933 resultados para Approximation Classes
Resumo:
"Vegeu el resum a l'inici del document del fitxer adjunt"
Resumo:
"Vegeu el resum a l'inici del document del fitxer adjunt"
Resumo:
In a seminal paper [10], Weitz gave a deterministic fully polynomial approximation scheme for counting exponentially weighted independent sets (which is the same as approximating the partition function of the hard-core model from statistical physics) in graphs of degree at most d, up to the critical activity for the uniqueness of the Gibbs measure on the innite d-regular tree. ore recently Sly [8] (see also [1]) showed that this is optimal in the sense that if here is an FPRAS for the hard-core partition function on graphs of maximum egree d for activities larger than the critical activity on the innite d-regular ree then NP = RP. In this paper we extend Weitz's approach to derive a deterministic fully polynomial approximation scheme for the partition function of general two-state anti-ferromagnetic spin systems on graphs of maximum degree d, up to the corresponding critical point on the d-regular tree. The main ingredient of our result is a proof that for two-state anti-ferromagnetic spin systems on the d-regular tree, weak spatial mixing implies strong spatial mixing. his in turn uses a message-decay argument which extends a similar approach proposed recently for the hard-core model by Restrepo et al [7] to the case of general two-state anti-ferromagnetic spin systems.
Resumo:
Au Mali, les technologies de l'information et de la communication ont suscité un vif engouement. Portés par l'ancien Président Alpha Oumar Konaré, de nombreux projets gouvernementaux ont vu le jour. Parallèlement, les cybercafés se sont multipliés : moins de dix en 1997, ils étaient presque plus de 120 en 2006. Si les possibilités de se connecter à domicile et sur son lieu de travail se sont développées, les cybercafés restent des espaces idéaux pour découvrir les pratiques numériques. Une façon d'étudier les usages de l'Internet est de s'intéresser aux liens qui se nouent autour de l'ordinateur. La situation est complexe à Bamako, car les personnes qui accompagnent les clients des cybercafés sont nombreuses. L'analyse de cette nébuleuse relationnelle est l'occasion de procéder à un double détour. Géographique tout d'abord, dans la mesure où l'anthropologue est conduit à quitter le cybercafé pour se rendre dans l'espace social plus vaste appelé Cyber. Disciplinaire ensuite puisque son regard se déplace progressivement du média vers l'étude des règles qui régissent la parenté et les classes d'âge.
Credit risk contributions under the Vasicek one-factor model: a fast wavelet expansion approximation
Resumo:
To measure the contribution of individual transactions inside the total risk of a credit portfolio is a major issue in financial institutions. VaR Contributions (VaRC) and Expected Shortfall Contributions (ESC) have become two popular ways of quantifying the risks. However, the usual Monte Carlo (MC) approach is known to be a very time consuming method for computing these risk contributions. In this paper we consider the Wavelet Approximation (WA) method for Value at Risk (VaR) computation presented in [Mas10] in order to calculate the Expected Shortfall (ES) and the risk contributions under the Vasicek one-factor model framework. We decompose the VaR and the ES as a sum of sensitivities representing the marginal impact on the total portfolio risk. Moreover, we present technical improvements in the Wavelet Approximation (WA) that considerably reduce the computational effort in the approximation while, at the same time, the accuracy increases.
Resumo:
Es tracta d'un projecte evolutiu que permetrà crear una aplicació que serveixi de suport gràfic per a les classes de Ciclo Indoor i que a més a més permetrà al professor preparar-les en pocs minuts. També tindrà un apartat dedicat a gestionar als usuaris del sistema mitjançant una connexió a una base de dades que també ha sigut dissenyada i desenvolupada en aquest projecte.
Resumo:
We give Chebyshev-type quadrature formulas for certain new weight classes. These formulas are of highest possible degree when the number of nodes is a power of 2. We also describe the nodes in a constructive way, which is important for applications. One of our motivations to consider these type of problems is the Faraday cage phenomenon for discrete charges as discussed by J. Korevaar and his colleagues.
Resumo:
In partnership with the VEC WTID has delivered Nutrition Level 5 FETAC to a group of 24 learners, 4 being members of the Travelling community. This module was also delivered to 5 Childcare staff at WTIDs pre-school service. Staff of the Harmony Afterschool Service undertakes baking activities each week with the children. Group work has been facilitated with 16 men who were on a BTEI on salt, sugar, caffeine and fibre, as well as with a young girls group on food tasting of various fruits, cheeses and how to make healthy potato wedges and other healthy snacks. WTID as part of the local Traveller Interagency Group are writing a well-being manual to be used with community groups working with Travellers- Healthy Eating is a module of this manual. Plans are in place to run a First Instincts Men's Health programme which will run over an 8 week period with workshops, weigh ins and provision of a healthy breakfast on each morning. HSE West; FAS CE scheme; Involve: Senior Youth Worker; Department of Children and Youth Affairs: Childcare Service; Pobal Initiative Type Community Food Centres Nutrition Education and Training Programmes Location Galway Target Groups At risk youth Children ( 4-12 years) Children (0-4 years) Children (13-18 years) Families Lone parents Men Older people People with mental health difficulties Travellers Unemployed Women Funding HSE West; FAS CE scheme; Involve: Senior Youth Worker; Department of Children and Youth Affairs: Childcare Service; Pobal Partner Agencies Equal Ireland FÃÂS Galway County Council GCCCC GRD HSE Involve RAPID VEC Adult Education Service
Resumo:
És ben sabut que les úniques etapes del cicle de vida del programari que necessàriament s'han d'especificar són les de recollida de requisits i l'anàlisi o l'especificació del programari. La resta (disseny, implementació i prova) es pot generar d'una manera més o menys automàtica a partir de l'anàlisi. En aquest PFC hem volgut estudiar la viabilitat de la construcció automàtica de codi SQL a partir de diagrames de classes d'anàlisi UML. S'ha estès l'eina de modelatge UML Poseidon amb un connector, de manera que amb una interfície molt simple es pot obtenir molt ràpidament l'esquema bàsic d'una base de dades, incloent-hi les taules, les seves columnes, claus rimàries i foranes, i també els disparadors (i les claus úniques) necessaris per a garantir les restriccions de cardinalitat de les associacions.
Resumo:
En aquest projecte, amb la finalitat d'analitzar per mitjà d'un exemple (la base de dades d'una botiga que opera en línia) algunes de les possibilitats que dóna XML, s'ha construït un sistema que permet generar bases de dades relacionals (amb SQL) a partir de diagrames de classes definits en XML. D?aquesta manera es mostra la flexibilitat que aporta XML a la definició, el processament i la transformació dels documents.
Resumo:
The weak selection approximation of population genetics has made possible the analysis of social evolution under a considerable variety of biological scenarios. Despite its extensive usage, the accuracy of weak selection in predicting the emergence of altruism under limited dispersal when selection intensity increases remains unclear. Here, we derive the condition for the spread of an altruistic mutant in the infinite island model of dispersal under a Moran reproductive process and arbitrary strength of selection. The simplicity of the model allows us to compare weak and strong selection regimes analytically. Our results demonstrate that the weak selection approximation is robust to moderate increases in selection intensity and therefore provides a good approximation to understand the invasion of altruism in spatially structured population. In particular, we find that the weak selection approximation is excellent even if selection is very strong, when either migration is much stronger than selection or when patches are large. Importantly, we emphasize that the weak selection approximation provides the ideal condition for the invasion of altruism, and increasing selection intensity will impede the emergence of altruism. We discuss that this should also hold for more complicated life cycles and for culturally transmitted altruism. Using the weak selection approximation is therefore unlikely to miss out on any demographic scenario that lead to the evolution of altruism under limited dispersal.
Resumo:
L'àmbit d'aquest treball és la generació automàtica de les restriccions d'integritat (claus primàries, alternatives i comprovacions), tant per a les bases de dades relacionals com per a les orientades a objectes.
Resumo:
TCP flows from applications such as the web or ftp are well supported by a Guaranteed Minimum Throughput Service (GMTS), which provides a minimum network throughput to the flow and, if possible, an extra throughput. We propose a scheme for a GMTS using Admission Control (AC) that is able to provide different minimum throughput to different users and that is suitable for "standard" TCP flows. Moreover, we consider a multidomain scenario where the scheme is used in one of the domains, and we propose some mechanisms for the interconnection with neighbor domains. The whole scheme uses a small set of packet classes in a core-stateless network where each class has a different discarding priority in queues assigned to it. The AC method involves only edge nodes and uses a special probing packet flow (marked as the highest discarding priority class) that is sent continuously from ingress to egress through a path. The available throughput in the path is obtained at the egress using measurements of flow aggregates, and then it is sent back to the ingress. At the ingress each flow is detected using an implicit way and then it is admission controlled. If it is accepted, it receives the GMTS and its packets are marked as the lowest discarding priority classes; otherwise, it receives a best-effort service. The scheme is evaluated through simulation in a simple "bottleneck" topology using different traffic loads consisting of "standard" TCP flows that carry files of varying sizes
Resumo:
Estudi del sindicalisme a Espanya des dels seus orígens i fins el 1870. L’autor planteja dues qüestions: la ideologia elaborada pel sindicalisme entre 1840 i 1856, i en segon lloc alguns aspectes de les relacions entre sindicalisme i política, i l’elaboració d’un llenguatge de classes