نتایج جستجو برای: consistent material

تعداد نتایج: 668976  

2011
Ana Elizabeth Torres Thangarasu Pandiyan Fernando Colmenares

MCSCF-MRMP2 and DFT calculations were performed in order to analyze the stability and geometrical parameters of some possible intermediates for the reactions Ru2+ + H2O2 and Ru(H2O)6 + H2O2. At MCSCF-MRMP2 level of calculation, the stability predicted for the RuO(H2O)5 suggests an energetic preference of the reaction Ru(H2O)6 + H2O2 toward the products involving this high-valence intermediate, ...

2011
Alan Turing

The investigation of 802.11b has evaluated IPv6, and current trends suggest that the analysis of local-area networks will soon emerge. Given the current status of random information, cyberneticists urgently desire the analysis of IPv6. Our focus here is not on whether SMPs and consistent hashing are often incompatible, but rather on introducing a novel algorithm for the improvement of multi-pro...

2008
Simon C Barry

Reviews of studies to predict invasiveness have been carried out by Kolar and Lodge (2001) and updated by Hayes and Barry (2008). A significant body of literature has built up across a range of taxa looking at correlates of invasion success. Several points can be made from this literature. First, while invasiveness cannot be predicted with certainty, statistical approaches can produce models th...

Journal: :Information Economics and Policy 2001
Jeong-Yoo Kim Yoonsung Lim

This paper examines the effect of the receiver pays principle (RPP) on the calling price, social welfare and interconnection charge. A significant difficulty with introducing this system in telecommunications pricing is the possibility that the receiving party may refuse to receive a call if the charge he has to bear is very high. We find the condition under which no calls are refused and show ...

2011

The synthesis of consistent hashing is a key quagmire. This is an important point to understand. in fact, few biologists would disagree with the evaluation of the lookaside buffer, which embodies the practical principles of steganography. In order to achieve this ambition, we concentrate our efforts on disproving that online algorithms and RPCs can collaborate to accomplish this objective.

2013
Wei Sun Junhui Wang Yixin Fang Xiaotong Shen

In this supplementary material, we provide Lemmas 2 and 3 and their proofs. Suppose that x 1 ,. .. , x n are i.i.d. from a probability distribution with mean 0 and finite covariance matrix C = (C jk). Assumption S1: Assume that x 1 has finite fourth moment, that is, E(x 1i x 1 j x 1k x 1l) is finite for any 1 ≤ i, j, k, l ≤ p. Lemma 2 Suppose that Assumption S1 is met. Assumptions 1 and 2 are s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید