نتایج جستجو برای: واژگان کلیدی سطوح غـیرقابل نفوذ isa
تعداد نتایج: 98009 فیلتر نتایج به سال:
This article describes the competitive grouping algorithm at the core of our Integrated Segmentation and Alignment (ISA) model. ISA extracts phrase pairs from a bilingual corpus without requiring the precalculated word alignment as many other phrase alignment models do. Experiments conducted within the WPT-05 shared task on statistical machine translation demonstrate the simplicity and effectiv...
Azole resistance is an emerging problem in Aspergillus fumigatus which translates into treatment failure. Alternative treatments with new azoles may improve therapeutic outcome in invasive aspergillosis (IA) even for strains with decreased susceptibility to current azoles. The in vivo efficacy of 0.25, 1, 4, 16, 64, 128, 256, and 512 mg/kg of body weight/day prodrug isavuconazonium sulfate (BAL...
BACKGROUND AND MOTIVATION The high-throughput genomics communities have been successfully using standardized spreadsheet-based formats to capture and share data within labs and among public repositories. The nanomedicine community has yet to adopt similar standards to share the diverse and multi-dimensional types of data (including metadata) pertaining to the description and characterization of...
This is a longer version of a paper with the same title, which has been submitted to Management Science. Abstract from the Journal Versionfrom the Journal Version This paper develops methods to determine appropriate staffing levels in call centers and other many-server queueing systems with time-varying arrival rates. The goal is to achieve targeted time-stable performance, even in the presence...
OBJECTIVE To compare the Women's Experience with Battering Scale (WEB) with the Index of Spouse Abuse-Physical Scale (ISA-P) as screening tools to identify intimate partner violence (IPV). METHODS We conducted a large cross-sectional survey of women age 18 to 65 attending one of two family practice clinics from 1997 to 1998. All women completed both the WEB and the ISA-P and a telephone inter...
A novel algorithm called independent subspace analysis (ISA) is introduced to estimate independent subspaces. The algorithm solves the ISA problem by estimating multi-dimensional di erential entropies. Two variants are examined, both of them utilize distances between the k-nearest neighbors of the sample points. Numerical simulations demonstrate the usefulness of the algorithms.
The paper makes the first steps towards a methodology to assess frameworks for business process analysis and information system design. The assessment instrument will be designed based on key elements of architectural frameworks such as Isa, Cim-Osa and Pera. Four major frameworks will be discussed: Isa-S95, Oagis, Scor and Cpfr.
The ISA is the established hardware-software contract. As the ISA hides hardware features that affect timing of execution, it is no longer sufficient for ensuring system security and safety. We argue that a new contract is required, which exposes such features.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید