نتایج جستجو برای: b lock e xogeneity
تعداد نتایج: 1819180 فیلتر نتایج به سال:
در این نوشتار به بررسی نظریه دیفرانسیل پذیری در فضاهای خطی فشرده تولید شده با ابزار و مفاهیم رسته ای مطرح شده خواهیم پرداخت . معرفی رسته هایی خاص و رسته ؟k زیربنای کارماست ، یک -?k فضا، فضایی توپولوژیکی است که حامل توپولوژی نهای از خانواده fiهاست و fiها نگاشت های پیوسته از ki به x می باشند که kiها فشرده و هاسدروف هستند. بعلاوه ?k زیر رسته هم بازتاب صلب top است . در فصل اول و دوم رسته ?c و c??c ...
As the amount of digital video is increasing, efficient w ay s of searching and annotating it according to its content are req uired. T he fi rst step tow ard video index ing is to detect scene changes. A scene is usually defi ned as a seq uence of video frames w ith no significant changes b etw een frames in terms of their visual content. T he simp lest scene cut is rep resented b y a camera b...
M a j o r advances in opt ical f iber t r a n s m i s s i o n and swi tch ing technology h a v e enabled t h e deve lopment of v e r y h i g h speed n e t w o r k s with d a t a ra tes of t h e order of gigabi ts p e r second. It i s ant ic ipated t h a t in th'e f u t u r e , w i d e area gigabi t n e t w o r k s wi l l in terconnect database s e r v e r s around t h e globe creat ing ex treme...
the a f f i x e s i n a l a n g u a g u e are a masive w e b o f morfolexical elements formed b y t w o bases ; t h e root and t h e bound . t h e combination o f these t w o link the meaning o f a w o rd with a concept . t h e a i m o f t h e present paper i s t o study t h e similitud and dissimilitude i n t h e funtion o f these suffixes i n b o t h spanish a n d persian languages . we will ...
East Asia nations have made some progress with this technology, and started to introduce OSS for e-government systems during the early part of this century. Many countries granted it a central role in their policies. The reasons for this include adoption of software based on standard specification, liberation from vender lock-in, or opposition to the market control of proprietary software. Howe...
Over a large fraction of phase space a combination of an operator product and heavy quark expansions effectively turn the decay B̄ → D(∗)0e+e− into a “short distance” process, i.e., one in which the weak and electromagnetic interactions occur through single local operators. These processes have an underlying W-exchange quark diagram topology and are therefore Cabibbo allowed but suppressed by co...
AIM The objective was to describe an outbreak of bloodstream infections by Burkholderia cepacia complex (Bcc) in bone marrow transplant and hematology outpatients. METHODS On February 15, 2008 a Bcc outbreak was suspected. 24 cases were identified. Demographic and clinical data were evaluated. Environment and healthcare workers' (HCW) hands were cultured. Species were determined and typed. Re...
In this work, we aim to evaluate different Distributed Lock Management service designs with Remote Direct Memory Access (RDMA). In specific, we implement and evaluate the centralized and the RDMAenabled lock manager designs for fast network settings. Experimental results confirms a couple of hypotheses. First, in the traditional centralized lock manager design, CPU is the bottleneck and bypassi...
Data race conditions in multi-tasking software applications are prevented by serializing access to shared memory resources, ensuring data consistency and deterministic behavior. Traditionally tasks acquire and release locks to synchronize operations on shared memory. Unfortunately, lock management can add significant processing overhead especially for multicore deployments where tasks on differ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید