نتایج جستجو برای: outlet bucket
تعداد نتایج: 17705 فیلتر نتایج به سال:
We propose the implementation of a distributed system for DL storage and retrieval which relies on two earlier developed technologies: buckets and document linking based on user retrieval patterns. Buckets are expanded with a mechanism to keep track of weighted bucket relations. Each bucket keeps track of its connections to other related buckets. A mechanism is put in place which allows buckets...
ABSTRACT. In this work we provide a combinatorial analysis of bucket recursive trees, which have been introduced previously as a natural generalization of the growth model of recursive trees. Our analysis is based on the description of bucket recursive trees as a special instance of so called bucket increasing trees, which is a family of combinatorial objects introduced in this paper. Using thi...
Bucket brigade foraging improves upon homogeneous foraging by reducing spatial interference between robots, which occurs when robots are forced to work in the same space, and must spend time avoiding one another instead of carrying out useful work. Bucket brigade foraging algorithms restrict the motion of each robot to at most some fixed distance from its starting location. We reproduce the per...
A virtual queue can be used to predict when a real queue is about to grow. This memo explains why using a leaky bucket to implement a virtual queue is not useful, despite a superficial similarity. However, it is possible to implement a useful virtual queue using two leaky buckets. It requires a simple trick that can typically be implemented with existing hardware.
The bucket-handle meniscal tear is a specific type of meniscal injuries which has specific signs on MRI. An attached fragment displaced away from the meniscus with any type of tear causes bucket-handle tear of the meniscus. Magnetic resonance imaging (MRI) is the most commonly used diagnostic tool for meniscal injuries. We present a case of free medial meniscal fragment which mimics the disloca...
Abstract In this paper we focus on the behavior of the token leaky bucket mechanism with respect to second-order statistics of the departure process under various correlated cell arrival and deterministic token arrival distributions. We derive expressions for the lag-k auto-correlation of the inter-departure times for the token leaky bucket cell departure stream and we produce numerical example...
In this paper we consider very fast evaluation of strongly universal hash functions, or equivalently, authentication codes. We show how it is possible to modify some known families of hash functions into a form such that the evaluation is similar to \bucket hashing", a technique for very fast hashing introduced by Rogaway. Rogaway's bucket hash family has a huge key size, which for common param...
Experiments to determine the horizontal static bearing capacity are carried out first. The static bearing capacity is a reference for choosing the amplitudes of dynamic load. Then a series of experiments under dynamic horizontal load are carried out in laboratory to study the influences of factors, such as the scales of bucket, the amplitude and frequency of load, the density of soils etc.. The...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید