نتایج جستجو برای: replica

تعداد نتایج: 6050  

2008
S. V. Kozyrev

The alternative to the replica procedure, which we call the noncommutative replica procedure, is discussed. The detailed comparison with the standard replica procedure is performed.

2008
S. V. Kozyrev

The alternative to the replica procedure, which we call the noncommutative replica procedure, is discussed. The detailed comparison with the standard EA replica procedure is performed.

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2005
Pu Liu Byungchan Kim Richard A Friesner B J Berne

An innovative replica exchange (parallel tempering) method called replica exchange with solute tempering (REST) for the efficient sampling of aqueous protein solutions is presented here. The method bypasses the poor scaling with system size of standard replica exchange and thus reduces the number of replicas (parallel processes) that must be used. This reduction is accomplished by deforming the...

Journal: :J. Sensor and Actuator Networks 2012
Jun-Won Ho

In wireless sensor networks, replica node attacks are very dangerous because the attacker can compromise a single node and generate as many replicas of the compromised node as he wants, and then exploit these replicas to disrupt the normal operations of sensor networks. Several schemes have been proposed to detect replica node attacks in sensor networks. Although these schemes are capable of de...

2016
Madhu Advani Surya Ganguli

2 Deriving inference error from the statistical physics of disordered systems 2 2.1 Replica equations at finite temperature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.2 Replica equations in the low temperature limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3 Moreau envelope formulation of the replica equations . . . . . ....

2007
Giuseppe Gaeta

In the study of Replica Symmetry Breaking (RSB), one is led to consider functions f of pseu-domatrices, i.e. of matrices of order , with a real, rather than an integer, number. We propose a mathematically rigorous deenition of pseudomatrices, and show that from this it follows that the minimum of f over the space of pseudomatrices Q(x; y) which depend only on (x ?y) is also a critical point for...

Journal: :Nucleic Acids Research 1987

Journal: :Debates do NER 2015

2014
A. Joyce E. Nagarajan

In a structured peer-to-peer (p2p) network, Distributed Hash Tables (DHT) are maintained by nodes to store information and to route the packets. But sometimes a node can be attacked and so it may deny the DHT key access or misroute the packets. Replica Placement is a key mechanism to overcome these problems by placing replica for nodes in p2p network. MAXDISJOINT replica placement strategy crea...

Journal: :The Journal of Physical Chemistry B 2007

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید