نتایج جستجو برای: upgrading
تعداد نتایج: 6693 فیلتر نتایج به سال:
Given a tree T (V, E) endowed with a length function l and a cost function c, the diameter lowering problem consists in finding the reals 0 ≤ x(e) ≤ l(e), e E such that the tree obtained from T by decreasing the length of every edge e by x(e) units has a minimal diameter subject to the constraint ¥e Ec(e)x(e) ≤ B, where B is the available budget (analogously, one can minimize the cost of loweri...
Software developers like to reuse software components such as libraries or frameworks because it lets them build a system more quickly, but then the system depends on the components that they reused. Ideally, the programming interface (API) to a component never changes. In practice, components change their APIs. Upgrading an application to the new API is error-prone, tedious, and disruptive to ...
A software product typically goes through many “upgrades” (version changes) over its lifetime. Reactive systems, such as email clients, software agents, proxies, traffic controllers, and telephone switches are no exception. Evolving such stateful systems is made difficult by the fact that new versions of the software must deal correctly with legacy instances. Users of earlier versions have inve...
We will use EPICS toolkit [1] to build a prototype for upgrading BEPC control system. The purposes are threefold: (1) Setup a network based distributed control system with EPICS. (2) Study some front-end control technology. (3) Merge the existing control systems into EPICS. The hardware architecture consists of three physical layers. The front-end layer consists of VME crate, PowerPC, VME I/O m...
The convergence property for doing logic programming in Hopfield network can be accelerated by using new relaxation method. This paper shows that the performance of the Hopfield network can be improved by using a relaxation rate to control the energy relaxation process. The capacity and performance of these networks is tested by using computer simulations. It was proven by computer simulations ...
Quantum cryptography could be integrated in various existing concepts and protocols to secure communications that require very high level of security. The aim of this paper is to analyse the use of quantum cryptography within PPP. We introduce basic concepts of the Point to Point Protocol; we propose a solution that integrates quantum key distribution into PPP. An example is given to demonstrat...
PURPOSE The aim of this study was to investigate the prognostic performance of multiparametric magnetic resonance imaging (mpMRI) and Prostate Imaging Reporting and Data System (PIRADS) score in predicting pathologic features in a cohort of patients eligible for active surveillance who underwent radical prostatectomy. METHODS A total of 223 patients who fulfilled the criteria for "Prostate Ca...
In this paper we introduce the upgrading problem for edge-disjoint paths. In the off-line upgrading problem a supply graph G and two demand graphs H1 and H2 are given on the same vertex set. What is the maximum size of a set F ⊆ E(H1)∩E(H2) such that F has a routing in G which can be extended to a routing of Hi in G, for i = 1, 2? In the online upgrading problem we are given a supply graph G, a...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید