نتایج جستجو برای: concurrent patterns
تعداد نتایج: 470227 فیلتر نتایج به سال:
Proofs of linearizability of concurrent data structures generally rely on identifying linearization points to establish a simulation argument between the implementation and the specification. However, for many linearizable data structure operations, the linearization points may not correspond to their internal static code locations; for example, they might reside in the code of another concurre...
Sequential patterns mining is an important datamining technique used to identify frequently observed sequential occurrence of items across ordered transactions over time. It has been extensively studied in the literature, and there exists a diversity of algorithms. However, more complex structural patterns are often hidden behind sequences. This article begins with the introduction of a model f...
Overweight is one of the most common health problems and risk factors for many prenatal illnesses. The proportion of pregnant women with high body mass would be increased by increasing body mass in society. The purpose of this study was to explain the pregnancy experience in women with high body mass index. An interpretive phenomenological approach was used to conduct this study. Participants i...

 One form of Data Mining application to analyze Market Basket Analysis. Analysis helps identify buying patterns formed from concurrent transactions. the problems with is that customer needs vary according season and time day, especially during this covid-19 season. For purpose, by using Artificial Neural Network (ANN) Approach connected Analysis, it can compare purchasing rules were befor...
RATES AND PATTERNS OF RESPONDING WITH CONCURRENT FIXED-INTERVAL AND VARIABLE-INTERVAL REINFORCEMENT1
A reoccurring problem with software security is that programmers are encouraged to reason about correctness either at code-level or at the design level, while attacks often tend to take places on intermediary layers of abstraction. It may happen that the code itself may seem correct and secure as long as its functionality has been demonstrated for example, by showing that some invariant has bee...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید