نتایج جستجو برای: subcontractor exhaustive search

تعداد نتایج: 306220  

2014
Mu-En Wu Chien-Ming Chen Yue-Hsun Lin Hung-Min Sun

RSA system is based on the hardness of the integer factorization problem (IFP). Given an RSA modulus N = pq, it is difficult to determine the prime factors p and q efficiently. One of the most famous short exponent attacks on RSA is the Wiener attack. In 1997, Verheul and van Tilborg use an exhaustive search to extend the boundary of the Wiener attack. Their result shows that the cost of exhaus...

2009
Alberto Barrón-Cedeño Paolo Rosso José-Miguel Benedí

Automatic plagiarism detection considering a reference corpus compares a suspicious text to a set of original documents in order to relate the plagiarised fragments to their potential source. Publications on this task often assume that the search space (the set of reference documents) is a narrow set where any search strategy will produce a good output in a short time. However, this is not alwa...

Journal: :International journal of social science research and review 2022

This paper provides a systematic literature review and analysis of game theory to model oil gas scenarios. We select 2514 papers from Scopus, present complex three-dimensional classification the selected papers, analyze resultant citation network. According industry-based classification, surveyed can be classified in common supply chain fields. Based on types players, into that use government-c...

2002
Fukunari Kimura

This paper provides an empirical analysis of the choices made by Japanese firms with respect to subcontracting status, that is, whether to take in work as subcontractor, to outsource work to subcontractors, to do both or to do neither. It shows that the probability of working as a subcontractor, a choice made by a many small firms in Japan, is negatively related to size, foreign sales and techn...

1997
Yu-Shan Shih

Classiication trees based on exhaustive search algorithms tend to be biased towards selecting variables that aaord more splits. As a result, such trees should be interpreted with caution. This article presents an algorithm called QUEST that has negligible bias. Its split selection strategy shares similarities with the FACT method, but it yields binary splits and the nal tree can be selected by ...

1997
Wei-Yin Loh Yu-Shan Shih Chung Cheng YU-SHAN SHIH

Classification trees based on exhaustive search algorithms tend to be biased towards selecting variables that afford more splits. As a result, such trees should be interpreted with caution. This article presents an algorithm called QUEST that has negligible bias. Its split selection strategy shares similarities with the FACT method, but it yields binary splits and the final tree can be selected...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه مازندران 1388

target tracking is the tracking of an object in an image sequence. target tracking in image sequence consists of two different parts: 1- moving target detection 2- tracking of moving target. in some of the tracking algorithms these two parts are combined as a single algorithm. the main goal in this thesis is to provide a new framework for effective tracking of different kinds of moving target...

Journal: :Genetics 2000
O Carlborg L Andersson B Kinghorn

Here we describe a general method for improving computational efficiency in simultaneous mapping of multiple interacting quantitative trait loci (QTL). The method uses a genetic algorithm to search for QTL in the genome instead of an exhaustive enumerative ("step-by-step") search. It can be used together with any method of QTL mapping based on a genomic search, since it only provides a more eff...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید