Results 21 to 30 of about 264,335 (250)
(Near) Optimal Adaptivity Gaps for Stochastic Multi-Value Probing [PDF]
Consider a kidney-exchange application where we want to find a max-matching in a random graph. To find whether an edge e exists, we need to perform an expensive test, in which case the edge e appears independently with a known probability p_e.
Bradac, Domagoj +2 more
core +2 more sources
Spin noise spectroscopy to probe quantum states of ultracold fermionic atomic gases [PDF]
Ultracold alkali atoms provide experimentally accessible model systems for probing quantum states that manifest themselves at the macroscopic scale. Recent experimental realizations of superfluidity in dilute gases of ultracold fermionic (half-integer ...
A. J. Leggett +8 more
core +1 more source
Topic-Based Influence Computation in Social Networks under Resource Constraints [PDF]
As social networks are constantly changing and evolving, methods to analyze dynamic social networks are becoming more important in understanding social trends.
Bingöl, Kaan +4 more
core +2 more sources
Design, implementation, and testing of advanced virtual coordinate-measuring machines [PDF]
Copyright @ 2011 IEEE. This article has been made available through the Brunel Open Access Publishing Fund.Advanced virtual coordinate-measuring machines (CMMs) (AVCMMs) have recently been developed at Brunel University, which provide vivid graphical ...
Hu, Y, Sun, X, Yang, Q
core +1 more source
PENGARUH MODEL PEMBELAJARAN PROBING PROMPTING BERBANTUAN MEDIA VIDEO TERHADAP HASIL BELAJAR IPA
Penelitian ini bertujuan untuk mengetahui pengaruh yang signifikan model pembelajaran probing-prompting berbantuan media video terhadap hasil belajar IPA siswa kelas V SD di gugus V Kecamatan Bangli Tahun Ajaran 2018.Penelitian ini adalah penelitian ...
Ni Wayan Sri Kartika Dewi +2 more
doaj +1 more source
Water inrush in tunneling poses serious harm to safe construction, causing economic losses and casualties. The prediction of water hazards before tunnel excavations becomes an urgent task for governments or enterprises to ensure security.
Daiming Hu +5 more
doaj +1 more source
A unified approach to linear probing hashing with buckets [PDF]
We give a unified analysis of linear probing hashing with a general bucket size. We use both a combinatorial approach, giving exact formulas for generating functions, and a probabilistic approach, giving simple derivations of asymptotic results.
Janson, Svante, Viola, Alfredo
core +2 more sources
Penelitian ini bertujuan untuk mengetahui perbedaan yang signifikan hasil belajar IPA antara siswa kelas V SD Gugus I Kecamatan Kuta Utara tahun ajaran 2017/2018 yang mengikuti pembelajaran probing prompting berbantuan multimedia dan yang mengikuti ...
Ni Pt Rasni Karwati +2 more
doaj +1 more source
We evaluate the leading-order short-range nuclear matrix element for the neutrinoless double-beta (0νββ) decay of the nuclei most relevant for experiments, including 76Ge, 100Mo, 130Te and 136Xe.
Lotta Jokiniemi +2 more
doaj +1 more source
Modeling Soft Analytical Side-Channel Attacks from a Coding Theory Viewpoint
One important open question in side-channel analysis is to find out whether all the leakage samples in an implementation can be exploited by an adversary, as suggested by masking security proofs.
Qian Guo +3 more
doaj +1 more source

