نتایج جستجو برای: convex func tions

تعداد نتایج: 60921  

Journal: :Cardiovascular research 1999
H Drexler

1. Introduction composed of two divergent actions, that is, vasodilation by the stimulated release of NO and other vasodilating The endothelium provides a variety of important func-substances such as EDHF from the endothelium, and direct tions involved in the cardiovascular homeostasis. The vasoconstricting effects on the underlying vascular smooth assessment of endothelial function in humans h...

1998
Anup K Ghosh

In this short paper we describe a tool for testing the reliability and robustness of Windows NT soft ware applications under stressful environmental con ditions i e under system resource failure conditions Windows NT systems are increasingly being deployed in mission critical applications such as for command and control in US Navy ships However as re cently as July the Navy s Aegis missile crui...

1997
Eric Ronco Peter J. Gawthrop

The Incremental Model Reference Adaptive Polynomial Controllers Network (IMRAPCN) is a self-organising non linear controller. This algorithm consists of a Polynomial Controllers Network (PCN) and an Incremental Network Construction (INC). The PCN is a network of polynomial controllers each one being valid for a diierent operating region of the system. The use of polynomial controllers reduces s...

2016
Felipe Kenji Sudo Gilberto Sousa Alves Denise Madeira Moreira Jerson Laks Eliasz Engelhardt

Background Staging vascular cognitive impairment (VCI) might be useful for sample selection in clinical trials and for guiding clinical decision-making. Clinical dementia rating (CDR) has been applied for staging cognitive impairments of different etiologies, but it may underestimate severity of non-Alzheimer's disease cognitive deficits. Methods Out of a total of 147 elderly subjects, 23 (me...

Journal: :Fundamenta Mathematicae 2022

We consider hyperbolic links that admit alternating projections on surfaces in compact, irreducible 3-manifolds. show that, under some mild hypotheses, the volume of complement such a link is bounded below terms Kauffman bracket func

2004
A. ARDIZZONI S. CAENEPEEL C. MENINI G. MILITARU

We introduce and discuss the notion of naturally full func-tor. The definition is similar to the definition of separable functor: a naturally full functor is a functorial version of a full functor, while a separable functor is a functorial version of a faithful functor. We study general properties of naturally full functors. We also discuss when func-tors between module categories and between c...

1999
Mark Tullsen Paul Hudak

The best known approach to program transformation is the unfold fold methodology of Burstall and Darlington a sim ple intuitive and expressive approach which serves as the basis of many automatic program transformation algorithms such as partial evaluation and deforestation Unfortu nately unfold fold does not preserve total correctness and requires maintaining a transformation history of the pr...

1993
Jennifer Seberry Xian Mo Zhang Yuliang Zheng

A Boolean function is said to be correlation immune if its output leaks no information about its input values Such functions have many applications in computer security practices including the construc tion of key stream generators from a set of shift registers Finding meth ods for easy construction of correlation immune functions has been an active research area since the introduction of the n...

2006
Pamela E. Bechtel Robert J. Hickey Lauren Schnaper Jennifer W. Sekowski Brian J. Long Robert Freund Ni Liu Carla Rodriguez-Valenzuela Linda H. Malkas

Despite extensive research efforts to identify unique molecular alter ations in breast cancer, to date, no characteristic has emerged that cor relates exclusively with malignancy. Recently, it has been shown that the multiprotein DNA replication complex (synthesome) from breast cancer cells has a significantly decreased replication fidelity compared to that of nonmalignant breast cells. Prolife...

Journal: :PVLDB 2010
Guy Sagy Daniel Keren Izchak Sharfman Assaf Schuster

The goal of a threshold query is to detect all objects whose scoreexceeds a given threshold. This type of query is used in many set-tings, such as data mining, event triggering, and top-k selection.Often, threshold queries are performed over distributed data. Givendatabase relations that are distributed over many nodes, an object’sscore is computed by aggregating the value o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید