نتایج جستجو برای: replica replacement

تعداد نتایج: 117493  

Journal: :Proceedings of the National Academy of Sciences of the United States of America 2005
Pu Liu Byungchan Kim Richard A Friesner B J Berne

An innovative replica exchange (parallel tempering) method called replica exchange with solute tempering (REST) for the efficient sampling of aqueous protein solutions is presented here. The method bypasses the poor scaling with system size of standard replica exchange and thus reduces the number of replicas (parallel processes) that must be used. This reduction is accomplished by deforming the...

Journal: :J. Sensor and Actuator Networks 2012
Jun-Won Ho

In wireless sensor networks, replica node attacks are very dangerous because the attacker can compromise a single node and generate as many replicas of the compromised node as he wants, and then exploit these replicas to disrupt the normal operations of sensor networks. Several schemes have been proposed to detect replica node attacks in sensor networks. Although these schemes are capable of de...

Abbas Ali Imani Fooladi, Atiyeh Naderi Meghdad Abdollahpour Alitappeh Parvaneh Saffarian Roha Kasra Kermanshahi Sara Gharavi

Objective(s):Urinary tract infection (UTI) caused by bacteria is one of the most frequent infections in human population. Inappropriate use of antibiotics, often leads to appearance of drug resistance in bacteria. However, use of probiotic bacteria has been suggested as a partial replacement. This study was aimed to assess the antagonistic effects of Lactobacillus standard strains against bacte...

2016
Madhu Advani Surya Ganguli

2 Deriving inference error from the statistical physics of disordered systems 2 2.1 Replica equations at finite temperature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.2 Replica equations in the low temperature limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3 Moreau envelope formulation of the replica equations . . . . . ....

2004
Giwon On

As the Internet continues to experience a tremendous expansion in number of users and services today, the importance of satisfying service availability becomes recently one of the most critical factors for the success of “Internet services” such as the World Wide Web, peer-to-peer file sharing and digital audio/video streaming. In this thesis, we take an availability-centric view on end-to-end ...

2007
Giuseppe Gaeta

In the study of Replica Symmetry Breaking (RSB), one is led to consider functions f of pseu-domatrices, i.e. of matrices of order , with a real, rather than an integer, number. We propose a mathematically rigorous deenition of pseudomatrices, and show that from this it follows that the minimum of f over the space of pseudomatrices Q(x; y) which depend only on (x ?y) is also a critical point for...

Journal: :Nucleic Acids Research 1987

Journal: :Debates do NER 2015

2014
A. Joyce E. Nagarajan

In a structured peer-to-peer (p2p) network, Distributed Hash Tables (DHT) are maintained by nodes to store information and to route the packets. But sometimes a node can be attacked and so it may deny the DHT key access or misroute the packets. Replica Placement is a key mechanism to overcome these problems by placing replica for nodes in p2p network. MAXDISJOINT replica placement strategy crea...

Journal: :The Journal of Physical Chemistry B 2007

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید