نتایج جستجو برای: weak base

تعداد نتایج: 393981  

2008
Amir Qaseem Douglas K. Owens

Recommendation 1: Clinicians should base the decision to initiate a trial of therapy with a cholinesterase inhibitor or memantine on individualized assessment. (Grade: weak recommendation, moderate-quality evidence.) Recommendation 2: Clinicians should base the choice of pharmacologic agents on tolerability, adverse effect profile, ease of use, and cost of medication. The evidence is insufficie...

Journal: :مدیریت بازرگانی 0
طهمورث حسنقلی پور دانشیار گروه مدیریت بازرگانی، دانشکدۀ مدیریت، دانشگاه تهران، ایران علی دیواندری دانشیار گروه مدیریت بازرگانی، دانشکدۀ مدیریت، دانشگاه تهران، ایران فاطمه عباسی بنی دانشجوی دکتری سیاستگذاری بازرگانی، دانشکدۀ مدیریت، دانشگاه تهران، ایران

this comparative study investigates the iranian exporters and the u.s. importers perception of persian carpet branding strategy in the u.s. market. wong and merrilees conceptual model of international branding strategy (2007) is used as the base model. two separate models for these communities are extracted. results indicated that the two models are different together and with the base model du...

2015
Alina Beygelzimer Elad Hazan Satyen Kale Haipeng Luo

We extend the theory of boosting for regression problems to the online learning setting. Generalizing from the batch setting for boosting, the notion of a weak learning algorithm is modeled as an online learning algorithm with linear loss functions that competes with a base class of regression functions, while a strong learning algorithm is an online learning algorithm with smooth convex loss f...

2007
RAHIM MOOSA ANAND PILLAY A. PILLAY

A criterion is given for a strong type in a finite rank stable theory T to be (almost) internal to a given nonmodular minimal type. The motivation comes from results of Campana which give criteria for a compact complex analytic space to be “algebraic” (namely Moishezon). The canonical base property for a stable theory states that the type of the canonical base of a stationary type over a realis...

2010
Dennis K. Burke

It is shown that certain weak-base structures on a topological space give a D-space. This solves the question by A.V. Arhangel’skii of when quotient images of metric spaces are D-spaces. A related result about symmetrizable spaces also answers a question of Arhangel’skii. Theorem. Any symmetrizable space X is a D-space (hereditarily). Hence, quotient mappings, with compact fibers, from metric s...

1988
Ronald Morrison Alan Dearle Chris D. Marlin

Adaptive data is characterised by its ability to react to changes in the environment. Such data frequently occurs in Artificial Intelligence applications where the knowledge base may alter dynamically to adapt to new stimuli. Such systems are usually written in typeless, dynamically bound languages. Here we describe the concept of persistence and show how it may also be used in conjunction with...

2011
S. J. DILWORTH Nigel Kalton

We consider weak thresholding greedy algorithms with respect to Markushevich bases in general Banach spaces. We find sufficient conditions for the equivalence of boundedness and convergence of the approximants. We also show that if there is a weak thresholding algorithm for the system which gives the best n-term approximation up to a multiplicative constant, then the system is already “greedy”....

2006
Richard A. Golding Darrell D. E. Long

Distributed database systems for wide-area networks must scale to very large numbers of replicas in order to provide acceptable availability and response time. Weak-consistency replication protocols, such as the timestamped anti-entropy (TSAE) protocol we have developed, allow a database to scale to hundreds or thousands of replicas. The TSAE protocol allows updates to be processed by a single ...

Journal: :Journal of cognitive neuroscience 2013
Amy H. Criss Mark E. Wheeler James L. McClelland

Differentiation models of recognition memory predict a strength-based mirror effect in the distributions of subjective memory strength. Subjective memory strength should increase for targets and simultaneously decrease for foils following a strongly encoded list compared with a weakly encoded list. An alternative explanation for the strength-based mirror effect is that participants adopt a stri...

2005
Claus Brenner

When complex scenes are modelled using measured data, such as mass data from laser scanners, the objects generated do not only have to fit the data, but also have to fulfill additional constraints, like incidence, distance, or angle relations. Weak primitives have been proposed as a means to automatically introduce larger numbers of constraints into the modelling process. In this article, sever...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید