نتایج جستجو برای: implementation
تعداد نتایج: 361910 فیلتر نتایج به سال:
Massachusetts Institute of Technology, Cambridge, Mass., and Beth Israel Hospital, Boston, Mass., USA (*); Politecnico di Milano, Milan, Italy (+) This article originally appeared in Computers in Cardiology (Washington, DC: IEEE Computer Society Press). Please cite this publication when referencing this material. A sample implementation of the algorithm described in this paper is available in s...
Modeling protean objects, i.e. objects adapting their structure and behavior dynamically with respect to a changeable environment, is often challenging in traditional object-oriented languages. According to the author, the root cause of this problem lies in the class-based conceptual framework embedded in the foundation of the object-oriented paradigm. The proposed paradigm Object Morphology (O...
machines for programming language implementation Stephan Diehl a,∗, Pieter Hartel b, Peter Sestoft c a FB-14 Informatik, Universität des Saarlandes, Postfach 15 11 50, 66041 Saarbrücken, Germany b Department of Electronics and Computer Science, University of Southampton, Highfield, Southampton SO17 1BJ, UK c Department of Mathematics and Physics, Royal Veterinary and Agricultural University, Th...
This is the first in a series of papers reporting Sustainability in Health care by Allocating Resources Effectively (SHARE). The SHARE Program is an investigation of concepts, opportunities, methods and implications for evidence-based investment and disinvestment in health technologies and clinical practices in a local healthcare setting. The papers in this series are targeted at clinicians, ma...
Universities have been targets of exploitation ever since the first university networks were created. Although security was not a prime objective, over the years different security systems where put in place to keep unauthorised users out. As the years pass these systems have implemented, in some cases, some intelligence. Unfortunately all, intelligent or not, have a common weakness. This weakn...
A data transmission framework is proposed to embed digital data into an audio signal in a perceptually undetectable or almost undetectable way. The resulting signal can be reproduced as is with no loss of acoustic quality; the embedded data can be exactly retrieved at the decoder. The transmission process exploits the perceptual redundancy of the audio signal to conceal the acoustic impact of t...
Let {X,Xn;n ∈ N} be a field of i.i.d. random variables indexed by d-tuples of positive integers and let Sn = ∑ k≤n Xk. We prove some strong limit theorems for Sn. Also, when d ≥ 2 and h(n) satisfies some conditions, we show that there are no LIL type results for Sn/ √ |n|h(n).
This pqjer establi^es a law-of-the-iterated-logarithm (LIL) version of the fundamental queueing fonnula i — X(f: Under regularity conditions, the continuous-time arrival counting process and queue-length process jointly obey an LIL when the discrete-time sequence of interanival times and waiting times jointly obey an LIL, and the limit sets are related. The standard relation L — \W appears as a...
OBJECTIVE Stakeholders of hospitals often lack standardized tools to assess compliance with quality management strategies and the implementation of clinical quality activities in hospitals. Such assessment tools, if easy to use, could be helpful to hospitals, health-care purchasers and health-care inspectorates. The aim of our study was to determine the psychometric properties of two newly deve...
In most Big Data applications, the data is heterogeneous. As we have been arguing in a series of papers, storage engines should be well suited to the data they hold. Therefore, a system supporting Big Data applications should be able to expose multiple storage engines through a single interface. We call such systems, polystore systems. Our reference implementation of the polystore concept is ca...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید