نتایج جستجو برای: least restrictive alternative
تعداد نتایج: 690429 فیلتر نتایج به سال:
Social choice functions (SCFs) map the preferences of a group agents over some set alternatives to non-empty subset alternatives. The Gibbard-Satterthwaite theorem has shown that only extremely restrictive SCFs are strategyproof when there more than two For set-valued SCFs, or so-called social correspondences, situation is less clear. There miscellaneous -- mostly negative results using variety...
abstract: in the paper of black and scholes (1973) a closed form solution for the price of a european option is derived . as extension to the black and scholes model with constant volatility, option pricing model with time varying volatility have been suggested within the frame work of generalized autoregressive conditional heteroskedasticity (garch) . these processes can explain a number of em...
Tropical endomyocardial fibrosis is a rare entity in the present era. Restrictive cardiomyopathy due to tapioca consumption is very rare, although it has been reported in India, especially in state of Kerala. We report a rare case of restrictive cardiomyopathy secondary to tapioca consumption in a 20-year-old male patient.
Research into the maintenance of procedural knowledge has focused on the detection of declarative meta-structures within the procedures. An alternative approach is described here based on the ripple-down-rules (RDR) formalism. To the standard RDR rule tree, we add a functions environment hierarchy that stores the implementation of the procedures used in the rules. This functions environment str...
Objective: Importance of management of gardens weeds is an issue that unfortunately has less been investigated by weeds researchers of country. One of the most important restrictive agents of cultivated surface and producing crops of Citrus orchards are weeds. Methods: To achieve this purpose, a research was performed in plot of Valencia orange trees of citrus fruits of Dezful in 2013. This pro...
Adaptable software systems and architectures give the programmer the ability to create applications that might customize themselves to runtime-emerging requirements. Computational reflection is a programming language technique that is commonly used to achieve the development of this kind of systems. Most runtime reflective systems use meta-object protocols (MOPs). However, MOPs restrict the amo...
We examine state legislator behavior on restrictive voter identification (ID) bills from 2005 to 2013. Partisan polarization of state lawmakers on voter ID laws is well known, but we know very little with respect to other determinants driving this political division. A major shortcoming of extant research evaluating the passage of voter ID bills stems from using the state legislature as the uni...
The XML port scanning technique described in this paper allows an attacker to utilise an XML parser to execute port scanning of systems behind a restrictive perimeter firewall. While the technique relies on some reasonably specific implementation details in order to be exploitable remotely, it is potentially applicable to any application that accepts XML document inputs. Several workarounds exi...
Methods A total of 43 consecutive patients (age 44 10 years) with moderate to severe PVS referred to Royal Brompton Hospital from 2002 to 2005 were retrospectively studied. Patient New York Heart Association (NYHA) functional class was recorded. The RV (lateral tricuspid annulus motion) long-axis movement was measured by M-mode and pulsed-wave (PW) tissue Doppler imaging (TDI). Restrictive RV p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید