نتایج جستجو برای: the last shari
تعداد نتایج: 16055521 فیلتر نتایج به سال:
This is a theoretical and empirical study of the delay of bid submission due to strategic last-minute bidding in eBay. We consider a two-period model in which two identical items are auctioned sequentially by different sellers. We show that there is a symmetric equilibrium in which the bidders wait until the last minute to submit their bids in the first auction. The last-minute bidding arises f...
The dot product operation is very prevalent in sci-entiic computation and has been incorporated as a primitive operation in some languages. Implementation of the dot product operation by a sequence of IEEE standard multiplications and additions does not prevent substantial error accumulation or warn about catastrophic cancellation. The design of a double precision dot product operation is prese...
In the last decade of the 20th century, the U.S. economy witnessed a persistent and substantial increase in private investment. The boom was sharply reversed in 2001, and a great deal of evidence suggests that the capital stock had become excessive. Standard equilibrium business cycle models have difficulties in predicting the investment boom and overshooting. An embodied technology model is co...
• • N M I M 'I — — l-n , \ iFte»hnu>n wm> mlradueod lu the intiHciu i c<> »f I'UftaWsi, tone poems, ami tfiiitip^tgedsymphonies M ii n day I ni«r!rt 'wbt>n eighty-five -nudents parj li-ipated, in|l party ; held at j Autry House. KlJOlWlled ,r|:iy t III' Mil I' Baptist tjLti-r ill'lit I'nion. thlj« <Ntiavayafisiii, itiiOn tin.strength "1 the financial and social success of lluvi .1 eu-n ..r l(. ...
The next leap in the communications market may be the extension of optical technology to access networks. Advanced fibre optical access equipment has been developed in the last decade and today trial tests are on the way and insular deployment has begun. The access network, the last mile, has not encountered any major changes of technology for a century. However, current advancements in technol...
WDM based dynamic bandwidth allocation schemes are proposed as potential future-proof upgrade solutions for access PON systems. The schemes represent cost-efficient ways to exploit the virtually unlimited bandwidth afforded by passive optical architectures whilst remaining fully compatible with the IEEE Ethernet standard for the first mile (EFM 802.3ah).
This article explores the Buddhist interactions between Tibet and China in contemporary period. In contrast to recent studies understanding Buddhist revival in Tibet within the framework of ‘ChinaTibet’ divide, this paper reveals that along with Buddhist revival and the creative strategies that Tibetan monks use to accomplish this revival, the interactions and ties between Tibetan and Chinese B...
Bounty hunting has been shown to solve the multiagent task allocation problem robustly in noisy and dynamic scenarios with multiple other agents of unknown quality. This bounty hunting model does not require task exclusivity, but does require task commitment. We examine eliminating this second requirement, thus allowing bounty hunters to commit to tasks but abandon them later (to jump ship) for...
Quotients, reciprocals, square roots and square root reciprocals all have the property that infinitely precise p-bit rounded results for p-bit input operands can be obtained from approximate results of bounded accuracy. We investigate lower bounds on the number of bits of an approximation accurate to a unit in the last place sufficient to guarantee that correct round and sticky bits can be dete...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید