نتایج جستجو برای: input and output concentrations
تعداد نتایج: 16864443 فیلتر نتایج به سال:
Weighted games for several levels of approval in input and output were introduced in [9]. An extension of the desirability relation for simple games, called the influence relation, was introduced for games with several levels of approval in input in [24] (see also [18]). However, there are weighted games not being complete for the influence relation, something different to what occurs for simpl...
A polymorphic analysis is an analysis whose input and output contain parameters which serve as placeholders for information that is unknown before analysis but provided after analysis. In this paper, we present a polymorphic groundness analysis that infers parameterised groundness descriptions of the variables of interest at a program point. The polymorphic groundness analysis is designed by re...
Let us denote with p ∈ N a finite number of time steps in the future. We are interested in deriving a prediction model of the future output z(k+ p), exploiting the input and output measurements collected in the time interval [k− o+ 1,k], where o ∈ N is the chosen order of the model, and the future (planned) inputs in the interval [k,k+ p−1]. Specifically, at any instant k let us define the regr...
We are considering a discrete-time model of an access ATM switch with output buuers. A switch with output queueing has an optimum performance, however it requires a switch fabric with speed of N. However, The switch fabric may operate L < N times the speed of the input/output links. Also random traac assumption underestimates the buuer size. In our study, each input port of the switch is assume...
II CURRENT TECHNOLOGY The speech interface is the natural one for the human user and is beginning to be used in a limited way in many applications. Some of these applications are experimental; still others have achieved the status of cost-effective utility. A brief summary of the current state-of-the-art of speech input and output are presented. The two papers in the session represent specific ...
Runtime monitoring is a widely used approach for the enforcement of security policies. It allows the safe execution of untrusted code by observing the execution and reacting if needed to prevent a violation of a user-defined security policy. Previous studies have determined that the set of security properties enforceable by monitors is greatly extended by giving the monitor some licence to tran...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید