نتایج جستجو برای: b lock e xogeneity

تعداد نتایج: 1819180  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه فردوسی مشهد 1376

a را به عنوان جبر باناخ در نظر می گیریم. آنگاه دو نوع مسئله پیوستگی خودبه خود روی a موجود است . ابتدا اگر ?:a--->b همریختی از a بتوی هر جبر باناخ b باشد، چه موقع ؟ خودبه خود پیوسته است و در صورت دوم اگرd:a--->x عملگر مشتق از a بتوی هر باناخ دو مدل x باشد، چه موقع d خودبه خود پیوسته است . در این مقاله در حالتیکه a به صورت b(e) است به این دو مسئله می پردازیم. فرض کنیم x یک -a دو مدل باناخ و d:a--...

Journal: :CoRR 2017
Trevor Brown

Techniques for Constructing Efficient Lock-free Data Structures Trevor Brown Doctor of Philosophy Graduate Department of Computer Science University of Toronto 2017 Building a library of concurrent data structures is an essential way to simplify the difficult task of developing concurrent software. Lock-free data structures, in which processes can help one another to complete operations, offer ...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشکده اصول الدین 1388

²k¼.a co. rb½c /swa ­½j b.na pa ° ³t.o£ nao. rajbl?ten nj ³. swa »£nqm rjbl? pb?¯ /k¯a²jo. b¼m an rjbl? ­½a ²b¢½b]° ¨b.« seao bm j±µ . 114 ° r±l.®? . 45 ³¦?] pa j±l.c« ocmaom nj bv¯a ­t.o£ nao. s§be ­½ot´m .±zi° swa .±.i° .±zi pb?¯ s.¼.e /(±®«?« . 2 c 1) /swa anaj an »t.¼.e ­¼®a ­¼®«?« pb?¯ ,co. ».o.« omb®m° swa y½±i ­½km ° j±{»« ¥?b. pb?¯ ?aom bv¯a ³. swa »t¼?µa °o£ nj aki ³m b?½a ° ³]±u...

2009
Evangelos Bampas Leszek Gasieniec Nicolas Hanusse David Ilcinkas Ralf Klasing Adrian Kosowski

The rotor-router model, also called the Propp machine, was first considered as a deterministic alternative to the random walk. It is known that the route in an undirected graph G = (V,E), where |V | = n and |E| = m, adopted by an agent controlled by the rotor-router mechanism forms eventually an Euler tour based on arcs obtained via replacing each edge in G by two arcs with opposite direction. ...

Journal: :J. Parallel Distrib. Comput. 1996
Pedro C. Diniz Martin C. Rinard

Atomic operations are a key primitive in parallel computing systems. The standard implementation mechanism for atomic operations uses mutual exclusion locks. In an object-based programming system the natural granularity is to give each object its own lock. Each operation can then make its execution atomic by acquiring and releasing the lock for the object that it accesses. But this ne lock gran...

1999
Donna Gilleskie Byron Lutz

This paper attempts to provide additional evidence that married males who hold employerprovided health insurance (EPHI) are not locked into their jobs. Most of the previous literature on job-lock nds reductions in the mobility of these workers of between 20 and 40%. We introduce two new strategies for generating unbiased estimates of job-lock. First, a feature unique to the National Longitudina...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی 1392

چکیده پایان نامه (شامل خلاصه، اهداف، روش های اجرا و نتایج به دست آمده): محققان و سرمایه گذاران همواره به دنبال راهی برای پیش بینی سود در بازار سرمایه می باشند. سود اضافی از مسائلی است که به خصوص در تحقیقات انجام شده در ایران کمتر مرکز توجه بوده است. در این تحقیق بر آنیم، تا با بکارگیری دو نسبت p/e و¬ p/b ¬سود باقیمانده را پیش بینی کنیم. در سایر کشورها نیز اغلب بر اساس یکی از این دو نسبت، سود ...

2017
Yang Liu Lianjie Fu Jinling Wang Chunxi Zhang

One of the adverse impacts of scintillation on GNSS signals is the loss of lock status, which can lead to GNSS geometry and visibility reductions that compromise the accuracy and integrity of navigation performance. In this paper the loss of lock based on ionosphere scintillation in this solar maximum phase has been well investigated with respect to both temporal and spatial behaviors, based on...

2009
Ali. Ahmad Alawneh Samer Hanna

Ali. Ahmad Alawneh, Samer Hanna Philadelphia University Amman Jordan [email protected], [email protected] Abstract Based on the Amit and Zott e-Value framework, we have developed an extended conceptual research model for assessing the value of e-business at the bank level. For the purposes of our research some parameters were added to or excluded from e-Value framework since our re...

2007
Goetz Graefe

Three designs of hierarchical locking suitable for B-tree indexes are explored in detail and their advantages and disadvantages compared. Traditional hierarchies include index, leaf page, and key range or key value. Alternatively, locks on separator keys in interior B-tree pages can protect key ranges of different sizes. Finally, for keys consisting of multiple columns, key prefixes of differen...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید