نتایج جستجو برای: reference value

تعداد نتایج: 975912  

2006
SHUJI SAITO KANETOMO SATO

Contents Introduction 2 1. Homology theory, cycle map, and Kato complex 6 2. Vanishing theorem 10 3. Bertini theorem over a discrete valuation ring 14 4. Surjectivity of cycle map 17 5. Blowup formula and moving lemma 19 6. Proof of main theorem 21 7. Applications of main theorem 23 References 25 1 2 SHUJI SAITO AND KANETOMO SATO

2000
David F. Hastings

Frequent references are made to the use of portfolio spread rates in managing financial risks in banks, but indications as to the procedures for determining such rates are very scant. The purpose of this article is to present some initial ideas on the subject: a Standard Funding system indicates what each portfolio should have earned, while an Actual Funding system points out what each portfoli...

2004
ALBERT LEON WHITEMAN

It has been conjectured that iϊ-matrices and even skew iJ-matrices always exist for n divisible by 4. Constructions of both types of matrices have been given for particular values of n and also for various infinite classes of values (see [1] for the pertinent references). In [1] D. Blatt and G. Szekeres constructed for the first time a skew ίf-matrix of order 52. Their construction is summarize...

Journal: :J. Informetrics 2013
Lutz Bornmann Loet Leydesdorff Jian Wang

s, and editorial materials. Taken as a whole, we only excluded 7.7% (n=19) subject categories (at the subject category level) and 24.1% (151,272) papers (at the paper level). As a 2 Notes were removed from the database as a document type in 1997, but they were citable items in 1980. 12 result, we kept 475,391 papers for the analysis, and the annual citation counts (from 1980 to 2010) of these p...

2004

is integrable in the first argument on [a + ε, b − ε] for arbitrary ρ ∈ [0,+∞[ and ε ∈ ]0, (b− a)/2[ . Of special interest for us is the case where the function f (and therefore the function f) is non-integrable in the first argument on [a, b], having singularities at the ends of this segment. In this sense the problems (1), (2) and (1), (3) are singular ones. Singular boundary value problems f...

2007
Hsuan Chuang

Methods of communications vary among different cultures. In some countries, people tend to use direct and simple methods of communications, while in other countries, indirect or complex methods of communications may be preferred instead. Cultural backgrounds not only affect how negotiators act the way they do, but also determine their values. Each negotiator may subconsciously bring his or her ...

Journal: :AJR. American journal of roentgenology 2014
Hieu Trung Huynh Ibrahim Karademir Aytekin Oto Kenji Suzuki

OBJECTIVE Our purpose was to develop an accurate automated 3D liver segmentation scheme for measuring liver volumes on MRI. SUBJECTS AND METHODS Our scheme for MRI liver volumetry consisted of three main stages. First, the preprocessing stage was applied to T1-weighted MRI of the liver in the portal venous phase to reduce noise and produce the boundary-enhanced image. This boundary-enhanced i...

Journal: :AI Commun. 2007
Bert Bredeweg Paulo Salles Tim Nuttle

Representing the impact of external factors on the behaviour of a system is a challenge for modellers, particularly when these factors are dynamic and may change during the simulation. This article presents mechanisms implemented in the qualitative reasoning engine Garp3 for modelling quantities that exhibit exogenously defined behaviours. Exogenous quantities are those that influence the syste...

2008
Annalisa Appice Michelangelo Ceci Donato Malerba

(Multi-)relational regression consists of predicting continuous response of target objects called reference objects by taking into account interactions with other objects called task-relevant objects. In relational databases, reference objects and task-relevant objects are stored in distinct data relations. Interactions between objects are expressed by means of (many-to-one) foreign key constra...

2011
Leanid Krautsevich Aliaksandr Lazouski Fabio Martinelli Artsiom Yautsiukhin

In Usage CONtrol (UCON) access decisions rely on mutable attributes. A reference monitor should re-evaluate security policies each time when attributes change their values. Catching timely all attribute changes is a challenging issue, especially if the attribute provider and the reference monitor reside in different security domains. Some attribute changes might be missed, corrupted, and delaye...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید