نتایج جستجو برای: implementation methods

تعداد نتایج: 2166756  

Journal: :J. Sci. Comput. 2007
James V. Lambers

Krylov subspace spectral methods have been shown to be high-order accurate in time and more stable than explicit time-stepping methods, but also more difficult to implement efficiently. This paper describes how these methods can be fashioned into practical solvers by exploiting the simple structure of differential operators Numerical results concerning accuracy and efficiency are presented for ...

2007
Julian Harris Jan Madsen

This paper outlines the methods used to realise the implementation of the Service Speciic Connection Oriented Protocol (SS-COP) which forms a main component in the Signalling ATM Adaptation Layer (SAAL). We give a short introduction to Synchronous C++, a concurrent extension to C++, followed by a protocol programming method based on these extensions. We show how this environment is made complet...

Journal: :CoRR 2011
David Prochazka Tomas Koubek

PROCHÁZKA, D., KOUBEK, T.: Augmented reality implementation methods in mainstream applications. Acta univ. agric. et silvic. Mendel. Brun., 2011, LIX, No. 4, pp. 257–266 Augmented reality has became an useful tool in many areas from space exploration to military applications. Although used theoretical principles are well known for almost a decade, the augmented reality is almost exclusively use...

Journal: :J. Log. Program. 1991
Alberto Marchetti-Spaccamela Antonella Pelaggi Domenico Saccà

D A logic query Q is a triple (G, LP, D), where G is the query goal, LP is a logic program without function symbols, and D is a set of facts, possibly stored as tuples of a relational database. The answers of Q are all facts that can be inferred from LP U D and unify with G. A logic query is bound if some argument of the query goal is a constant; it is canonical strongly linear (a CSL query) if...

1993
ZHANGXIN CHEN

In this paper we show that mixed nite element methods for a fairly general second order elliptic problem with variable coeecients can be given a non-mixed formulation. (Lower order terms are treated, so our results apply also to parabolic equations.) We deene an approximation method by incorporating some projection operators within a standard Galerkin method, which we call a projection nite ele...

2001
S. Holeman G. Manimaran James Davis

Though the areas of secure multicast group architecture, key distribution, and sender authentication are under scrutiny, one topic that has not been explored is how to integrate these with multilevel security. Multilevel security is the ability to distinguish subjects according to classification levels, which determines to what degree they can access confidential objects. In the case of groups,...

2004
Dheera Venkatraman

Quantum mechanical properties of communication lines may be lead to new possibilities in the security of key distribution. By taking advantage of basic quantum mechanical principles, it may be possible to create secure systems that rely upon the physics of the system rather than computational or mathematical methods for security. In this paper, three possible protocols for quantum key distribut...

1975
V. Pilshikov

This paper describee some new methods used in PLANNER-BESM-6 system for the implementation of PLANNER. Backtracking is implemented with a single stack and no copying of activation frames is needed. Lists are represented as arrays of pointers ; the garbage collector for this representation requires no additional memory. Restrictions on variable values are accomplished by using 'semi-defined f st...

2012

AbstractImage fusion became very important in today research. As the images were being used without the required information contained in it. And thus more than one image was being used to produce the actual information that is to be produced. The fusion is the process of combining two images used to produce one image, which contains more information than the source images. Fused images provide...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید