the user sets the precision a priori. Some libraries are said adaptable in the sense that they dynamically change the precision of each intermediate operation individually to deliver the target accuracy according to the actual inputs. We present in this text a new adaptable numeric core inspired both from floating point e...
We examine the cost for an attacker to pay users to execute arbitrary code—potentially malware. We asked users at home to download and run an executable we wrote without being told what it did and without any way of knowing it was harmless. Each week, we increased the payment amount. Our goal was to examine whether users would ignore common security advice—not to run untrusted executables—if th...
We introduce a new approach which facilitates the calculation of the covering radius of a binary linear code. It is based on determining the normalized covering radius p. For codes of fixed dimension we give upper and lower bounds on p that arc reasonably close. As an application, an explicit formula is given for the covering radius of an arbitrary code of dimension <4. This approach also sheds...
A three years study on precision farming in cotton in central Greece showed serious infield variability of yield and soil physical and chemical properties. Yield mapping constitutes the starting and ending point of the whole process chain in a precision farming system. Yield mapping was performed for three consecutive years in the same cotton fields of central Greece in a wide range of cotton v...
This paper is devoted to the analysis of the behaviour, in nite precision arithmetic, of the simplest linear iterative scheme one can think of, that is the successive iteration method (SI) x 0 ; x k+1 = Ax k + b; k 0 where A is a real or complex matrix of order n and x is a real or complex vector of size n. In exact arithmetic, the behaviour of (1) is completely understood ; there is convergenc...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید