نتایج جستجو برای: only data

تعداد نتایج: 3410144  

2016
Boris Aronov Matias Korman Simon Pratt André van Renssen Marcel Roeloffzen

An s-workspace algorithm is an algorithm that has read-only access to the values of the input, write-only access to the output, and only uses O(s) additional words of space. We present a randomized s-workspace algorithm for triangulating a simple polygon P of n vertices that runs in O(n/s+ n logn log(n/s)) expected time using O(s) variables, for any s ≤ n. In particular, when s ≤ n logn log5 lo...

2010
Brian S. Rosner

As Betz observed in 1979, Paul never says that Christians are supposed to ‘do’ the Torah. This article seeks to develop the argument of omission in relation to Paul and the law. What else does he not say? According to Rom. 2.17-29, Jews ‘rely on’ the law, ‘boast’ in the law, know God’s will through the law, are educated in the law, have light, knowledge and truth because of the law, are to ‘do’...

1998
Yue Wang Dinggang Shen Eam Khwang Teoh

-In this paper, a Catmull-Rom spline based lane model which described the perspective effect of parallel lines was proposed for generic lane boundary. As Catmull-Rom spline can form arbitrary shapes by control points, it can describe a wider range of lane structures than other lane models such as straight and parabolic model. It formulates the lane detection problem in the form of determining t...

Journal: :J. Electronic Testing 2000
Said Hamdioui Ad J. van de Goor

A two-port memory contains two duplicated sets of address decoders, which operate independently. Testing such memories requires the use of single-port tests as well as special two-port tests; the test strategy determines which tests have to be used. Many two-port memories have ports which are read-only or write-only; this impacts the possible tests for single-port and two-port memories, as well...

2001
Kam-Yiu Lam Edward Chan

In this paper, we study the data inconsistency problem in data broadcast to mobile transactions. While data items in a mobile computing system are being broadcast, update transactions may install new values for the data items. If the executions of update transactions and broadcast of data items are interleaved without any control, the transactions generated by mobile clients, called mobile tran...

Journal: :International journal of imaging systems and technology 2009
Yan Yan Gengsheng Lawrence Zeng

Quantitative SPECT can be well achieved if photon attenuation is taken into account in the reconstruction process. Using a transmission scan is a common approach. A dramatic simplification could be made if the attenuation map could be obtained from the emission data. In this paper, we propose a new method to estimate the attenuation map using the data consistency conditions of the attenuated Ra...

Journal: :The annals of applied statistics 2013
William Fithian Trevor Hastie

Statistical modeling of presence-only data has attracted much recent attention in the ecological literature, leading to a proliferation of methods, including the inhomogeneous Poisson process (IPP) model, maximum entropy (Maxent) modeling of species distributions and logistic regression models. Several recent articles have shown the close relationships between these methods. We explain why the ...

Journal: :CoRR 2015
Marc Claesen Jesse Davis Frank De Smet Bart De Moor

Assessing the performance of a learned model is a crucial part of machine learning. Most evaluation metrics can only be computed with labeled data. Unfortunately, in many domains we have many more unlabeled than labeled examples. Furthermore, in some domains only positive and unlabeled examples are available, in which case most standard metrics cannot be computed at all. In this paper, we propo...

2014
Sebastian Vogl Jonas Pfoh Thomas Kittel Claudia Eckert

As protection mechanisms become increasingly advanced, so too does the malware that seeks to circumvent them. Protection mechanisms such as secure boot, stack protection, heap protection, W X , and address space layout randomization have raised the bar for system security. In turn, attack mechanisms have become increasingly sophisticated. Starting with simple instruction pointer manipulation ai...

1995
Qi Lu Mahadev Satyanarayanan

Disconnected operation is an important technique for providing mobile access to shared data in distributed file systems. However, data inconsistency resulting from partitioned sharing remains a serious concern. This paper presents a new mechanism called isolation-only transaction(IOT) that uses serializability constraints to automatically detect read/write conflicts. The IOT consistency model p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید