نتایج جستجو برای: search protocols

تعداد نتایج: 391475  

Journal: :The journal of the American Academy of Psychiatry and the Law 2003
Lisa Jo Bertman John W Thompson William F Waters Laura Estupinan-Kane James A Martin Lori Russell

In this study, we evaluated the effectiveness of individualized treatment on restoration of competency in patients adjudicated incompetent to stand trial. Treatment groups included deficit-focused remediation (six individual sessions and four group sessions; n = 8), legal rights education (control group; six individual sessions and four group sessions; n = 10), and standard hospital treatment (...

Journal: :ACM Transactions on Software Engineering and Methodology 2021

A significant proportion of classes in modern software introduce or use object protocols, prescriptions on the temporal orderings method calls objects. This article studies search-based test generation techniques that aim to exploit a particular abstraction protocols (enabledness preserving abstractions (EPAs)) find failures. We define coverage criteria over an extension EPAs includes abnormal ...

ژورنال: توانبخشی 2022

Background and aim. Identifying the factors affecting the reduction of ankle sprain complications as well as rapid recovery and prevention of re-injury after ankle sprain occurs are considered as the essentials. Therefore, the present meta- analysis investigate the challenge that which training modalities have a better effect on the balance and motor function of people with chronic ankle instab...

2017
KIJUNG SHIN BRYAN HOOI JISU KIM CHRISTOS FALOUTSOS Kijung Shin Bryan Hooi

In this section, we show that the density measure (Definition 1) used in the main paper satisfies properties that a reasonable “anomalousness” measure should meet. These properties were proposed in [Jiang et al. 2015]. Here, we consider two N -way tensors, T of size I1 × I2 × ...× IN and T′ of size I ′ 1 × I ′ 2 × ...× I ′ N . We denote the sum of the entries in each tensor by sum(T) and sum(T′...

2005
Doug Cutting

Nutch is an open-source project providing both complete Web search software and a platform for the development of novel Web search methods. Nutch is built on a distributed storage and computing foundation, such that every operation scales to very large collections. Core algorithms crawl, parse and index Web-based data. Plugins extend functionality at various points, including network protocols,...

2016
David A. Keiter Fred L. Cunningham Olin E. Rhodes Brian J. Irwin James C. Beasley

Collection of scat samples is common in wildlife research, particularly for genetic capture-mark-recapture applications. Due to high degradation rates of genetic material in scat, large numbers of samples must be collected to generate robust estimates. Optimization of sampling approaches to account for taxa-specific patterns of scat deposition is, therefore, necessary to ensure sufficient sampl...

2014
Ian Robertson Abigail Smith Jennifer Tucker Erica Cilia Kangni Chen Rose Marion Julian Nesbitt Steve Ramcharitar Mala Cathiavadi Greamspet

Trust guidelines and policies outline recommendations for the management of common clinical and non-clinical situations, serving to standardise best practice. Prior to this project, there was no consolidated location for these documents. Lack of organisational structure and inadequate search functionality within the trust intranet led to time wasted locating information, acting outside of recog...

Journal: :Wireless Personal Communications 2010
Imran Erguler Emin Anarim

Many RFID authentication protocols have been proposed to preserve security and privacy. Nevertheless, most of these protocols are analyzed and it is shown that they can not provide security against some RFID attacks. Moreover, some of the secure ones are criticized, because they suffer from scalability at the reader/server side as in tag identification or authentication phase they require a lin...

2002
Tao Ye Shivkumar Kalyanaraman

This paper proposes a new heuristic search algorithm, Recursive Random Search(RRS), for blackbox optimization problems. Specifically, this algorithm is designed for the dynamical parameter optimization of network protocols which emphasizes on obtaining good solutions within a limited time frame rather than full optimization. The RRS algorithm is based on the initial high-efficiency property of ...

2006
Sung Hyun Kim Min Kyo Shin PooGyeon Park

This paper proposes a tree-based anti-collision protocol for tags in the UHF (ultra high frequency, 300MHz–3GHz) band. To reduce the step for searching all tags in the interrogation zone, the depth-first search (DFS) is used as a basic search criterion like in query tree protocols. To prevent the redundant increase of the transmission bit length in process of implementing the DFS, the binary tr...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید