نتایج جستجو برای: access restrictions to machines

تعداد نتایج: 10664006  

ژورنال: اندیشه آماری 2012
, ,

In many experiments about lifetime examination, we will faced on restrictions of time and sample size, which this factors cause that the researcher can’t access to all of data. Therefore, it is valuable to study prediction of unobserved values based on information of available data. in this paper we have studied the prediction of unobserved values in two status of one-sample and two-sample, whe...

2004
Robert A. Napier

Automation tools commonly require some level of escalated privilege in order to perform their functions, often including escalated privileges on remote machines. To achieve this, developers may choose to provide their tools with wide-ranging privileges on many machines rather than providing just the privileges required. For example, tools may be made setuid root, granting them full root privile...

Journal: :Discrete Applied Mathematics 1996
Martin Dietzfelbinger

In the theory of dissemination of information in interconnection networks (gossiping and broadcasting) one assumes that a message consists of a set of distinguishable, atomic pieces of information, and that one communication pattern is used for solving a task. In this paper, a close connection is established between this theory and a situation in which functions are computed in synchronous netw...

2011
Marcus Cobden Jennifer Black Nicholas Gibbins Les Carr Nigel Shadbolt

While it is preferable that Linked Data is published without access or licence restrictions, there will always remain certain datasets which, perhaps due to financial considerations, cannot be published as Linked Open Data. If these valuable datasets do join the Web of Linked Data, it will be as Linked Closed Data – Linked Data with access and license restrictions. In this paper, we outline a r...

2011
A. G. OETTINGER

In the most outstanding theoretical advance, theories of language and of automata have been joined through one series of theorems establishing within each realm hierarchies of increasing power and by another series of theorems correlating machines with the languages they may either generate or recognize. Machines are ordered in terms of computing power by placing one above the other if everythi...

2005
Seshadhri Comandur Anil Seth Somenath Biswas

We show in this paper that the BGS model of abstract state machines can be simulated by random access machines with at most a polynomial time overhead. This result is already stated in [BGS99] with a very brief proof sketch. The present paper gives a detailed proof of the result. We represent hereditarily finite sets, which are the typical BGS ASM objects, by membership graphs of the transitive...

Journal: :World Digital Libraries 2008
S. M. Dhawan

World Digital Libraries 1(1): 77–78 ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ Open access was initially projected as a publishing model parallel to commercial publishing model for scholarly communication to check spiralling prices of journals. The philosophy behind this movement was that global and unr...

Journal: :SIAM J. Comput. 1988
Jyrki Katajainen Jan van Leeuwen Martti Penttonen

2010
L. Bromberg H. Hashizume N. Yanagi

Since the discovery of high temperature superconductors more than 2 decades ago, there has been interest in their use for future fusion machines. Lack of performance of commercially available materials, however, dampened the initial optimism. However, recent advances in HTS materials, mostly second-generation tapes, open attractive topologies. In addition to reduced cryogenic loads and increase...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید