نتایج جستجو برای: if event

تعداد نتایج: 876956  

Journal: :iranian endodontic journal 0
ricardo machado carlos henrique ferrari eduardo back daniel comparin luiz fernando tomazinho luiz pascoal vansan

accumulation of soft tissue or dentinal remnants in the apical region is a common event that can cause blockage of root canals. this event can be avoided if apical patency is performed during the root canal shaping procedures. however, there is no consensus on the role of apical patency in relation to the success of endodontic treatment of necrotic teeth with apical periodontitis. therefore, th...

Journal: :journal of advances in computer research 2016
samaneh ghasemi zeinab ghorbani lakterashani

process mining includes the automated discovery of petri nets from event logs. these event logs are the starting point for various discovery and analysis techniques of the process.  in this paper process model is developed using colored petri nets (cpns) and the supporting software package cpn tools. the restaurant process model is represented for the analysis using a combination of process min...

Journal: :European Journal of Operational Research 2015
Rajitha M. Silva Ananda B. W. Manage Tim B. Swartz

This paper investigates the powerplay in one-day cricket. The rules concerning the powerplay have been tinkered with over the years, and therefore the primary motivation of the paper is the assessment of the impact of the powerplay with respect to scoring. The form of the analysis takes a “what if” approach where powerplay outcomes are substituted with what might have happened had there been no...

2016
Vincent Conitzer

In security games, the solution concept commonly used is that of a Stackelberg equilibrium where the defender gets to commit to a mixed strategy. The motivation for this is that the attacker can repeatedly observe the defender’s actions and learn her distribution over actions, before acting himself. If the actions were not observable, Nash (or perhaps correlated) equilibrium would arguably be a...

2014
Jörg Hoffmann Peter Kissmann Álvaro Torralba

Research on heuristic functions is all about estimating the length (or cost) of solution paths. But what if there is no such path? Many known heuristics have the ability to detect (some) unsolvable states, but that ability has always been treated as a by-product. No attempt has been made to design heuristics specifically for that purpose, where there is no need to preserve distances. As a case ...

2010
Ludovic Henrio Muhammad Uzair Khan Nadia Ranaldo Eugenio Zimeo

A natural way to benefit from distribution is via asynchronous invocations to methods or services. Upon invocation, a request is enqueued at the destination side and the caller can continue its execution. But a question remains: “what if one wants to manipulate the result of an asynchronous invocation?” First-class futures provide a transparent and easy-to-program answer: a future acts as the p...

Journal: :Journal of Philosophical Logic 2011

Journal: :CoRR 2017
Richard Pettigrew

We would like to arrive at a single coherent pair of credences in X and X. Perhaps we wish to use these to set our own credences; or perhaps we wish to publish them in a report of the WHO as the collective view of expert epidemiologists; or perhaps we wish to use them in a decision-making process to determine how medical research funding should be allocated in 2018. Given their expertise, we wo...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید