نتایج جستجو برای: made check

تعداد نتایج: 519428  

Journal: :CoRR 2009
Vamsi Kundeti

Fingerprinting is a well known technique, which is often used in designing Monte Carlo algorithms for verifying identities involving matrices, integers and polynomials. The book by Motwani and Raghavan [1] shows how this technique can be applied to check the correctness of matrix multiplication – check if AB = C where A,B and C are three n×n matrices. The result is a Monte Carlo algorithm runni...

2011
Jörg Becker Philipp Bergener Patrick Delfmann Mathias Eggert Burkhard Weiß

Recently, several approaches have been developed to check process models for compliance with laws and regulations. In this paper a contribution is made with respect to reducing the complexity of compliance checking by partially automating business process compliance (BPC) checking. We present a model checking approach that is able to check process models for BPC. In particular, we apply a gener...

2010
Antonio de Pádua Albuquerque Oliveira Julio Cesar Sampaio do Prado Leite Luiz Marcio Cysneiros

The i* Framework has been regarded as a suitable organizational modeling approach for representing early requirements of complex software systems. Intentionality in organizational context is the aim of i* Framework. We believe that a general lack of awareness about the i* language is the main reason for some authors mistakes including the lack of focus on intentionality. Aiming to help changing...

2006
Jean-Pierre Merlet Peter Donelan

Checking the regularity of the inverse jacobian matrix of a parallel robot is an essential element for the safe use of this type of mechanism. Ideally such check should be made for all poses of the useful workspace of the robot or for any pose along a given trajectory and should take into account the uncertainties in the robot modeling and control. We propose various methods that facilitate thi...

Journal: :journal of english language teaching and learning 2014
bager yaqubi sedigheh karimpour

teacher questions are claimed to be constitutive of classroom interaction because of their crucial role both in the construction of knowledge and the organization of classroom proceedings (dalton puffer, 2007). most of previous research on teachers’ questions mainly focused on identifying and discovering different question types believed to be helpful in creating the opportunities for learners’...

2013
T. Godhavari

The focus of this study is to develop a novel method of encoding the qubits and use as secret key in public key cryptography. In BB 84 protocol, 50% of the random number (generated at source) is used as secret key and the remaining bits are used as “check bits”. The check bits are used to detect the presence of eve as well as the nature of quantum channels. In this protocol, random qubits are e...

Journal: :The Journal of Applied Laboratory Medicine: An AACC Publication 2016

Journal: :International Journal of Computer Applications 2010

2001
L. A. Lobo A. D. Nikolov

A new method is developed to measure the contact angle of air bubbles attached to an air-water interface. The measurements made from the microscopic interference pattern (Newton rings), which are obtained by viewing the bubble in reflected light, are used in conjunction with the solutions of the Laplace equations to the fluid interfaces to obtain the contact angle of the film. Measurements made...

Journal: :Physical review. E, Statistical, nonlinear, and soft matter physics 2009
Peter Grassberger

We check claims for a generalized central limit theorem holding at the Feigenbaum (infinite bifurcation) point of the logistic map made recently by Tirnakli, Phys. Rev. 75, 040106(R) (2007); this issue, Phys. Rev.79, 056209 (2009). We show that there is no obvious way that these claims can be made consistent with high statistics simulations. Instead, we find other scaling laws for related quant...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید