Results 41 to 50 of about 699,238 (343)

Log Log Laws for Empirical Measures

open access: yesThe Annals of Probability, 1980
Let $(X, \mathscr{A}, P)$ be a probability space and $\mathscr{C}$ a collection of measurable sets. Suppose $\mathscr{C}$ is a Donsker class, i.e., the central limit theorem for empirical measures holds uniformly on $\mathscr{C}$, in a suitable sense. Suppose also that suitable ($P\varepsilon$-Suslin) measurability conditions hold.
Kuelbs, J., Dudley, R. M.
openaire   +2 more sources

Kakovost bukovine v Sloveniji – trenutno stanje in pričakovane spremembe ob sanaciji žledoloma

open access: yesLes, 2017
Beech is a predominant tree species in Slovenian forests, and together with spruce they represent as much as two-thirds of the total growing stock. As a predominant tree species, it will be one of the key factors in the selection and planning of wood ...
Jurij Marenče   +2 more
doaj   +1 more source

Summing threshold logs in a parton shower [PDF]

open access: yes, 2016
When parton distributions are falling steeply as the momentum fractions of the partons increases, there are effects that occur at each order in $\alpha_s$ that combine to affect hard scattering cross sections and need to be summed.
Nagy, Zoltan, Soper, Davison E.
core   +1 more source

Deadwood Diversity of Boreal and Sub-boreal Old-growth Forests in Southern Finland

open access: yesSouth-East European Forestry
In the last century, old-growth forests in boreal and sub-boreal zone have decreased, along with their contribution to biological diversity. In order to carry on management strategies aimed at maintaining deadwood diversity in old-growth forests, it is ...
Isabella De Meo   +3 more
doaj   +1 more source

Outlier detection from ETL Execution trace

open access: yes, 2011
Extract, Transform, Load (ETL) is an integral part of Data Warehousing (DW) implementation. The commercial tools that are used for this purpose captures lot of execution trace in form of various log files with plethora of information.
Chakrabarti, Amlan   +2 more
core   +1 more source

Jets in Effective Theory: Summing Phase Space Logs [PDF]

open access: yes, 2006
We demonstrate how to resum phase space logarithms in the Sterman-Weinberg (SW) dijet decay rate within the context of Soft Collinear Effective theory (SCET). An operator basis corresponding to two and three jet events is defined in SCET and renormalized.
G. Sterman   +3 more
core   +2 more sources

A Systematic Review of Evidence on the Clinical Effectiveness of Surveillance Imaging in Children With Medulloblastoma and Ependymoma

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Surveillance imaging aims to detect tumour relapse before symptoms develop, but it's unclear whether earlier detection of relapse leads to better outcomes in children and young people (CYP) with medulloblastoma and ependymoma. This systematic review aims to identify relevant literature to determine the efficacy of surveillance magnetic ...
Lucy Shepherd   +3 more
wiley   +1 more source

A Big Data Analyzer for Large Trace Logs [PDF]

open access: yes, 2015
Current generation of Internet-based services are typically hosted on large data centers that take the form of warehouse-size structures housing tens of thousands of servers.
Babaoglu, Ozalp   +4 more
core   +1 more source

Prognostic Impact of Treatment Modalities, Including Targeted Compartmental Radio‐Immunotherapy, in a Cohort of Neuroblastoma Patients With CNS Metastases at Relapse

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Introduction Neuroblastoma (NB) with central nervous system (CNS) metastases is rare at diagnosis, but occurs more often during relapse/progression. Patients with CNS metastases face a dismal prognosis, with no standardized curative treatment available.
Vicente Santa‐Maria Lopez   +13 more
wiley   +1 more source

Semantic process mining tools: core building blocks [PDF]

open access: yes, 2008
Process mining aims at discovering new knowledge based on information hidden in event logs. Two important enablers for such analysis are powerful process mining techniques and the omnipresence of event logs in today's information systems.
de Medeiros, Ana Karla Alves   +2 more
core  

Home - About - Disclaimer - Privacy