نتایج جستجو برای: amortization

تعداد نتایج: 285  

2010

Many algorithms amount to a sequence of operations on a data structure. For instance, the well-known heapsort algorithm is a sequence of insert’s into an initially empty priority queue, followed by a sequence of deleteMin’s from the queue until it is empty. Thus if ci is the cost of the ith operation, the algorithm’s running time is ∑2n i=1 ci, since there are 2n operations for sorting n elemen...

1999
Carlos Jacks Marcelo Benitez

• EBITDA increased 23% in real terms during the third quarter to Ps.4.463 billion. In dollar terms, EBITDA grew 34% to US$477 million during the third quarter as compared to US$355 million during the same period a year ago. EBITDA, with respect to the CEMEX Group, equals operating income before amortization expense plus depreciation. Amortization of goodwill is not included in operating income,...

2016
T. Tamani P. Duverneuil J. Couderc

An economical analysis of the LPCVD hot wall tubular reactor functioning is presented including equipment amortization, clean room location, supplies, maintenance, labor, gas and energy consumption. From a technical point of view, CVDl model is used to characterise the phenomena involved during polysilicon deposition, linking growth rate distribution to operating conditions. An optimization is ...

Journal: :Social Science Research Network 2021

Mortgage amortization schedules are illiquid savings plans comparable in size to pension programs; however, little is known about their effects on wealth accumulation. Using individual administrative data and plausibly exogenous variation the timing of home purchase (ex. childbirth-driven) around a 2013 Dutch reform, we find near one-for-one rise net worth for each dollar amortization. Househol...

Journal: :Bulletin of the American Mathematical Society 1918

Journal: :International Journal for Information Security Research 2014

2009
Mohammed Shatnawi Qusai Abuein Susumu Shibusawa

Signature amortization schemes have been introduced for authenticating multicast streams, in which, a single signature is amortized over several packets. The hash value of each packet is computed, some hash values are appended to other packets, forming what is known as hash chain. These schemes divide the stream into blocks, each block is a number of packets, the signature packet in these schem...

Journal: :J. Symb. Comput. 2012
Michael A. Burr Felix Krahmer

Let f be a univariate polynomial with real coefficients, f ∈ R[X]. Subdivision algorithms based on algebraic techniques (e.g., Sturm or Descartes methods) are widely used for isolating the real roots of f in a given interval. In this paper, we consider a simple subdivision algorithm whose primitives are purely numerical (e.g., function evaluation). The complexity of this algorithm is adaptive b...

1999
Chris Okasaki

When a C programmer needs an efficient data structure for a particular problem, he or she can often simply look one up in any of a number of good textbooks or handbooks. Unfortunately, programmers in functional languages such as Standard ML or Haskell do not have this luxury. Although some data structures designed for imperative languages such as C can be quite easily adapted to a functional se...

Journal: :New Journal of Physics 2021

One of the fundamental tasks in quantum metrology is to estimate multiple parameters embedded a noisy process, i.e., channel. In this paper, we study limits channel estimation via concept amortization and right logarithmic derivative (RLD) Fisher information value. Our key technical result proof chain-rule inequality for RLD value, which implies that amortization, access catalyst state family, ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید