نتایج جستجو برای: 1286

تعداد نتایج: 583  

Journal: :Nuclear and Particle Physics Proceedings 2021

We briefly report the modern status of heavy quark sum rules (HQSR) based on stability criteria by emphasizing recent progresses for determining QCD parameters (αs, mc,b and gluon condensates) where their correlations have been taken into account. The results: αs(MZ) = 0.1181(16)(3), m‾c(m‾c)=1286(16)MeV, m‾b(m‾b)=4202(7)MeV, 〈αsG2〉 (6.49±0.35)×10−2 GeV4, 〈g3G3〉 (8.2±1.0)×GeV2〈αsG2〉 ones from l...

Journal: :Computer Networks 2010
Xiaohuan Yan Y. Ahmet Sekercioglu Sathya Narayanan

1389-1286/$ see front matter 2010 Elsevier B.V doi:10.1016/j.comnet.2010.02.006 * Corresponding author. Tel.: +61 3 99053503; fa E-mail address: [email protected] (Y. Ahmet S ek Vertical handover decision (VHD) algorithms are essential components of the architecture of the forthcoming Fourth Generation (4G) heterogeneous wireless networks. These algorithms need to be designed to provide the req...

2009
Kerryn W. Reding Janet R. Daling David R. Doody Cecilia A. O'Brien Peggy L. Porter Kathleen E. Malone

Background: Alcohol consumption has been comprehensively investigated as an etiologic risk factor for breast cancer but has received little attention in terms of its impact on prognosis after breast cancer, particularly for young women. Methods: 1286 women diagnosed with invasive breast cancer at or before 45 years of age from two population-based case-control studies in the Seattle-Puget Sound...

Journal: :Computer Networks 2010
Ming-Fei Guo Xinbing Wang Min-You Wu

1389-1286/$ see front matter 2009 Elsevier B.V doi:10.1016/j.comnet.2009.11.015 * Corresponding author. Tel.: +86 21 3420 4517; fa E-mail addresses:[email protected] (M.-F. Guo) (X. Wang), [email protected] (M.-Y. Wu). Multi-packet reception (MPR) offers increased number of concurrent transmissions, which improves the capacity of wireless Ad hoc networks. By equipping each node with multiple wire...

Journal: :Computer Networks 2012
Jan Camenisch

1389-1286/$ see front matter 2012 Elsevier B.V http://dx.doi.org/10.1016/j.comnet.2012.10.012 E-mail address: [email protected] When using the Internet, we reveal much personal information both willingly and indadvertedly. Companies use this information for targeted advertisement and thereby to finance the services they offer to users. The mechanisms used today to protect users’ personal infor...

Journal: :CoRR 2012
Christopher R. Genovese Marco Perone-Pacifico Isabella Verdinelli Larry A. Wasserman

We study the problem of estimating the ridges of a density function. Ridge estimation is an extension of mode finding and is useful for understanding the structure of a density. It can also be used to find hidden structure in point cloud data. We show that, under mild regularity conditions, the ridges of the kernel density estimator consistently estimate the ridges of the true density. When the...

Journal: :Journal of bacteriology 1962
E A BROSBE P T SUGIHARA C R SMITH

Brosbe, Edwin A. (Veterans Administration Hospital, Long Beach, Calif.), Paul T. Sugihara, and C. Richard Smith. Growth characteristics of Mycobacterium avium (avian) to group III nonphotochromogenic mycobacteria in HeLa cells. J. Bacteriol. 84:1282-1286. 1962.-The close relationship of Mycobacterium avium (avian) to group III nonphotochromogenic (Battey) strains of mycobacteria stimulated inte...

2008
Ewan D. Stewart

A globally supersymmetric model of inflation will not work in a generic supergravity theory because the higher order, nonrenormalisable supergravity corrections destroy the flatness of the inflaton’s potential. In this talk I derive a form for the Kähler potential which eliminates these corrections if W = Wφ = ψ = 0 during inflation (where W is the superpotential, the inflaton ∈ φ, and Wψ 6= 0)...

Journal: :Computer Networks 2011
Ning Weng Lucas Vespa Benfano Soewito

1389-1286/$ see front matter Published by Elsevi doi:10.1016/j.comnet.2010.12.007 ⇑ Corresponding author. E-mail addresses: [email protected] (N. Weng) Vespa), [email protected] (B. Soewito). An intrusion detection system (IDS) is a promising technique for detecting and thwarting attacks on computer systems and networks. In the context of ever-changing threats, new attacks are constantly...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید