Suggested Topics within your search.
Showing 1 - 20 results of 3,258 for search '"possessive"', query time: 0.05s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Possession or position games: What is the key in soccer? by Jose A. Asian-Clemente, Borja Muñoz, Jose Vicente Beltran-Garrido, Bernardo Requena

    Published 2024-04-01
    “…The aims of this study were to compare the running performance of possession and position games and to describe the external load of the same position game played on pitches of different dimensions. …”
    Get full text
    Article
  5. 5

    Possessives with kinship terms in Italian and Italo-Romance dialects by Francesca Volpato, Gianluca Lebani

    Published 2024-12-01
    Subjects: “…third-person possessive…”
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12

    Bifurcation of Gradient Mappings Possessing the Palais-Smale Condition by Elliot Tonkes

    Published 2011-01-01
    “…This paper considers bifurcation at the principal eigenvalue of a class of gradient operators which possess the Palais-Smale condition. The existence of the bifurcation branch and the asymptotic nature of the bifurcation is verified by using the compactness in the Palais Smale condition and the order of the nonlinearity in the operator. …”
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Multi-replica provable data possession scheme supporting data dynamic updating by Long CHEN, Yu-zhu LUO

    Published 2014-11-01
    “…Considering the application demand of multiple replicas data security and data dynamic update,a multi-replica provable data possession scheme was proposed to supporting data dynamic updating.The original data file can be dynamically updated using dynamic verification structure.The other multiple-replica data files are just append with a log-record for each dynamic update operation.The multi-replica files support public auditability and batch verification.If the original data or any replica is corrupted or missing,it can be recovered to the latest status with another copy.The performances of the communication and storage as well as the security are analyzed.The results show that the scheme is efficient and secure.…”
    Get full text
    Article