نتایج جستجو برای: accesses to inputs

تعداد نتایج: 10618814  

2003
Sule Gündüz Ögüdücü M. Tamer Özsu

Predicting the next request of a user as she visits Web pages has gained importance as Web-based activity increases. There are a number of different approaches to prediction. This paper concentrates on the discovery and modelling of the user’s aggregate interest in a session. This approach relies on the premise that the visiting time of a page is an indicator of the user’s interest in that page...

2003
Ş. Gündüz

Predicting the next request of a user as she visits Web pages has gained importance as Web-based activity increases. There are a number of different approaches to prediction. Markov models and their variations, collaborative filtering models, or models based on pattern recognition techniques such as sequence mining, association rule mining, clustering user sessions or user, have been found well...

Journal: :Lecture Notes in Computer Science 2023

Abstract Efficiency is a fundamental property of any type program, but it even more so in the context programs executing on blockchain (known as smart contracts ). This because optimizing has direct consequences reducing costs deploying and contracts, there are fees to pay related their bytes-size resource consumption (called gas Optimizing memory usage considered challenging problem that, amon...

Journal: :Seminars in nephrology 2005
Andrew J Cortez William D Paulson Steve J Schwab

Vascular accesses consist of permanent arteriovenous (AV) accesses (autogenous fistulas and synthetic grafts) and venous accesses (central venous catheters [CVCs]). AV accesses have fewer complications than venous accesses, and are therefore the preferred hemodialysis access. An important additional issue is whether the type of access influences adequacy of dialysis (i.e. Kt/V). Key limiting fa...

Journal: :Softw., Pract. Exper. 2011
Andreas Gampe Jeffery von Ronne David Niedzielski Jonathan Vasek Kleanthis Psarris

As part of its type-safety regime, the Java semantics require precise exceptions at runtime when programs attempt out-of-bound array accesses. This paper describes a Java implementation that utilizes a multiphase approach to identifying safe array accesses. This approach reduces runtime overhead by spreading the out-of-bounds checking effort across three phases of compilation and execution: pro...

Journal: :Research Journal of Environmental Sciences 2011

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید