نتایج جستجو برای: line access

تعداد نتایج: 725051  

Journal: :Theor. Comput. Sci. 2000
Conrado Martínez Salvador Roura

We consider the list access problem and show that one questionable assumption in the original cost model presented by Sleator and Tarjan 13] and subsequent literature allowed for several competitiveness results of the move-to-front rule (MTF). We present an oo-line algorithm for the list access problem and prove that, under a more realistic cost model, no on-line algorithm can be c-competitive ...

2000
Salvador Roura

We consider the list access problem and show that one questionable assumption in the original cost model presented by Sleator and Tarjan (1985) and subsequent literature allowed for several competitiveness results of the move-to-front rule (MTF). We present an o -line algorithm for the list access problem and prove that, under a more realistic cost model, no on-line algorithm can be c-competiti...

1994
Duen-Ren Liu Shashi Shekhar Mark Coyle

Current Spatial Database Management Systems (SDBMS) provide eecient access methods and operators for point and range queries over collections of spatial points, line segments , and polygons. However, it is not clear if they can ef-ciently support network computations which traverse line-segments in a spatial network based on connectivity rather than geographic proximity. It can be shown that th...

Hasan Rahnama Zahra Razi,

Immature embryos as a choice tissue for genetic transformation of maize have a few limitations, such as genotype dependence, time-consuming and requiring a well-equipped greenhouse for access, at any time. In the present study, the split-seed explants were used for genetic transformation of maize, B73 line. The transformation of maize split-seed explants from the inbred line B73, for resistance...

2013
Mohammad Masdari Esmail Amini

Software production line is one of the most active trends in software engineering. Most available methods are based on tripod architecture. In this paper, it is provided new frame with100% extensibility for data access layer. It is such a frame which can be used for all information system in all sizes. The difference of this method with the others is that the others are used to produce data acc...

2000
Emmett Witchel Krste Asanović

The span cache is a hardware-software design for a new kind of energy-efficient microprocessor data cache which has two key features. The first is direct addressing which allows software to access cache data without the hardware performing a cache tag check. These tag-unchecked loads and stores save the energy of performing a tag check when the compiler can guarantee an access will be to the sa...

Journal: :Archives of disease in childhood 2000
M Peters S V Beath J W Puntis P John

A 4 year old child was referred for small bowel transplantation. He had superior vena cava obstruction secondary to numerous central venous line placements; alternative routes for long term central venous access were compromised by extensive venous occlusive disease. Patency for the superior vena cava was re-established with stenting, which allowed for radiological placement of another central ...

2004
Greg Jones

This paper discusses how the concept of on-line distributed learning environments is being remade with advances in affordable computing hardware, video graphics, and Internet access. The original concept from the 1970’s of synchronous on-line computer mediated communications is changing in ways that can be a benefit to communities using distributed learning methods. The approach fits between co...

2006
João Paulo Ribeiro Pereira José Adriano Pires

1 João Paulo Ribeiro Pereira, Escola Superior de Tecnologia e Gestão de Bragança, Campus de Santa Apolónia Apartado 134 5301-857 Bragança – Portugal, [email protected] 2 José Adriano Pires, Escola Superior de Tecnologia e Gestão de Bragança, Campus de Santa Apolónia Apartado 134 5301-857 Bragança – Portugal, [email protected] Abstract ⎯ Broadband technologies have view great growth over the past decade....

2017
Ashwini Gaikwad Varsha Pandit

Aim: To evaluate the strength of an endodontically treated tooth after preservation of peri-cervical dentin and soffit. Methodology: 30 human molars having well developed cusps and morphology were extracted for periodontal reasons were included in this study. They were divided in two groups. In gp. A, ClarkKhademi access was made and endodontic treatment was carried out with 2% NiTi K-files and...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید