نتایج جستجو برای: completion
تعداد نتایج: 48724 فیلتر نتایج به سال:
The structure of N-fluorobis(trifluoromethylsulfonyl)imide, prepared by a relatively safe and easy method, has been determined by gas-phase electron diffraction (GED), employing the SARACEN method, with flexible restraints based on the MP2/6-311G* structure, and by X-ray crystallography at 150 K. The strongly electron-withdrawing CF(3) and SO(2)CF(3) groups make the C-S and N-S distances long, ...
A check detection task in a 5 x 5 section of the chessboard, containing a King and one or two potential checking pieces was employed. The checking status (i.e., the presence or absence of a check) and the number of attackers (one or two) were manipulated. It was found that the reaction time cost for adding a distractor was differentially greater in no trials than yes trials for novice, but not ...
The properties of acoustic kinetic energy density and total energy density of sound fields in lightly damped enclosures have been explored thoroughly in the literature. Their increased spatial uniformity makes them more favorable measurement quantities for various applications than acoustic potential energy density (or squared pressure), which is most often used. In this paper, a generalized ac...
Abstract In this paper, we examine the antecedents and consequences of timing in the transition from high school to college. Using the National Education Longitudinal Study of 1988 (NELS:88), we find that 16 percent of high school graduates postpone enrollment by seven months or more after completing high school. Delayers tend to have some common characteristics: they come from families with fe...
We show the decidability of the existential theory of term algebras with any Knuth-Bendix ordering by giving a procedure for solving Knuth-Bendix ordering constraints.
To assist in the development of a real time applica tion monitoring is used to collect execution timing in formation for the application In this paper we propose a strategy that accurately reports timing information by accounting for intrusion introduced by monitoring In addition by allowing processes that miss deadlines to run to completion our approach provides the user with times by which th...
This paper describes a novel speech interface function, called speech completion, that helps a user enter a word or phrase by completing (filling in the rest of) a phrase fragment uttered by the user. Although the concept of completion has been widely used in text-based interfaces, effective completion for speech has not been proposed. We enable a user to invoke the speech-completion function i...
Delay-Insensitive paradigms, such as NULL Convention Logic (NCL), require an additional condition, referred to herein as Completion-Completeness, in order to ensure delay-insensitivity when the bit-wise completion strategy is used along with one or more components that are not complete with respect to all of their inputs. Completion-completeness requires that completion signals only be generate...
in this paper a network comprising alternative branching nodes with probabilistic outcomes is considered. in other words, network nodes are probabilistic with exclusive-or receiver and exclusive-or emitter. first, an analytical approach is proposed to simplify the structure of network. then, it is assumed that the duration of activities is positive trapezoidal fuzzy number (tfn). this paper com...
the present study aimed to identify strategies used to realize the speech act of offerin persian. to do so, 195 male and female native persian speakers were selected fromdiverse age ranges, educational backgrounds, and social classes, and were assigned a36-item discourse completion task (dct) to elicit the speech act of offer. thirtyfield workers also recorded naturally occurring interactions c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید