نتایج جستجو برای: potentially tetradentrate

تعداد نتایج: 190650  

2014
Christopher Antila Julie Cumming

The VIS Framework for Music Analysis is a modular Python library designed for “big data” queries in symbolic musical data. Initially created as a tool for studying musical style change in counterpoint, we have built on the music21 and pandas libraries to provide the foundation for much more. We describe the musicological needs that inspired the creation and growth of the VIS Framework, along wi...

2008
Jon Oberheide Evan Cooke Farnam Jahanian

Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased antivirus is questionable. Antivirus software fails to detect many modern threats and its increasing complexity has resulted in vulnerabilities that are being exploited by malware. This paper advocates a new model for malw...

2001
Judy Crow Sam Owre John Rushby N. Shankar

We explore ways to enhance the utility of PVS for evaluating, testing, and animating PVS specifications. The PVS ground evaluator is the focus of the work. We describe a mechanism to provide semantic attachments for PVS symbols while preserving soundness, and discuss strategies to provide a generic framework for integrating independently developed applications with PVS. We explore these capabil...

2007
M. Adamo G. De Carolis V. De Pasquale G. Pasquariello

SAR spaceborne capability to detect marine oil spills through the damping of wind generated short gravitycapillary waves has been extensively demonstrated during the past years. In contrast, it has not yet been found any suitable method which exploits VIS/NIR imagery supporting SAR observations. To this end, we propose the use of MODIS and MERIS images acquired in sunglint conditions to reveal ...

1998
Urbashi Mitra Dirk Slock

Blind channel identiication techniques based on second order statistics are investigated for multiuser systems employing Direct-Sequence/Code-Division Multiple-Access (DS/CDMA). The methods exploit knowledge of the spreading code of the user of interest via matched ltering, as well as properties of spreading codes. Two schemes are presented: one for deterministic short sequence DS/CDMA and a me...

Journal: :Theor. Comput. Sci. 2003
David R. Lester Paul Gowland

The whole point of exact arithmetic is to generate answers to numeric problems, within some user-speci1ed error. An implementation of exact arithmetic is therefore of questionable value, if it cannot be shown that it is generating correct answers. In this paper, we show that the algorithms used in an exact real arithmetic are correct. A program using the functions de1ned in this paper has been ...

2006
PETER B. MOYLE MICHAEL P. MARCHETTI

S lakes, and estuaries are among the most highly invaded ecosystems in the world; in many of them, alien organisms are now a significant part of the biota (Cohen 2002). The best-documented invaders in these systems are fishes. Because many fish species are widely introduced, there is concern among scientists and managers over the homogenization of freshwater fish faunas worldwide (McKinney and ...

1995
Máire Ní Chiosáin

1. Introduction Early accounts of epenthesis in Optimality Theory focused on epenthesis that results from constraints on prosodic structure, that is, from syllable structure constraints or minimal prosodic category (e.g. minimal word) requirements. McCarthy & Prince (1993a) account for word-internal consonant epenthesis at V-V junctures in Axininca Campa, for example, by ranking ONSET (Syllable...

Journal: :New Phytologist 2010

Journal: :British Dental Journal 2012

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید