نتایج جستجو برای: users violations
تعداد نتایج: 222582 فیلتر نتایج به سال:
In this paper, we present an approach to detect design rule violations that could cause software defects, modularity decay, or expensive refactorings. Our approach is to compute the discrepancies between how components should change together based on the modular structure framed by design rules, and how components actually changed together revealed by how modification requests were fulfilled. O...
The electromagnetic contribution to the K − K mass difference is calculated in the 1/Nc approach including the SU(3) breaking contributions due to a non-zero strange quark mass. The short-distance contribution can be unambiguously determined in terms of the known parameters of the next-to-leading order chiral lagrangian. The long distance part is estimated using the 1/Nc approach by Bardeen et ...
I thank Dean Martin for his very flattering introduction. I thank the College for bestowing a chair to me and the Mathematics Department for providing a wonderful atmosphere for my work. I thank Don Lewis and my current and former colleagues for their support. I take this opportunity to also thank my family, friends, and collaborators. My mathematical horizon has widened considerably after join...
We derive diierent representations of compact QED xed to Lan-dau gauge by the lattice Faddeev-Popov procedure. Our analysis nds that (A)Nielsen-Olesen vortices arising from the compactness of the gauge-xing action are quenched , that is, the Faddeev-Popov determinant cancels them out and they do not innuence correlation functions such as the photon propagator; (B)Dirac strings are responsible f...
While there has been much work on modeling and analysis of temporal constraints in workflows in the context of many real-world applications, there has not been much work on managing violations of temporal constraints. In real-time workflows, such as in medical processes and emergency situations, and also in logistics, finance and in other business processes with deadlines some violations are un...
By operating in highly asynchronous environments, SDN controllers often su er from bugs caused by concurrency violations. Unfortunately, state-of-the-art concurrency analyzers for SDNs often report thousands of possible violations, limiting their e ectiveness in practice. This work presents BigBug, an approach for automatically identifying the most representative concurrency violations: those t...
BACKGROUND Decades of conflict in eastern Myanmar have resulted in high prevalence of human rights violations and poor health outcomes. While recent ceasefire agreements have reduced conflict in this area, it is unknown whether this has resulted in concomitant reductions in human rights violations. METHODS AND FINDINGS We conducted a two-stage cluster survey of 686 households in eastern Myanm...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید