نتایج جستجو برای: inorder traversal

تعداد نتایج: 4329  

2003
Andy Tseng Ilias Petrounias Panagiotis Chountas

With the rapidgrowing number of WWWusers, hidden information becomes ever increasingly valuable. As a consequence of this phenomenon, mining Web data and analysing on-line users‘ behaviour and their on-line traversal partem have emerged as a new area of research. Primarily based on the Web servers‘ log files, the main objective of traversal pattem mining is to discover the frequent patterns in ...

1999
Y. Japha G. Kurizki

We study the use of the Faraday effect as a quantum clock for measuring traversal times of evanescent photons through magneto-refractive structures. The Faraday effect acts both as a phase-shifter and as a filter for circular po-larizations. Only measurements based on the Faraday phase-shift properties are relevant to the traversal time measurements. The Faraday polarization filtering may cause...

2013

An otherwise normal 28-month-old boy had a 2-month history of intermittent vomiting and a 1-week history of headaches. Neurologic examination was normal except for a right extensor plantar response. Axial CT scan (Fig . 1A) showed a large primarily intraventricular mass occupying the posterior left cerebral hemisphere. Directly caudad to this, a similar tumor was present in the left cerebellar ...

2008
Johannes A. Buchmann Erik Dahmen Michael Schneider

We propose a new algorithm for computing authentication paths in the Merkle signature scheme. Compared to the best algorithm for this task, our algorithm reduces the worst case running time considerably.

Journal: :International journal of advanced research 2021

Internal hernia is a relatively uncommon condition and rare type of intestinal obstruction. Paraduodenal considered the most common internal hernias. The prevalence variable symptoms make clinical diagnosis paraduodenal diagnostic challenge. We present case acute obstruction by left para-duodenal treatedat general surgery department Mohammed VI University Hospital Center in Marrakech, Morocco i...

Journal: :RFC 2015
Magnus Westerlund Thomas Zeng

This document describes several Network Address Translator (NAT) traversal techniques that were considered to be used for establishing the RTP media flows controlled by the Real-Time Streaming Protocol (RTSP). Each technique includes a description of how it would be used, the security implications of using it, and any other deployment considerations it has. There are also discussions on how NAT...

Journal: :Comput. Graph. Forum 2014
Jae-Ho Nah Dinesh Manocha

We present the surface area traversal order (SATO) metric to accelerate shadow ray traversal. Our formulation uses the surface area of each child node to compute the TO. In this metric, we give a traversal priority to the child node with the larger surface area to quickly find occluders. Our algorithm reduces the pre-processing overhead significantly, and is much faster than other metrics. Over...

Journal: :Mathematics in Computer Science 2017
Pooya Davoodi Rajeev Raman S. Srinivasa Rao

We observe that a standard transformation between ordinal trees (arbitrary rooted trees with ordered children) and binary trees leads to interesting succinct binary tree representations. There are four symmetric versions of these transformations. Via these transformations we get four succinct representations of n-node binary trees that use 2n + n/(log n) bits and support (among other operations...

2004
Peter Hui Marcus Schaefer

In the Paired Pointset Traversal problem we ask whether, given two sets A = {a1, . . . , an} and B = {b1, . . . , bn} in the plane, there is an ordering π of the points such that both a π(1), . . . , aπ(n) and bπ(1), . . . , bπ(n) are self-avoiding polygonal arcs? We show thatPaired Pointset Traversal is NP-complete. This has consequences for the complexity of computing the Fréchet distance of ...

2015
Ahmed Abujoda Panagiotis Papadimitriou

Middleboxes, such as firewalls, NATs, proxies, and application accelerators are known for their undesirable implications on traffic (mainly due to packet headers or paylod modifications) and for hindering connection establishment when certain protocols are in use (e.g., UDP, SCTP). Since many of these implications occur in middleboxes within ISPs or cellular networks, we present a software-defi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید