نتایج جستجو برای: recovering
تعداد نتایج: 15055 فیلتر نتایج به سال:
Nonmarket valuation research has produced economic value estimates for a variety of threatened, endangered, and rare species around the world. Although over 40 value estimates exist, it is often difficult to compare values from different studies due to variations in study design, implementation, and modeling specifications. We conducted a stated-preference choice experiment to estimate the valu...
............................................................................................... 4 Tiivistelmä............................................................................................. 5 Acknowledgements................................................................................ 6 List of original publications...................................................................
| In recent years, key recovery has been the subject of a lot of discussion, of much controversy and of extensive research. The widespread opinion of the research community, expressed in a technical report 13], written by well known experts, is that large-scale deployment of a key recovery system is essentially impossible. Despite this fact, key recovery might be needed at a corporate level, as...
Several studies (see Swift et. al.’s study of Windows XP in SOSP 2003 and Chou et. al’s study of Linux in SOSP 2001) have attributed a large fraction of operating system failures to device driver flaws. Not only can driver errors cause kernel instability, but these errors can also be exploited for privilege escalation and access to kernel data structures. A search on securityfocus.com shows vul...
The conversion of basic biology into new therapeutics requires scientific activities in both academia and industry. Successful drug discovery projects span disciplines, sectors, and institutions and tightly couple laboratory and clinical experiments. Here, Ehlers describes conceptions and misconceptions about how science is conducted in industry versus academia.
The MC mixed-criticality framework has been previously proposed for mixing safetycritical hard real-time (HRT) and mission-critical soft real-time (SRT) software on the same multicore computer. This paper focuses on the execution of SRT software within this framework. When determining SRT guarantees, jobs are provisioned based on a provisioned worst-case execution time (PWCET) that is not very ...
A well known result from cluster theory states that there is a 1-to-1 correspondence between dated, compact, rooted trees and ultrametrics. In this paper, we generalize this result yielding a canonical 1-to-1 correspondence between symbolically dated trees and symbolic ultrametrics, using an arbitrary set as the set of (possible) dates or values. It turns out that a rather unexpected new condit...
Many recent statistical parsers rely on a preprocessing step which uses hand-written, corpus-specific rules to augment the training data with extra information. For example, head-finding rules are used to augment node labels with lexical heads. In this paper, we provide machinery to reduce the amount of human effort needed to adapt existing models to new corpora: first, we propose a flexible no...
In this paper, we introduce and study a new paraconsistent inference relation |=c in the setting of 3-valued paraconsistent logics. Using inconsistency forgetting as a key mechanism for recovering consistency, it guarantees that the deductive closure Cn|=c(Σ) of any belief base Σ is classically consistent and classically closed. This strong feature, not shared by previous inference relations in...
Recovering structure from motion even using information from multiple image frames is diicult, in part because motion error can introduce large, correlated errors in the structure estimate. A method is proposed for recursively recovering structure from motion that can deal with this problem. Encouraging results on real images and synthetic data are presented.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید