نتایج جستجو برای: kernel trapper gadget

تعداد نتایج: 51601  

Journal: :Journal of economic entomology 2003
Jefferson H Mayo Thomas J Straka Donna S Leonard

Beginning in 1992, the Slow The Spread (STS) pilot project was initiated to target gypsy moth (Lymantria dispar L.) spread rate reduction by controlling populations in the transition zone. The project uses intensive monitoring techniques, with pheromone-baited sticky moth traps, to detect low-level populations and target them for eradication. The primary objective of the pilot project was to ev...

2008
Peter Schuster Helga Nowotny Wolfgang Polak Denis Duboule

A trapper of eighteenth century needed a box of matches, a gun and a knife, and perhaps, a tent and a canoe or a dogsled to survive in the wilderness. Today, almost anyone of us would feel uncomfortable without, in addition, GPS, a mobile phone with internet access, a medicine-chest with at least aspirin, an antibiotic as well as a serum against snake bite, and a lot more to master the same sit...

Journal: :CoRR 2017
Vitalik Buterin Virgil Griffith

We introduce Casper, a proof of stake-based finality system which overlays an existing proof of work blockchain. Casper is a partial consensus mechanism combining proof of stake algorithm research and Byzantine fault tolerant consensus theory. We introduce our system, prove some desirable features, and show defenses against long range revisions and catastrophic crashes. The Casper overlay provi...

Journal: :Research in Astronomy and Astrophysics 2021

Abstract We present a GPU-accelerated cosmological simulation code, PhotoNs-GPU, based on an algorithm of Particle Mesh Fast Multipole Method (PM-FMM), and focus the GPU utilization optimization. A proper interpolated method for truncated gravity is introduced to speed up special functions in kernels. verify code mixed precision different levels theinterpolated GPU. run with single roughly two ...

Journal: :CoRR 2017
Arkadev Chattopadhyay Michal Koucký Bruno Loff Sagnik Mukhopadhyay

We generalize the deterministic simulation theorem of Raz and McKenzie [RM99], to any gadget which satisfies certain hitting property. We prove that inner-product and gap-Hamming satisfy this property, and as a corollary we obtain deterministic simulation theorem for these gadgets, where the gadget’s inputsize is logarithmic in the input-size of the outer function. This answers an open question...

Journal: :ACS Applied Materials & Interfaces 2021

The shuttle effect of soluble lithium polysulfides (LPS), which causes rapid capacity fading, remains a lingering issue for lithium-sulfur batteries (LSBs). Herein, we report new type reactive molecule-based LPS trapper, zinc acetate-diethanolamine (Zn(OAc)2·DEA), demonstrates molecular efficiency 1.8 trapping, approaching its theoretical limit 2, is the highest trapping capability reported so ...

Journal: :Library Trends 2007
Douglas Ross Harvey

Documentary heritage reflects the diversity of languages, peoples and cultures. It is the mirror of the world and its memory. But this memory is fragile. Every day, irreplaceable parts of this memory disappear for ever. A considerable proportion of the world's documentary heritage disappears through ‘natural’ causes: acidified paper crumbles away, leather, parchment, film and magnetic tape are ...

2013
Ourania Hatzi Despina Topali Mara Nikolaidou Dimosthenis Anagnostopoulos

Social networks have emerged as a new paradigm for everyday communication, as well as for promoting collaboration within enterprises and organizations. Using current technology, social network participants not only exchange information but also invoke external applications in the form of gadgets. In order to provide enhanced, complex functionality to participants, enabling them to complete a sp...

2006
Ashish Goel Pratibha Gupta

It was stated in Lecture 4 that under an adversarial queueing model, FIFO can be made unstable at arbitrarily low rates, r. The class began with a presentation demonstrating this by an example. Earlier work [2], [5], [4], [6] had shown that FIFO is unstable at rates exceeding .85, .83, .749 and .5 respectively, under an adversarial queueing model. In [7] the authors show that an adversarial inj...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید