people sebis staff
- Create view based on this search
- Relevance
- Last modification
- Name
231015 Milanova Bachelor Thesis.pdf
File in /Sebis Public Website/_/Bachelor's Thesis Natalia Milanova
is injected [42]. A way to find an optimization of the differentially private algorithm is to of differentially private algorithms, in this paper the research will focus on the appropriate auf die Entwicklung von Algorithmen zur Wahrung der Privatsphäre konzentrieren, liegt der circles. As a main method to protect privacy, organizations and governments used to use de . Advances in computer power and algorithms, but also the bulk of data we, as users, generate, facilitated
Bachelor's Thesis Sebastian Moser.pdf
File in /Sebis Public Website/_/Bachelor's Thesis Sebastian Moser
. Researchers and practitioners need to be aware of a possible performance de- cline when using standard direct application of a sentence segmentation algorithm. So far, there is no tool for German legal . Problem De�nition Sentence Boundary Detection (SBD) or sentence segmentation is the de- tection and chair and later on with a newly created Graphical 1See https://www.gesetze-bayern.de/ 15 3. Legal the algorithm, the text is checked against the positive rules, i.e. their corresponding window is
Vigan Lladrovci Master Thesis.pdf
File in /Sebis Public Website/_/Master's Thesis Vigan Lladrovci
Algorithmic Implementation Details . . . . . . . . . . . . . . . . . . . . . . . . . 41 7 Analysis the prices of assets are determined algorithmically, the position at which the transaction is advantage of the algorithmic approach of pricing the traded assets. For instance, sandwich attacks occur , it is non-deterministic. In PoS, block proposers are chosen from a random algorithm RANDAO. The Automated Market Maker is the essential algorithm that facilitates the trades in a decentralized exchange
200311_Gerbershagen_MA_Thesis.pdf
File in /Sebis Public Website/_/Master's Thesis Dominik Gerbershagen
mechanisms such as the consensus algorithm, a search puzzle and public-key infrastructure. The following issued, miners include it in the next block and perform the above mentioned proof-of-work algorithm in one or more machine-readable data formats. The process of serialization and/or de-serialization no-target pro- motion Regulation • Focus on assured de- livery of services • Prices settle down • main goal was to understand processes from a measurement point, stage five aims at optimization
clmomu01.doc
File in /Sebis Public Website/_/1999 and earlier/FIDEbook95/clmult01 last modified Sep 11, 2008 by Dr. Alexander Ernst.
\"otschel, M., Lov\'asz, L., Schrijver, A. (1988): Geometric algorithms and combinatorial optimization }on the host {\tt trick.ntp.springer.de }\\ (IP\#: 192.129.24.12) Do not forget that, in general \"otschel, M., Lov\'asz, L., Schrijver, A. (1988): Geometric algorithms and combinatorial optimization. (Algorithms and Combinatorics, vol.\, 2) Springer, Berlin Heidelberg New York from LAGEOS (GEM-L2). NASA, Tech. Memo TM 84986 \bibitem{}{rh}{Rham (1931)}Rham G. de (1931): Sur l
paper.pdf
File in /Sebis Public Website/_/2000/ErSc00 last modified Sep 11, 2008 by Dr. Alexander Ernst.
. Der ” Copying Collection“-Algorithmus Die bisher beschriebenen Algorithmen arbeiten als ” es sich also, wie bei allen bisher geschilderten Algorithmen um einen ” Stop-the-World“-Algorithmus einen linearen Algorithmus erzielt, der klassischen, “teuren” Algorithmen vergleichbaren Code erzeugt Zwischenrepräsentation (ii) . . . . . . . . 13 2.4 Ablauf des ” Mark-Sweep“-Algorithmus . . . . . . . . . . . . . 25 2 .5 Kompaktierungsphase (i) und Zeiger-Anpassungsphase (ii) des ” Mark-Compact“-Algorithmus
ErSc00.pdf
File in /Sebis Public Website/_/2000/ErSc00 last modified Sep 11, 2008 by Dr. Alexander Ernst.
empfehlen. Der ” Copying Collection“-Algorithmus Die bisher beschriebenen Algorithmen arbeiten als ” einen linearen Algorithmus erzielt, der klassischen, “teuren” Algorithmen vergleichbaren Code erzeugt Zwischenrepräsentation (ii) . . . . . . . . 13 2.4 Ablauf des ” Mark-Sweep“-Algorithmus . . . . . . . . . . . . . 25 2.5 Kompaktierungsphase (i) und Zeiger-Anpassungsphase (ii) des ” Mark-Compact“-Algorithmus . Als Beispiele lassen sich etablierte Compiler-Techniken und Algorithmen zur Garbage Collection
190315_Branislav_Vidojevic_Masters_Thesis.pdf
File in /Sebis Public Website/_/Master Thesis von Branislav Vidojevic
metadata, in addition to data management and integration. Also, we de- scribe several platforms of Tim Berners-Lee, the inventor of the World Wide Web, introduced a 5-star de- ployment scheme for Open used for Search Engine Optimization (SEO). If data in web pages are annotated adequately with in . Fundamentals • Associated metadata - Maintained in files tightly coupled to the resources they de defined in Wolfram Alpha. Wol- fram Alpha can compute answers using algorithms, knowledge bases and AI
BT_WolfgangHobmaier.pdf
File in /Sebis Public Website/_/Bachelor's Thesis Wolfgang Hobmaier
, tooling de- veloped for the OpenAPI ecosystem can enable additional quality assurance, including de sc ri pt io n ge t pu t po st op er at io nI d ex te rn al D oc s ur l pa ra m et er s Pa ra m et er O bj ec t ta gs re sp on se s R es po ns e O bj ec t de sc ri pt io n re qu es tB od y de sc ri pt io n co nt en t ap pl ic at io n/ js on sc he m a y de le te op ti on s he ad pa tc h in fo In fo rm at io n O bj ec t se rv er s Se
MT Uludag.pdf
File in /Sebis Public Website/_/Master's Thesis Ömer Uludağ
classification by [90] reveals that not all Big Data technologies are directly de- signed for analyzing in Section 1.1, this thesis aims to de- scribe the ELK stack and to assess its applicability for optimization. Prescriptive analytics helps to decide the implementation of next actions. The business value similarity algorithms. • Language analysis: Solr permits configuring various types of language called implicit mapping. Types such as numbers and dates are automatically de- tected and treated
1 2 3 4 5 7 8 9Next