نتایج جستجو برای: forbidden keywords extraction

تعداد نتایج: 2124215  

2012
M. Zareiee A. Dideban

This paper addresses the problem of forbidden states in non safe Petri Nets. In the system, for preventing it from entering the forbidden states, some linear constraints can be assigned to them. Then these constraints can be enforced on the system using control places. But when the number of constraints in the system is large, a large number of control places must be added to the model of syste...

2013
Cheng-Shang Chang Jay Cheng Tien-Ke Huang Duan-Shin Lee

One of the main problems in deep sub-micron designs of high speed buses is the propagation delay due to the crosstalk effect. To alleviate the crosstalk effect, there are several types of crosstalk avoidance codes proposed in the literature. In this technical brief, we develop explicit constructions of two types of memoryless crosstalk avoidance codes: forbidden overlap codes (FOCs) and forbidd...

2012
M. Zareiee A. Dideban P. Nazemzadeh

This paper deals with the problem of constructing constraints in non safe Petri Nets and then reducing the number of the constructed constraints. In a system, assigning some linear constraints to forbidden states is possible. Enforcing these constraints on the system prevents it from entering these states. But there is no a systematic method for assigning constraints to forbidden states in non ...

Journal: :Community Literacy Journal 2010

Journal: :Critical Quarterly 2019

Journal: :Community Literacy Journal 2010

Journal: :Romanticism and Victorianism on the Net: 2007

2008
Carola Eschenbach Michael Grüninger Massimo Romanelli Leslie Barrett Cristina de Ambrosi Cristiano Ghersi Armando Tacchella Julia Dmitrieva Fons J. Verbeek Sabine Janzen Wolfgang Maass Patrick Maué Holger Neuhaus Sven Schade Daniel Sonntag Holger Stenzhorn Martin Boeker Stefan Schulz Susanne Hanser Miroslav Vacura Raphaël Troncy Leslie BARRETT

This paper describes the organization of extracted risk-relevant data in a relational database created at Regulatory Data Corporation for use by security professionals. The initial effort involved creating sets of data-extraction variables around a set of “risk relevant” keywords. The keywords clustered around events rather than entities and the data extraction variables that were developed cen...

2014
Thuy Ngoc Le Tok Wang Ling H. V. Jagadish Jiaheng Lu

It is well known that some XML elements correspond to objects (in the sense of object-orientation) and others do not. The question we consider in this paper is what benefits we can derive from paying attention to such object semantics, particularly for the problem of keyword queries. Keyword queries against XML data have been studied extensively in recent years, with several lowest-common-ances...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید