نتایج جستجو برای: concurrent patterns

تعداد نتایج: 470227  

2015
He Zhu Gustavo Petri Suresh Jagannathan

Proofs of linearizability of concurrent data structures generally rely on identifying linearization points to establish a simulation argument between the implementation and the specification. However, for many linearizable data structure operations, the linearization points may not correspond to their internal static code locations; for example, they might reside in the code of another concurre...

2008
Jing Lu Weiru Chen Osei Adjei Malcolm Keech

Sequential patterns mining is an important datamining technique used to identify frequently observed sequential occurrence of items across ordered transactions over time. It has been extensively studied in the literature, and there exists a diversity of algorithms. However, more complex structural patterns are often hidden behind sequences. This article begins with the introduction of a model f...

Maliheh Pishvaei, Samira Shahbazzadegan,

Overweight is one of the most common health problems and risk factors for many prenatal illnesses. The proportion of pregnant women with high body mass would be increased by increasing body mass in society. The purpose of this study was to explain the pregnancy experience in women with high body mass index. An interpretive phenomenological approach was used to conduct this study. Participants i...

Journal: :Journal of Social Science 2023


 One form of Data Mining application to analyze Market Basket Analysis. Analysis helps identify buying patterns formed from concurrent transactions. the problems with is that customer needs vary according season and time day, especially during this covid-19 season. For purpose, by using Artificial Neural Network (ANN) Approach connected Analysis, it can compare purchasing rules were befor...

2014
Horia V. Corcalciuc

A reoccurring problem with software security is that programmers are encouraged to reason about correctness either at code-level or at the design level, while attacks often tend to take places on intermediary layers of abstraction. It may happen that the code itself may seem correct and secure as long as its functionality has been demonstrated for example, by showing that some invariant has bee...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید