نتایج جستجو برای: access restrictions to machines
تعداد نتایج: 10664006 فیلتر نتایج به سال:
In many experiments about lifetime examination, we will faced on restrictions of time and sample size, which this factors cause that the researcher can’t access to all of data. Therefore, it is valuable to study prediction of unobserved values based on information of available data. in this paper we have studied the prediction of unobserved values in two status of one-sample and two-sample, whe...
Automation tools commonly require some level of escalated privilege in order to perform their functions, often including escalated privileges on remote machines. To achieve this, developers may choose to provide their tools with wide-ranging privileges on many machines rather than providing just the privileges required. For example, tools may be made setuid root, granting them full root privile...
In the theory of dissemination of information in interconnection networks (gossiping and broadcasting) one assumes that a message consists of a set of distinguishable, atomic pieces of information, and that one communication pattern is used for solving a task. In this paper, a close connection is established between this theory and a situation in which functions are computed in synchronous netw...
While it is preferable that Linked Data is published without access or licence restrictions, there will always remain certain datasets which, perhaps due to financial considerations, cannot be published as Linked Open Data. If these valuable datasets do join the Web of Linked Data, it will be as Linked Closed Data – Linked Data with access and license restrictions. In this paper, we outline a r...
In the most outstanding theoretical advance, theories of language and of automata have been joined through one series of theorems establishing within each realm hierarchies of increasing power and by another series of theorems correlating machines with the languages they may either generate or recognize. Machines are ordered in terms of computing power by placing one above the other if everythi...
We show in this paper that the BGS model of abstract state machines can be simulated by random access machines with at most a polynomial time overhead. This result is already stated in [BGS99] with a very brief proof sketch. The present paper gives a detailed proof of the result. We represent hereditarily finite sets, which are the typical BGS ASM objects, by membership graphs of the transitive...
World Digital Libraries 1(1): 77–78 ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ ○ Open access was initially projected as a publishing model parallel to commercial publishing model for scholarly communication to check spiralling prices of journals. The philosophy behind this movement was that global and unr...
Since the discovery of high temperature superconductors more than 2 decades ago, there has been interest in their use for future fusion machines. Lack of performance of commercially available materials, however, dampened the initial optimism. However, recent advances in HTS materials, mostly second-generation tapes, open attractive topologies. In addition to reduced cryogenic loads and increase...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید