نتایج جستجو برای: data distribution

تعداد نتایج: 2865979  

2016
Rhonda Syler Elizabeth Baker

Grounded in the Motivated Learning Strategies Model, this paper proposes a testable framework to explore how access to digital information impacts learning through examining the mediating factor of engagement. While the implications of patterns of behavior on learning and learning outcomes are significant, we first must understand what drives students to engage with their course content in the ...

2013
Aman Kansal Bhuvan Urgaonkar Sriram Govindan

Cloud providers and other data center operators are using geo-distributed data centers. But these data centers largely continue to employ the same designs as were appropriate for single data centers. These designs are wasteful because they do not take full advantage of geo-distribution. Geo-redundancy can reduce other redundancy at multiple intermediate layers in individual data centers and dec...

2002
OCTAVIAN AGRATINI

The concern of this note is to introduce a general class of linear positive operators of discrete type acting on the space of real valued functions defined on a plane domain. These operators preserve some test functions of Bohman-Korovkin theorem. Following our technique, as a particular class, a modified variant of the bivariate Bernstein-Chlodovsky operators is presented.

Journal: :CoRR 2014
Glencora Borradaile Theresa Migler Gordon T. Wilfong

We introduce a new topological descriptor of a network called the density decomposition which is a partition of the nodes of a network into regions of uniform density. The decomposition we define is unique in the sense that a given network has exactly one density decomposition. The number of nodes in each partition defines a density distribution which we find is measurably similar to the degree...

2009
Peng Lu

Theorem 2 Given n and v0 > 0, there exists ǫ0 > 0 depending only on n and v0 which has the following property. For any r0 > 0 and ǫ ∈ (0, ǫ0] suppose (Mn, g(t)) is a complete smooth solution to the Ricci flow on [0, (ǫr0) 2] with bounded sectional curvature, and assume that at t = 0 for some x0 ∈ M we have curvature bound |Rm |(x, 0) ≤ r 0 for all x ∈ Bg(0)(x0, r0), and volume lower bound Volg(...

2007
Victor Fay Wolfe Lisa Cingiser DiPippo Angela Uvarov

Many Cyber-Physical Systems (CPS), distributed embedded real-time (DRE) applications like military command and control, time critical planning collaboration, and wireless embedded sensor networks, require shared data among various components of the system to be available within stringent deadlines for processing and for making critical decisions on time. In order for these decisions to be corre...

Journal: :CoRR 2005
H. Bechmann-Pasquinucci Andrea Pasquinucci

A trusted quantum relay is introduced to enable quantum key distribution links to form the basic legs in a quantum key distribution network. The idea is based on the well-known intercept/resend eavesdropping. The same scheme can be used to make quantum key distribution between several parties. No entanglement is required.

2014
B. Srinivasa Rao R. R. L Kantam R. R. L. Kantam

A test statistic based on population quantiles using sample order statistics is suggested. The quantiles of the test statistics are evaluated for generalized exponential distribution. Similar test statistic based on moments of sample order statistic is referred and the proposed test formula is compared with it. Between the pairs of the above models it is established that the test formula propos...

2001
Begoña Álvarez Daniel Miles

Empirical evidence from developed countries consistently shows that working wives remain responsible for most household duties. The aim of this paper is to study the unequal distribution of housework between working spouses in Spain. Housework time allocation is modelled through a bivariate negative binomial distribution, conditional on a set of observable characteristics, such as paid labor co...

Journal: :Entropy 2017
Luis A. Lizama-Pérez Jose Mauricio Lopez-Romero Eduardo De Carlos-López

Despite the unconditionally secure theory of the Quantum Key Distribution (QKD), several attacks have been successfully implemented against commercial QKD systems. Those systems have exhibited some flaws, as the secret key rate of corresponding protocols remains unaltered, while the eavesdropper obtains the entire secret key. We propose the negative acknowledgment state quantum key distribution...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید