نتایج جستجو برای: b lock e xogeneity

تعداد نتایج: 1819180  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد - دانشکده علوم 1377

در این نوشتار به بررسی نظریه دیفرانسیل پذیری در فضاهای خطی فشرده تولید شده با ابزار و مفاهیم رسته ای مطرح شده خواهیم پرداخت . معرفی رسته هایی خاص و رسته ؟k زیربنای کارماست ، یک -?k فضا، فضایی توپولوژیکی است که حامل توپولوژی نهای از خانواده fiهاست و fiها نگاشت های پیوسته از ki به x می باشند که kiها فشرده و هاسدروف هستند. بعلاوه ?k زیر رسته هم بازتاب صلب top است . در فصل اول و دوم رسته ?c و c??c ...

2005
Mickael Pic Takio Kurita

As the amount of digital video is increasing, efficient w ay s of searching and annotating it according to its content are req uired. T he fi rst step tow ard video index ing is to detect scene changes. A scene is usually defi ned as a seq uence of video frames w ith no significant changes b etw een frames in terms of their visual content. T he simp lest scene cut is rep resented b y a camera b...

2004
Sujata Banerjee

M a j o r advances in opt ical f iber t r a n s m i s s i o n and swi tch ing technology h a v e enabled t h e deve lopment of v e r y h i g h speed n e t w o r k s with d a t a ra tes of t h e order of gigabi ts p e r second. It i s ant ic ipated t h a t in th'e f u t u r e , w i d e area gigabi t n e t w o r k s wi l l in terconnect database s e r v e r s around t h e globe creat ing ex treme...

Journal: :Journal of Molecular Medicine and Clinical Applications 2018

Journal: :پژوهش های زبانشناختی در زبانهای خارجی 0
علی فیض الهی دانشکده زبان ها و ادبیات خارجی دانشگاه تهران، استادیار

the a f f i x e s i n a l a n g u a g u e are a masive w e b o f morfolexical elements formed b y t w o bases ; t h e root and t h e bound . t h e combination o f these t w o link the meaning o f a w o rd with a concept . t h e a i m o f t h e present paper i s t o study t h e similitud and dissimilitude i n t h e funtion o f these suffixes i n b o t h spanish a n d persian languages . we will ...

2011
Tetsuo Noda Terutaka Tansho Shane Coughlan

East Asia nations have made some progress with this technology, and started to introduce OSS for e-government systems during the early part of this century. Many countries granted it a central role in their policies. The reasons for this include adoption of software based on standard specification, liberation from vender lock-in, or opposition to the market control of proprietary software. Howe...

2000
Detlef R. Nolte

Over a large fraction of phase space a combination of an operator product and heavy quark expansions effectively turn the decay B̄ → D(∗)0e+e− into a “short distance” process, i.e., one in which the weak and electromagnetic interactions occur through single local operators. These processes have an underlying W-exchange quark diagram topology and are therefore Cabibbo allowed but suppressed by co...

2014
Icaro Boszczowski Gladys Villas Boas do Prado Mirian F. Dalben Roberto C. P. Telles Maristela Pinheiro Freire Thaís Guimarães Maura S. Oliveira Juliana F. Rosa Robson E. Soares Pedro Enrique Dorlhiac Llacer Frederico Luiz Dulley Silvia F. Costa Anna S. Levin

AIM The objective was to describe an outbreak of bloodstream infections by Burkholderia cepacia complex (Bcc) in bone marrow transplant and hematology outpatients. METHODS On February 15, 2008 a Bcc outbreak was suspected. 24 cases were identified. Demographic and clinical data were evaluated. Environment and healthcare workers' (HCW) hands were cultured. Species were determined and typed. Re...

Journal: :CoRR 2015
Yeounoh Chung Erfan Zamanian

In this work, we aim to evaluate different Distributed Lock Management service designs with Remote Direct Memory Access (RDMA). In specific, we implement and evaluate the centralized and the RDMAenabled lock manager designs for fast network settings. Experimental results confirms a couple of hypotheses. First, in the traditional centralized lock manager design, CPU is the bottleneck and bypassi...

Journal: :CoRR 2014
K. Eric Harper Thijmen de Gooijer

Data race conditions in multi-tasking software applications are prevented by serializing access to shared memory resources, ensuring data consistency and deterministic behavior. Traditionally tasks acquire and release locks to synchronize operations on shared memory. Unfortunately, lock management can add significant processing overhead especially for multicore deployments where tasks on differ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید