نتایج جستجو برای: only

تعداد نتایج: 1357814  

2016
Boris Aronov Matias Korman Simon Pratt André van Renssen Marcel Roeloffzen

An s-workspace algorithm is an algorithm that has read-only access to the values of the input, write-only access to the output, and only uses O(s) additional words of space. We present a randomized s-workspace algorithm for triangulating a simple polygon P of n vertices that runs in O(n/s+ n logn log(n/s)) expected time using O(s) variables, for any s ≤ n. In particular, when s ≤ n logn log5 lo...

2010
Brian S. Rosner

As Betz observed in 1979, Paul never says that Christians are supposed to ‘do’ the Torah. This article seeks to develop the argument of omission in relation to Paul and the law. What else does he not say? According to Rom. 2.17-29, Jews ‘rely on’ the law, ‘boast’ in the law, know God’s will through the law, are educated in the law, have light, knowledge and truth because of the law, are to ‘do’...

1998
Yue Wang Dinggang Shen Eam Khwang Teoh

-In this paper, a Catmull-Rom spline based lane model which described the perspective effect of parallel lines was proposed for generic lane boundary. As Catmull-Rom spline can form arbitrary shapes by control points, it can describe a wider range of lane structures than other lane models such as straight and parabolic model. It formulates the lane detection problem in the form of determining t...

Journal: :J. Electronic Testing 2000
Said Hamdioui Ad J. van de Goor

A two-port memory contains two duplicated sets of address decoders, which operate independently. Testing such memories requires the use of single-port tests as well as special two-port tests; the test strategy determines which tests have to be used. Many two-port memories have ports which are read-only or write-only; this impacts the possible tests for single-port and two-port memories, as well...

Journal: :American Journal of Public Health 1991

1998
Evaggelia Pitoura

Recently, push-based delivery has attracted considerable attention as a means of disseminating information to large client populations in both wired and wireless environments. In this paper, we address the problem of ensuring the consistency and currency of client's read-only transactions in the case of updates. Our approach is based on broadcasting invalidation reports and is scalable, i.e., i...

1998
Bodhini Jayasuriya Richard Valliant

This paper empirically compares three estimation methods—regression, calibration, and principal person— used in a household survey for post-stratification. Posttratification is important in many household surveys to adjust for nonresponse and the population undercount that esults from frame deficiencies. The correction for population undercoverage is usually achieved by adjusting estimated peop...

2005
ROBERT BRAME

Criminological theorists and criminal justice policy makers place a great deal of importance on the idea of desistance. in general terms, criminal desistance refers to a cessation of offending activity among those who have offended in the past. Some significant challenges await those who would estimate the relative size of the desisting population or attempt to identify factors that predict mem...

پایان نامه :0 1374

this thesis is based upon the works of samuel beckett. one of the greatest writers of contemporary literature. here, i have tried to focus on one of the main themes in becketts works: the search for the real "me" or the real self, which is not only a problem to be solved for beckett man but also for each of us. i have tried to show becketts techniques in approaching this unattainable goal, base...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید