نتایج جستجو برای: comparative evaluation

تعداد نتایج: 1048943  

2013
Ahmed Waliullah Kazi Hussein Badr

In this simulation-based performance study, we focus on bandwidth consumption in CCN, taking into consideration the effect that in-network caching and FIBs have on this consumption, under topologies and workloads of varying characteristics. Unlike previous performance studies, we do not assume pre-populated FIBs. We focus primarily, but not exclusively, on the default CCN forwarding strategy (f...

2012
Ravinder Singh

Security of information has become an important issue in data communication. Encryption has come up as a solution, and plays a vital role in information security system. This security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by party those possesses the associated key. These algorithms consume a significant amount of compu...

2002
David Coeurjolly Reinhard Klette

Relative convex hulls have been suggested for multigrid-convergent surface area estimation. Besides the existence of a convergence theorem there is no efficient algorithmic solution so far for calculating relative convex hulls. This article discusses an approximative solution based on minimum-length polygon calculations. It is illustrated that this approximative calculation also proves (experim...

Journal: :Postgraduate medical journal 1951
G BLAINE

An absorbable haemostatic is a material which acts as a haemostat but is subsequently itself absorbed in the tissues, leaving no trace. Such a material is of use in certain cases of haemorrhage which it is impossible or impractical to control by more direct methods. Since haemostasis was at all times one of the primary aims of surgery, it is obvious that the search for such materials is of long...

2002
Darren Pearce

Abstract This paper describes an experiment that attempts to compare a range of existing collocation extraction techniques as well as the implementation of a new technique based on tests for lexical substitutability. After a description of the experiment details, the techniques are discussed with particular emphasis on any adaptations that are required in order to evaluate it in the way propose...

Journal: :CoRR 2012
Mahnoosh Kholghi Mohammad Reza Keyvanpour

to the user's queries should be time and space efficient. In this paper, we consider the special requirements of indexing to determine the performance of different techniques in data stream processing environments. Stream indexing has main differences with approaches in traditional databases. Also, we compare data stream indexing models analytically that can provide a suitable method for stream...

2015
Balendra P Singh Bhaskar Agarwal Nishi Singh Abhinav Shekhar Mayank Singh

Statement of problems: Two potential problems commonly identified with a denture base incorporating a resilient liner are a failure of the bond between the acrylic resin and resilient liner material and colonization of Candida albicans over time. Aims: This in vitro experimental study evaluated the shear and compressive bond strength as well as colonization of Candida albicans of commonly avail...

2014
Benjamin G. Zorn

This thesis shows that object-level, trace-driven simulation can facilitate evaluation of language runtime systems and reaches new conclusions about the relative performance of important garbage collection algorithms. In particular, I reach the unexpected conclusion that mark-and-sweep garbage collection, when augmented with generations, shows comparable CPU performance and much better referenc...

2004
Daniel Le Berre Massimo Narizzano Laurent Simon Armando Tacchella

This paper reports about the 2004 comparative evaluation of solvers for quantified Boolean formulas (QBFs), the second in a series of non-competitive events established with the aim of assessing the advancements in the field of QBF reasoning and related research. We evaluated sixteen solvers on a test set of about one thousand benchmarks, selected from instances submitted to the evaluation and ...

2015
Oluwafemi Osho

Mobile technology, over the years, has improved tremendously in sophistication and functionality. Today, there are mobile phones, known as smartphones, that can perform virtually most functions associated with personal computers. This has translated to increase in the adoption of mobile technology. Consequently, there has been an increase in the number of attacks against and with the aid of thi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید