PDF Archive search engine
Last database update: 04 March at 04:36 - Around 76000 files indexed.
In UANs, distributed sensor nodes are deployed over vast spatial environments and linked together using acoustic communication.
https://www.pdf-archive.com/2014/12/27/1569926793/
27/12/2014 www.pdf-archive.com
Ledger Consensus through Voting in the Trestor Network Trestor Foundation∗ July 1, 2015 Abstract This whitepaper describes the Trestor Network (T-Net) consensus protocol, which achieves consensus on the account ledger among network nodes in a decentralized manner.
https://www.pdf-archive.com/2017/12/02/tnet-protocol/
01/12/2017 www.pdf-archive.com
Nodes that have already been visited by the robot will not be considered successors either.
https://www.pdf-archive.com/2016/05/24/bfsdfstutorial/
24/05/2016 www.pdf-archive.com
1khalidzahedi@yahoo.com, 2yasserzahedi@gmail.com, 3abdsamad@utm.my ABSTRACT Vehicular Ad hoc Network (VANET) is a special case of Mobile Ad hoc Network (MANET) with two key differences which are the high and constrained mobility of its nodes.
https://www.pdf-archive.com/2017/03/21/p2-1-1/
21/03/2017 www.pdf-archive.com
This information includes the identification of the most prestigious nodes, the key predicates, the reachability of the nodes, and more statistics concerning the linked datasets.
https://www.pdf-archive.com/2018/05/22/mining-linked-data/
22/05/2018 www.pdf-archive.com
Assume that you are upgrading your overlay messaging nodes using the knowledge that you have accrued in the current programming assignment;
https://www.pdf-archive.com/2014/03/14/asg2-wc-srinivas-majeti/
14/03/2014 www.pdf-archive.com
https://www.pdf-archive.com/2016/09/29/burning-bridges-imposed/
29/09/2016 www.pdf-archive.com
A binary tree is balanced if for each node it holds that the number of inner nodes in the left subtree and the number of inner nodes in the right subtree differ by at most 1.
https://www.pdf-archive.com/2017/12/01/process-wars/
01/12/2017 www.pdf-archive.com
As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers.
https://www.pdf-archive.com/2018/02/23/doc/
23/02/2018 www.pdf-archive.com
As long as a majority of CPU power is controlled by nodes that are not cooperating to attack the network, they'll generate the longest chain and outpace attackers.
https://www.pdf-archive.com/2014/08/31/bitcoin/
31/08/2014 www.pdf-archive.com
The two children nodes of the root node assert that statements s1 and s2 are always executed together, and so are statements s3 and s4, though not necessarily one after another;
https://www.pdf-archive.com/2015/10/22/paper11/
21/10/2015 www.pdf-archive.com
However in 2014, an 11C-choline PET/CT scan indicated a second recurrence with new lesions, in two para-aortal lymph nodes.
https://www.pdf-archive.com/2017/05/30/jdit-2014-1028-005/
29/05/2017 www.pdf-archive.com
As a result, professionals, hobbyists and students introduced to the field can be significantly overwhelmed by the constantly changing relationships among those technologies. Introducing a simpler way of viewing and clustering technologies within the field of computer science would help people get a clearer picture of the application and trends of the technologies people are using. As an example, someone being introduced to Python for the first time might understand the syntax and basic applications, but won’t be able to recognize how Python interacts and fits in the grand scheme of technologies. For the characterization of such technologies we used Stack Overflow as a source of data directly related to the field trends. Stack Overflow is a popular internet platform for people to ask and answer technologically relevant questions. We used their API to gather the tags of each post and construct a similarity network based on the frequency two tags are seen together. We chose to visualise our results by constructing a node map using the network analysis library networkX and the visualization package Gephi . The visualization contains each note as the tag and all the vectornodes as the related technologies. Methods and Techniques We constructed a network out of the 1000 most 1 popular tags and examined the characteristics of our network. Each network node reflects a technology tag and each connection represents a directional dependency to other tags. In order to measure the dependency we computed the conditional probability of each tag appearing with another. This metric implies that each tag combination has 2 relationships that it can be characterized with. One is the relationship of tag1 to tag2 and, conversely, the relationship of tag2 to tag1. We chose dependency over the jaccard distance of two tags due to hub nodes being connected to so many other nodes, and, as a result, the strength of the connection becomes diluted. As an example, python’s connection to pandas has an index of 0.08 (8% of all python posts are about pandas) but pandas’ connection to python is 0.9, meaning that 90% of all pandas posts also include the “python” tag. In order to consider a connection between two tags as valid, we set a threshold of d(1,2) > 5%.
https://www.pdf-archive.com/2017/02/09/networkpaper-1/
09/02/2017 www.pdf-archive.com
When training nodes of each tree, the used train set is taken out from the total train set with certain random proportion, and these taken out train set will not put back to the total train set.
https://www.pdf-archive.com/2017/10/11/ihmsc-2017-132/
11/10/2017 www.pdf-archive.com
The!nodes!have!been!labeled!and!the!
https://www.pdf-archive.com/2011/12/09/instruction-manual/
09/12/2011 www.pdf-archive.com
However, the communications across relay nodes cannot be guaranteed to be anonymous.
https://www.pdf-archive.com/2017/08/15/npatel/
15/08/2017 www.pdf-archive.com
this incorporates determining when flow is possible, their rates, the ability for a network to sustain a spanning path when nodes or links are removed etc.
https://www.pdf-archive.com/2016/02/11/adaptive-percolation-daniel-burkhardt-cerigo/
11/02/2016 www.pdf-archive.com
Hong Lin Front-end/JavaScript &
https://www.pdf-archive.com/2015/09/09/resume-2015-summer-eng/
09/09/2015 www.pdf-archive.com
• For each node, all simple paths from the node to descendant leaves contain the same number of black nodes.
https://www.pdf-archive.com/2017/03/28/08-red-black-tree/
28/03/2017 www.pdf-archive.com
https://www.pdf-archive.com/2015/10/22/caesar-ii-max-combination-loadcase/
22/10/2015 www.pdf-archive.com
19 6 A reputation system for nodes 21 6.1 6.2 6.3 Node interactions .
https://www.pdf-archive.com/2015/05/15/main/
15/05/2015 www.pdf-archive.com
https://www.pdf-archive.com/2015/04/15/nodeschool-ba/
15/04/2015 www.pdf-archive.com
The change would not require an entire new program for the nodes, just the changing of certain parameters within the client.
https://www.pdf-archive.com/2014/12/05/majorxtcedits/
05/12/2014 www.pdf-archive.com
http://www.thinkmate.com/system/hdx-xt24-5260v...
https://www.pdf-archive.com/2017/03/04/mozilla/
04/03/2017 www.pdf-archive.com
Every node v ∈ V has capacity cv (note that the nodes s and t are included in V ).
https://www.pdf-archive.com/2016/04/25/algorithm7-13/
25/04/2016 www.pdf-archive.com