Showing 419,821 - 419,840 results of 420,088 for search '"A', query time: 3.36s Refine Results
  1. 419821
  2. 419822
  3. 419823
  4. 419824

    Borderlands/Chemins de traverse by Marie LIÉNARD-YETÉRIAN

    Published 2022-12-01
    “…A bilingual creative writing project on the theme of crossing borders, memory and observation written in prose poetry.…”
    Get full text
    Article
  5. 419825

    Erratum to: On universal splittings of tree-level particle and string scattering amplitudes by Qu Cao, Jin Dong, Song He, Canxin Shi, Fanky Zhu

    Published 2025-01-01
    “…A correction to this paper has been published: https://doi.org/10.1007/JHEP09(2024)049…”
    Get full text
    Article
  6. 419826

    Boundary value problems for the diffusion equation with piecewise continuous time delay by Joseph Wiener, Lokenath Debnath

    Published 1997-01-01
    “…A study is made of partial differential equations with piecewise constant arguments. …”
    Get full text
    Article
  7. 419827

    Improvement of the blockchain protocol based on memory-hard function by Sui CHENG, Xianzheng LIN, Nenghai YU

    Published 2020-10-01
    “…A new blockchain chain protocol was proposed,which allowed adjusting the loading time of the mining process.This strategy reduced the ASIC and CPU mining rate of the gap,so that the using of ASIC mining is limited.Finally,the safety of this new chain structure was analyzed and compared to the original chain protocol.…”
    Get full text
    Article
  8. 419828

    Subcontra-continuous functions by C. W. Baker

    Published 1998-01-01
    “…A weak form of contra-continuity, called subcontra-continuity, is introduced. …”
    Get full text
    Article
  9. 419829

    Composable information flow verification for service chain based on model checking by Ning XI, Jian-feng MA, Cong SUN, Di LU, Tao ZHANG

    Published 2014-11-01
    “…A composable information verification approach is proposed for the secure service chain composition.Based on the secure service component,the security constraints for the component’s composibility is specified and the information flow verification algorithms is proposed.Through the experiments and simulation,it shows that the approach can decrease the verification cost effectively and improve the efficiency of the verification.…”
    Get full text
    Article
  10. 419830

    Lessons from the History of Internet Studies by Allen Matthew

    Published 2021-01-01
    “…A Keynote Presentation given at the Open Literacy Digital Games, Social Responsibility and Social Innovation Symposium in celebration of the 20-year anniversary of the founding of Internet Studies at Curtin University. …”
    Get full text
    Article
  11. 419831

    Collision resolution algorithm based on time-series forecasting for cognitive wireless networks by Shuang-mao YANG, Wei GUO, Wei TANG

    Published 2011-11-01
    “…A novel prediction-based collision resolution algorithm for self-similar traffic in cognitive wireless networks was formulated.The packet collision was resolved by combining the tree splitting scheme and the prediction theory.Through theoretical analysis and simulation experiments,the proposed prediction-based collision resolution algorithm performs better than the binary-tree splitting algorithm in terms of network throughput and collision resolution period.…”
    Get full text
    Article
  12. 419832

    Key nodes discovery in network graph based on Graphlab by Zhuang-liang GAO, Yan-fei LYU, Hong ZHANG

    Published 2016-03-01
    “…A distributed key nodes discovery algorithm was proposed(DABC) which was implemented on Graphlab.Due to the good scalability,the scale of graph supported by algorithm was enlarged significantly.The parallel processing also enhances the speed of calculation.Experiment results show that proposed algorithm can achieve up to 4 times per-formance improvement compared with the traditional centralized key node discovery algorithm.…”
    Get full text
    Article
  13. 419833

    Towards Donors’ Responsibility in Monitoring Budget Support: Political and Technical Considerations by WOOD VALDIVIESO, Marta, Enrico COLOMBO

    Published 2013-06-01
    “…A very thin line separates the donor’s role as an active agent in the development process from his complementary role. …”
    Get full text
    Article
  14. 419834

    Anonymous authentication scheme based on one-off public key in pervasive computing environments by Chang-yuan LUO, Shi-wei HUO, Hong-zhi XING

    Published 2012-02-01
    “…A signature scheme with the one-off public key was proposed based on identity-based cryptography,which had less calculating and communicating expense compared with available schemes.An anonymous authentication scheme was designed based on the proposed signature scheme.When users committed,service provider together with the trusted center could reveal the malicious user's identity.The proposed scheme can realize strong anonymity and prevent the user committing.…”
    Get full text
    Article
  15. 419835

    High-Order Compact Implicit Difference Methods For Parabolic Equations in Geodynamo Simulation by Don Liu, Weijia Kuang, Andrew Tangborn

    Published 2009-01-01
    “…A series of compact implicit schemes of fourth and sixth orders are developed for solving differential equations involved in geodynamics simulations. …”
    Get full text
    Article
  16. 419836

    ESTILOS DE INTERAÇÃO EM INTERFACES PARA DISPOSITIVOS MÓVEIS by Robson Santos, Francimar Maciel

    Published 2010-01-01
    “…A era do processamento digital da informação trouxe mudanças na maneira das pessoas se comunicarem por meio de artefatos digitais. …”
    Get full text
    Article
  17. 419837

    Research on simple query algorithm during mobile terminal disconnection by Ru-bing LIANG, Qiong LIU

    Published 2014-03-01
    “…A simple query processing algorithm SQPID (simple query processing in disconnection),was proposed.Main idea of SQPID is to build integrated related semantic cache item about current query through combining and clipping operations.In order to simplify the procedure,SQPID's combine does not involve indirect relativity estimation.The results of simulated experiments show that SQPID's query response time and degree of accuracy better meet client's requirements than QPID algorithm.…”
    Get full text
    Article
  18. 419838

    Distributed interference coordination based on multi-agent deep reinforcement learning by Tingting LIU, Yi’nan LUO, Chenyang YANG

    Published 2020-07-01
    “…A distributed interference coordination strategy based on multi-agent deep reinforcement learning was investigated to meet the requirements of file downloading traffic in interference networks.By the proposed strategy transmission scheme could be adjusted adaptively based on the interference environment and traffic requirements with limited amount of information exchanged among nodes.Simulation results show that the user satisfaction loss of the proposed strategy from the optimal strategy with perfect future information does not exceed 11% for arbitrary number of users and traffic requirements.…”
    Get full text
    Article
  19. 419839

    Novel role analysis method for network domain users by Xiao-feng XU, Li YANG, Wei WANG

    Published 2017-03-01
    “…A novel role analysis method for network domain users was proposed.Firstly,the algorithm used ISODATA algorithm to cluster network events for user behavior analysis,on the basis of conditions,the method search relationships between varieties of grouping sets in the network instance,and identify each user role in the performing process of network instance.Finally,simulation results show that the effectiveness of the proposed algorithm can distinguish the network user hierarchy and obtain the dominant roles about network users.…”
    Get full text
    Article
  20. 419840

    Researches on efficient transmission protocol for multi-cell system based on interference toleration by Bao-feng JI, Chun-guo LI, Kang SONG, Yi WANG, Liang SONG

    Published 2016-05-01
    “…A two-time-slot transmission protocol was designed according to the cell-edge users' interference problem.The precoder closed expressions under the proposed transmission protocol were derived based on the well-known precoder scheme of the signal-to-leakage-plus-noise ratio(SLNR).Furthermore,an adaptive receiver was based on the non-linear minimum mean square error criterion.Simulation results demonstrated that the proposed transmission protocol has significant sum-rate gains compared with traditional system.…”
    Get full text
    Article