نتایج جستجو برای: if
تعداد نتایج: 696408 فیلتر نتایج به سال:
for the first time nakayama introduced qf-ring. in 1967 carl. faith and elbert a. walker showed that r is qf-ring if and only if each injective right r-module is projective if and only if each injective left r-modules is projective. in 1987 s.k.jain and s.r.lopez-permouth proved that every ring homomorphic images of r has the property that each cyclic s-module is essentialy embeddable in dire...
Today scientists are producing large volumes of data that they wish to explore and visualize. In this paper we describe a system that combines range-based queries with fast lookup to allow a scientist to quickly and efficiently ask “what if?” questions. Unique to our system is the ability to perform “cumulative queries” that work on both an intraand inter-time step basis. The results of such qu...
Facebook has established itself as one of the major players in social networking, claiming that it helps members connect and share with the people in their lives. But what if the people you want to connect and share with are your artistic collaborators? Can Facebook be used creatively, as a collaborative artistic environment? This paper explores the creative use of Facebook as a tool for creati...
This paper investigates the powerplay in one-day cricket. The rules concerning the powerplay have been tinkered with over the years, and therefore the primary motivation of the paper is the assessment of the impact of the powerplay with respect to scoring. The form of the analysis takes a “what if” approach where powerplay outcomes are substituted with what might have happened had there been no...
In security games, the solution concept commonly used is that of a Stackelberg equilibrium where the defender gets to commit to a mixed strategy. The motivation for this is that the attacker can repeatedly observe the defender’s actions and learn her distribution over actions, before acting himself. If the actions were not observable, Nash (or perhaps correlated) equilibrium would arguably be a...
Research on heuristic functions is all about estimating the length (or cost) of solution paths. But what if there is no such path? Many known heuristics have the ability to detect (some) unsolvable states, but that ability has always been treated as a by-product. No attempt has been made to design heuristics specifically for that purpose, where there is no need to preserve distances. As a case ...
A natural way to benefit from distribution is via asynchronous invocations to methods or services. Upon invocation, a request is enqueued at the destination side and the caller can continue its execution. But a question remains: “what if one wants to manipulate the result of an asynchronous invocation?” First-class futures provide a transparent and easy-to-program answer: a future acts as the p...
We would like to arrive at a single coherent pair of credences in X and X. Perhaps we wish to use these to set our own credences; or perhaps we wish to publish them in a report of the WHO as the collective view of expert epidemiologists; or perhaps we wish to use them in a decision-making process to determine how medical research funding should be allocated in 2018. Given their expertise, we wo...
An injective map from the vertex set of a graph G—its order may not be finite—to the set of all natural numbers is called an arithmetic (a geometric) labeling of G if the map from the edge set which assigns to each edge the sum (product) of the numbers assigned to its ends by the former map, is injective and the range of the latter map forms an arithmetic (a geometric) progression. A graph is c...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید