نتایج جستجو برای: that trace constraint
تعداد نتایج: 6487953 فیلتر نتایج به سال:
We continue our investigation of a variational principle for general relativity in which the metric tensor and the (asymmetric) linear connection are varied independently. As in Part I, the matter Lagrangian is minimally coupled to the connection and the gravitational Lagrangian is taken to be the curvature scalar, but we now relax the Riemannian constraint as far as possible-that is, as far as...
The paper addresses the issue of providing access control via delegation and constraint management across multiple security domains. Specifically, this paper proposes a novel Delegation Constraint Management model to manage and enforce delegation constraints across security domains. An algorithm to trace the authority of delegation constraints is introduced as well as an algorithm to form a del...
Recently, multi-trace impedance inversion has attracted great interest in seismic exploration because it improves the horizontal continuity and fidelity of results by exploiting lateral structure information strata. However, computational inefficiency affects its practical application. Furthermore, terms vertical constraints on model parameters, only considers smooth features while ignoring sha...
Security of a cryptographic protocol for a bounded number of sessions is usually expressed as a symbolic trace reachability problem. We show that symbolic trace reachability for well-defined protocols is decidable in presence of the exclusive or theory in combination with the homomorphism axiom. These theories allow us to model basic properties of important cryptographic operators. This trace r...
We show that multi-trace interactions can be consistently incorporated into an extended AdS/CFT prescription involving the inclusion of generalized boundary conditions and a modified Legendre transform prescription. We find new and consistent results by considering a self-contained formulation which relates the quantization of the bulk theory to the AdS/CFT correspondence and the perturbation a...
This research proposes a computation approach to address the evaluation of end product machining accuracy in elliptical surfaced helical pipe bending using 6dof parallel manipulator as a pipe bender. The target end product is wearable metal muscle supporters used in build-to-order welfare product manufacturing. This paper proposes a product testing model that mainly corrects the surface directi...
In this work we use algebraic dual spaces with a domain decomposition method to solve the Darcy equations. We define broken Sobolev and their finite dimensional counterparts. A global trace space is defined that connects solution between spaces. Use of results in sparse, metric-free representation incompressibility constraint, pressure gradient term, on continuity constraint sub domains. To dem...
Tracers provide users with useful information about program executions. In this article, we propose a tracer driver . From a single tracer, it provides a powerful front-end enabling multiple dynamic analysis tools to be easily implemented, while limiting the overhead of the trace generation. The relevant execution events are speci ed by exible event patterns and a large variety of trace data ca...
Constraint satisfaction problems are typically solved using search, augmented by general purpose consistency inference methods. This paper proposes a paradigm shift in which inference is used as the primary problem solving method, and attention is focused on special purpose, domain specific inference methods. While we expect this approach to have computational advantages, we emphasize here the ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید