نتایج جستجو برای: token

تعداد نتایج: 6257  

2013
François Recanati

1. Indexicality in language and thought As expression types, indexicals do not refer. Only tokens of an indexical refer, because indexical reference is achieved through relations between tokens of the indexical and other entities in the context of tokening ; entities which gain their status as referent in virtue of standing in these relations to the relevant token. For example, a token of 'I' r...

2002
Colette Johnen

We present a self stabilizing token circulation protocol on unidirectional anonymous rings This protocol does not required processor identi ers no distinguished processor i e all processors perform the same algorithm The algorithm can deal with any kind of schedulings even unfair ones Our protocol is a randomized self stabilizing meaning that starting from an arbitrary con guration in response ...

2001
Oliver Heckmann Frédéric Rohmer Jens Schmitt heckmann

This paper deals with the dimensioning of token buckets. Two related problems are formulated and solved. The first is the token bucket allocation problem (TBAP) which is finding the cost-minimal token bucket for the transmission of a given VBR traffic stream, e.g. an MPEG movie, from the user's point of view. This problem has been treated in literature before but as we will show not completely....

2006
Nancy Lynch

Vaidya paper: A mutual exclusion algorithm for ad hoc mobile networks Recall, their network model, changing graph, with links coming and going at any time. Managed mutual exclusion using a token traveling through the changing network. Used Gafni-Bertsekas link reversal ideas to maintain a token-oriented DAG (rather than a destination-oriented DAG as in GB). A node that receives the token may lo...

Journal: :Inf. Process. Lett. 2011
Hoda Taheri Peyman Neamatollahi Mahmoud Naghibzadeh

In token-based distributed mutual exclusion algorithms a unique object (token) is used to grant the right to enter the critical section. For the movement of the token within the computer network, two possible methods can be considered: perpetual mobility of the token and token-asking method. This paper presents a distributed token-based algorithm scheduling mutually exclusive access to a critic...

2013
Sara Bevacqua Erika Cerasti Rossella Falcone Milena Cervelloni Emiliano Brunamonti Stefano Ferraina Aldo Genovesio

Monkeys can learn the symbolic meaning of tokens, and exchange them to get a reward. Monkeys can also learn the symbolic value of a token by observing conspecifics but it is not clear if they can learn passively by observing other actors, e.g., humans. To answer this question, we tested two monkeys in a token exchange paradigm in three experiments. Monkeys learned token values through observati...

Journal: :Graphs and Combinatorics 2012
Ruy Fabila Monroy David Flores-Peñaloza Clemens Huemer Ferran Hurtado Jorge Urrutia David R. Wood

For a graph G and integer k ≥ 1, we define the token graph Fk(G) to be the graph with vertex set all k-subsets of V (G), where two vertices are adjacent in Fk(G) whenever their symmetric difference is a pair of adjacent vertices in G. Thus vertices of Fk(G) correspond to configurations of k indistinguishable tokens placed at distinct vertices of G, where two configurations are adjacent whenever...

Journal: :Archives of Otolaryngology–Head & Neck Surgery 2006

Journal: :European Journal for Philosophy of Science 2017

Journal: :Queueing Systems 1992

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید