Results 281 to 290 of about 6,228,748 (341)
Some of the next articles are maybe not open access.
Spatial autoregression model: strong consistency
Statistics & Probability Letters, 2003zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Bhattacharyya, B. B. +3 more
openaire +2 more sources
Strong consistency is not hard to get: Two-Phase Locking and Two-Phase Commit on Thousands of Cores
Proceedings of the VLDB Endowment, 2019Concurrency control is a cornerstone of distributed database engines and storage systems. In pursuit of scalability, a common assumption is that Two-Phase Locking (2PL) and Two-Phase Commit (2PC) are not viable solutions due to their communication ...
Claude Barthels +4 more
semanticscholar +1 more source
On the strong consistency of feature‐weighted k‐means clustering in a nearmetric space
Stat, 2019Weighted k‐means (WK‐means) is a well‐known method for automated feature weight learning in a conventional k‐means clustering framework. In this paper, we analytically explore the strong consistency of the WK‐means algorithm under independent and ...
Saptarshi Chakraborty, Swagatam Das
semanticscholar +1 more source
Strong Consistency of Reliability Estimators for Multiple-Component Measuring Instruments
Structural Equation Modeling: A Multidisciplinary Journal, 2019It is shown that the maximum likelihood estimator of the widely used omega coefficient for reliability of multicomponent measuring instruments converges almost surely to the population reliability coefficient for normal congeneric measures with ...
T. Raykov
semanticscholar +1 more source
Basis token consistency: supporting strong Web cache consistency
Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE, 2003With Web caching and cache-related services like CDNs and edge services playing an increasingly significant role in the modern Internet, the problem of the weak consistency and coherence provisions in current Web protocols is drawing increasing attention.
A.D. Bradley, A. Bestavros
openaire +1 more source
Journal of nonparametric statistics (Print), 2018
In this paper we present a new estimator of the conditional density and mode when the co-variables are of functional kind. This estimator is a combination of both, the k-Nearest Neighbours procedure and the functional local linear estimation.
Z. Chikr-Elmezouar +3 more
semanticscholar +1 more source
In this paper we present a new estimator of the conditional density and mode when the co-variables are of functional kind. This estimator is a combination of both, the k-Nearest Neighbours procedure and the functional local linear estimation.
Z. Chikr-Elmezouar +3 more
semanticscholar +1 more source
Friend or Foe: Strong Consistency vs. Overload in High-Availability Distributed Systems and SDN
2018 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), 2018Distributed systems play an increasingly important role in leading-edge networks with high availability requirements, including software-defined networks (SDN), where replicating essential network state information is critical to ensure resilience under ...
R. Hanmer +3 more
semanticscholar +1 more source
Strong consistency of Lasso estimators
Sankhya A, 2011zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Chatterjee, A., Lahiri, S. N.
openaire +2 more sources
2019 International Conference on Computer Science, Information Technology, and Electrical Engineering (ICOMITEE), 2019
Secret sharing is a cryptographic primitive used to securely distribute a secret value S among n participants such that only predetermined subsets of these participants (called access sets) can later reconstruct S. Such a scheme is said to be secure in the information theoretic setting if an adversary with unlimited computational power cannot reduce ...
Louis Cianciullo +3 more
openaire +1 more source
Secret sharing is a cryptographic primitive used to securely distribute a secret value S among n participants such that only predetermined subsets of these participants (called access sets) can later reconstruct S. Such a scheme is said to be secure in the information theoretic setting if an adversary with unlimited computational power cannot reduce ...
Louis Cianciullo +3 more
openaire +1 more source
StableVideo: Text-driven Consistency-aware Diffusion Video Editing
IEEE International Conference on Computer Vision, 2023Diffusion-based methods can generate realistic images and videos, but they struggle to edit existing objects in a video while preserving their appearance over time.
Wenhao Chai +3 more
semanticscholar +1 more source

