نتایج جستجو برای: مدل what if
تعداد نتایج: 1154828 فیلتر نتایج به سال:
The unexpended cognitive capacities of plants suggest the possibility combining them with advances in computation. It is important to explore such a new field research despite incompleteness empirical support for it.
This paper introduces a new approach to the study of rates of convergence for posterior distributions. It is a natural extension of a recent approach to the study of Bayesian consistency. In particular , we improve on current rates of convergence for models including the mixture of Dirichlet process model and the random Bernstein polynomial model. 1. Introduction. Recently, there have been many...
Change is ubiquitous, but its degree and rate often affords detection of emerging patterns and establishing behavioral dynamics based on expected regularities. Match analysis capitalizes on such regularities, capturing information relevant for enhancing structure and reducing improvisation to a minimum. However, what if a game phase is only loosely regular, defying pattern systematization? Is i...
Natural gas extraction is experiencing what has been called a quiet revolution. The industry historically viewed natural gas as trapped in reservoirs, where it collects over thousands of years after exiting source rock. Though hard to find, the reservoirs easily give up large amounts of their holdings when penetrated by drilling. But what if natural gas could be extracted directly from source r...
Partition properties are perhaps the most fruitful of the various methods for defining and discussing large cardinals in set theory. In this paper we weaken in a natural way the most well known of these partition properties and examine the extent to which the cardinals defined remain "large." 1. 1.1. An area of set theory which has come under a great deal of study recently is that concerned wit...
Usually we assume large amount of data for writer identification, what if only little data is available, e.g., 1 page, 1 paragraph, or even 1 line? Several reasonable assumptions in forensics: • The writers are no longer available. • The writers might not be collaborative. The question is then: what can we do in this situation? • Use of synthetic data has been studies in fields like: signature ...
It has been said in this world of virtual corporations that it is no longer companies that compete, but supply chains. When you look at the model of a corporation today, the traditional vertically integrated business seems to be a thing of the past. A prime example of this is Nike. They own no factories, trucks, or stores, yet are one of the world's most successful retail firm. Today's supply c...
The talk was given by Marcos Aguilera, who argued that a widening gap between storage capacity and transfer rates makes it increasingly difficult to handle large volumes of data. For example, an administrator may want to archive a snapshot of a volume for further reference, or run a “what if” installation of a new software package without affecting the main copy. Aguilera presented Olive, a dis...
Convex optimization also determines the next estimate based on the observation at previous points. In this sense, optimization has a close connection with active learning. An interesting question is: what if we become “passive” in optimization? That is, how important is adaptivity in optimization? Understanding this kind of problems becomes crucial in settings where observing a single point tak...
Side channel attacks have emerged as a serious threat to the security of both networked and embedded systems – in particular through the implementations of cryptographic operations. Side channels can be difficult to model formally, but with careful coding and program transformation techniques it may be possible to verify security in the presence of specific side-channel attacks. But what if a p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید