نتایج جستجو برای: مدل what if

تعداد نتایج: 1154828  

Journal: :Animal Sentience: An Interdisciplinary Journal on Animal Feeling 2023

The unexpended cognitive capacities of plants suggest the possibility combining them with advances in computation. It is important to explore such a new field research despite incompleteness empirical support for it.

2007
Stephen G. Walker Antonio Lijoi

This paper introduces a new approach to the study of rates of convergence for posterior distributions. It is a natural extension of a recent approach to the study of Bayesian consistency. In particular , we improve on current rates of convergence for models including the mixture of Dirichlet process model and the random Bernstein polynomial model. 1. Introduction. Recently, there have been many...

2015
Lorenzo Laporta Pantelis Nikolaidis José Afonso

Change is ubiquitous, but its degree and rate often affords detection of emerging patterns and establishing behavioral dynamics based on expected regularities. Match analysis capitalizes on such regularities, capturing information relevant for enhancing structure and reducing improvisation to a minimum. However, what if a game phase is only loosely regular, defying pattern systematization? Is i...

2010
Robert W. Gilmer Emily Kerr

Natural gas extraction is experiencing what has been called a quiet revolution. The industry historically viewed natural gas as trapped in reservoirs, where it collects over thousands of years after exiting source rock. Though hard to find, the reservoirs easily give up large amounts of their holdings when penetrated by drilling. But what if natural gas could be extracted directly from source r...

2010
E. M. KLEINBERG

Partition properties are perhaps the most fruitful of the various methods for defining and discussing large cardinals in set theory. In this paper we weaken in a natural way the most well known of these partition properties and examine the extent to which the cardinals defined remain "large." 1. 1.1. An area of set theory which has come under a great deal of study recently is that concerned wit...

2011
Jin Chen Wen Cheng Daniel Lopresti

Usually we assume large amount of data for writer identification, what if only little data is available, e.g., 1 page, 1 paragraph, or even 1 line? Several reasonable assumptions in forensics: • The writers are no longer available. • The writers might not be collaborative. The question is then: what can we do in this situation? • Use of synthetic data has been studies in fields like: signature ...

1999
George Archibald Nejat Karabakal Paul Karlsson

It has been said in this world of virtual corporations that it is no longer companies that compete, but supply chains. When you look at the model of a corporation today, the traditional vertically integrated business seems to be a thing of the past. A prime example of this is Nike. They own no factories, trucks, or stores, yet are one of the world's most successful retail firm. Today's supply c...

2006
Alexander Yip

The talk was given by Marcos Aguilera, who argued that a widening gap between storage capacity and transfer rates makes it increasingly difficult to handle large volumes of data. For example, an administrator may want to archive a snapshot of a volume for further reference, or run a “what if” installation of a new software package without affecting the main copy. Aguilera presented Olive, a dis...

2015
Chulhee Yun

Convex optimization also determines the next estimate based on the observation at previous points. In this sense, optimization has a close connection with active learning. An interesting question is: what if we become “passive” in optimization? That is, how important is adaptivity in optimization? Understanding this kind of problems becomes crucial in settings where observing a single point tak...

2009
Josef Svenningsson David Sands

Side channel attacks have emerged as a serious threat to the security of both networked and embedded systems – in particular through the implementations of cryptographic operations. Side channels can be difficult to model formally, but with careful coding and program transformation techniques it may be possible to verify security in the presence of specific side-channel attacks. But what if a p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید