161 |
Characterization of pyrolysis products from end-of-life electronic equipmentThiruvallur, Venkatadri E. January 1900 (has links)
Thesis (M.S.)--West Virginia University, 2004. / Title from document title page. Document formatted into pages; contains viii, 147 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 126-127).
|
162 |
Resource based plan revision in dynamic multi-agent environmentsErdoğdu, Utku. January 2004 (has links) (PDF)
Thesis (M.S.)--Middle East Technical University, 2004. / Keywords: resource based planning dynamic multi-agent environment.
|
163 |
Soviet Union and computing : a system failure : the cybernetic critique of Soviet history /Karaiosfoglou, Ioannis. January 2003 (has links)
Thesis (M.A.)--Central Connecticut State University, 2003. / Thesis advisor: Jay Bergman. " ... in partial fulfillment of the requirements for the degree of Master of Arts in History." Includes bibliographical references (leaves 279-291). Also available via the World Wide Web.
|
164 |
Zhongguo ji suan qi xie zhi yan jiuWu, Wanxing. January 1900 (has links)
Thesis (M.A.)--Zhong guo wen hua xue yuan. / Reproduced from typescript. eContent provider-neutral record in process. Description based on print version record. Bibliography: p. 99-107.
|
165 |
Benefits and costs of staged run-time specialization /Grant, Brian Kris. January 2001 (has links)
Thesis (Ph. D.)--University of Washington, 2001. / Vita. Includes bibliographical references (leaves 209-217).
|
166 |
Operating system support for low-latency streaming /Goel, Ashvin. January 2003 (has links)
Thesis (Ph. D.)--OGI School of Science & Engineering at OHSU, 2003. / Includes bibliographical references (leaves 170-181).
|
167 |
On the efficiency of authentication protocols, digital signatures and their applications in E-Health a top-down approach /Bıçakçı, Kemal. January 2003 (has links) (PDF)
Thesis (Ph. D.)--Middle East Technical University, 2003. / Keywords :Cryptography, Network Security, Digital signature, Authentication, Server assisted signature, One-time password, Teleradiology.
|
168 |
A system for data flow analysis /Chan, Fun-ting. January 1982 (has links)
Thesis--M. Phil., University of Hong Kong, 1983.
|
169 |
The META4 programming language /Kim, Jason W., January 2002 (has links)
Thesis (Ph. D.)--Lehigh University, 2003. / Includes vita. Includes bibliographical references (leaves 295-300).
|
170 |
New results on estimating sortednessPan, Jiangwei., 潘江伟. January 2011 (has links)
Estimating the sortedness of a sequence has found applications in, e.g., sorting algorithms, database management and webpage ranking. As the data volume in many of these applications is massive, recent research has been focusing on estimating sortedness in the data stream model. In this thesis, we extend the study of this problem to a number of directions.
One common measurement of sortedness is the edit distance to monotonicity. Given a stream of items drawn from a totally ordered set, its edit distance to monotonicity is the minimum number of items to remove so that the remaining items are non-decreasing. The space complexity of estimating the edit distance to monotonicity of a data stream is becoming well-understood over the past few years. Motivated by applications on network quality monitoring, we extend the study to estimating the edit distance to monotonicity of a sliding window covering the w most recent items in the stream for any w _ 1. We give a deterministic algorithm which can return an estimate within a factor of (4 + _) using O( 1
_2 log2(_w)) space.
We further extend the study in two directions. First, we consider a stream where each item is associated with a value from a partially ordered set. We give a randomized (4+_)-approximate algorithm using O( 1_2 log _2w log w) space. Second, we consider an out-of-order stream where each item is associated with a creation time and a numerical value, and items may be out of order with respect to their creation times. The goal is to estimate the edit distance to monotonicity with respect to the numerical value of items arranged in the order of creation times. We show that any randomized constant-approximate algorithm requires linear space.
Finally, we revisit the classical problem of estimating the length of the longest increasing subsequence (LIS) of a data stream. Previous work shows that any deterministic algorithm requires ?(pN) space through a communication problem Hidden-IS, where N is the number of items in the stream. But the randomized space complexity of LIS is open [2]. [23] has given an efficient randomized protocol for Hidden-IS, showing that Hidden-IS may be significantly easier than LIS. We give an even simpler and more efficient randomized protocol for the Hidden-IS problem, indicating that it is unlikely that this communication problem can lead to a polynomial randomized space lower bound for the LIS problem. On the positive side, we propose a new communication problem which we conjecture to be hard enough to lead to a super polylogarithmic randomized space lower bound for the LIS problem. / published_or_final_version / Computer Science / Master / Master of Philosophy
|
Page generated in 0.0185 seconds