نتایج جستجو برای: replica
تعداد نتایج: 6050 فیلتر نتایج به سال:
The alternative to the replica procedure, which we call the noncommutative replica procedure, is discussed. The detailed comparison with the standard replica procedure is performed.
The alternative to the replica procedure, which we call the noncommutative replica procedure, is discussed. The detailed comparison with the standard EA replica procedure is performed.
An innovative replica exchange (parallel tempering) method called replica exchange with solute tempering (REST) for the efficient sampling of aqueous protein solutions is presented here. The method bypasses the poor scaling with system size of standard replica exchange and thus reduces the number of replicas (parallel processes) that must be used. This reduction is accomplished by deforming the...
In wireless sensor networks, replica node attacks are very dangerous because the attacker can compromise a single node and generate as many replicas of the compromised node as he wants, and then exploit these replicas to disrupt the normal operations of sensor networks. Several schemes have been proposed to detect replica node attacks in sensor networks. Although these schemes are capable of de...
2 Deriving inference error from the statistical physics of disordered systems 2 2.1 Replica equations at finite temperature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.2 Replica equations in the low temperature limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3 Moreau envelope formulation of the replica equations . . . . . ....
In the study of Replica Symmetry Breaking (RSB), one is led to consider functions f of pseu-domatrices, i.e. of matrices of order , with a real, rather than an integer, number. We propose a mathematically rigorous deenition of pseudomatrices, and show that from this it follows that the minimum of f over the space of pseudomatrices Q(x; y) which depend only on (x ?y) is also a critical point for...
In a structured peer-to-peer (p2p) network, Distributed Hash Tables (DHT) are maintained by nodes to store information and to route the packets. But sometimes a node can be attacked and so it may deny the DHT key access or misroute the packets. Replica Placement is a key mechanism to overcome these problems by placing replica for nodes in p2p network. MAXDISJOINT replica placement strategy crea...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید