61 resultados para ORDERINGS


Relevância:

10.00% 10.00%

Publicador:

Resumo:

We introduce a calculus of stratified resolution, in which special attention is paid to clauses that "define" relations. If such clauses are discovered in the initial set of clauses, they are treated using the rule of definition unfolding, i.e. the rule that replaces defined relations by their definitions. Stratified resolution comes with a powerful notion of redundancy: a clause to which definition unfolding has been applied can be removed from the search space. To prove the completeness of stratified resolution with redundancies, we use a novel combination of Bachmair and Ganzingerâ??s model construction technique and a hierarchical construction of orderings and least fixpoints.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We extend the standard price discovery analysis to estimate the information share of dual-class shares across domestic and foreign markets. By examining both common and preferred shares, we aim to extract information not only about the fundamental value of the rm, but also about the dual-class premium. In particular, our interest lies on the price discovery mechanism regulating the prices of common and preferred shares in the BM&FBovespa as well as the prices of their ADR counterparts in the NYSE and in the Arca platform. However, in the presence of contemporaneous correlation between the innovations, the standard information share measure depends heavily on the ordering we attribute to prices in the system. To remain agnostic about which are the leading share class and market, one could for instance compute some weighted average information share across all possible orderings. This is extremely inconvenient given that we are dealing with 2 share prices in Brazil, 4 share prices in the US, plus the exchange rate (and hence over 5,000 permutations!). We thus develop a novel methodology to carry out price discovery analyses that does not impose any ex-ante assumption about which share class or trading platform conveys more information about shocks in the fundamental price. As such, our procedure yields a single measure of information share, which is invariant to the ordering of the variables in the system. Simulations of a simple market microstructure model show that our information share estimator works pretty well in practice. We then employ transactions data to study price discovery in two dual-class Brazilian stocks and their ADRs. We uncover two interesting ndings. First, the foreign market is at least as informative as the home market. Second, shocks in the dual-class premium entail a permanent e ect in normal times, but transitory in periods of nancial distress. We argue that the latter is consistent with the expropriation of preferred shareholders as a class.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This communication reports that FeWO 4 nanocrystals were successfully synthesized by the microwave-hydrothermal method at 443 K for 1 h. The structure and shape of these nanocrystals were characterized by X-ray diffraction, Rietveld refinement, and transmission electron microscopy. The experimental results and first principles calculations were combined to explain the electronic structure and magnetic properties. Experimental data were obtained by magnetization measurements for different applied magnetic fields. Theoretical calculations revealed that magnetic properties of FeWO 4 nanocrystals can be assigned to two magnetic orderings with parallel or antiparallel spins in adjacent chains. These factors are crucial to understanding of competition between ferro- and antiferromagnetic behavior. © 2012 Elsevier Inc.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Based on Hengeveld and Mackenzie (2008)’s Functional Discourse Grammar (FDG), this article aims to analyze the natural and marked orderings of argument constituents in declarative sentences of Brazilian Portuguese taken in IBORUNA corpora. In this way, we conclude that the two natural orderings, proposed by Pezatti (1992), are determined by semantic factor, especially by semantic functions, while the marked ordering ir determined by pragmatic factor, especially by the attribution of pragmatic functions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This dissertation mimics the Turkish college admission procedure. It started with the purpose to reduce the inefficiencies in Turkish market. For this purpose, we propose a mechanism under a new market structure; as we prefer to call, semi-centralization. In chapter 1, we give a brief summary of Matching Theory. We present the first examples in Matching history with the most general papers and mechanisms. In chapter 2, we propose our mechanism. In real life application, that is in Turkish university placements, the mechanism reduces the inefficiencies of the current system. The success of the mechanism depends on the preference profile. It is easy to show that under complete information the mechanism implements the full set of stable matchings for a given profile. In chapter 3, we refine our basic mechanism. The modification on the mechanism has a crucial effect on the results. The new mechanism is, as we call, a middle mechanism. In one of the subdomain, this mechanism coincides with the original basic mechanism. But, in the other partition, it gives the same results with Gale and Shapley's algorithm. In chapter 4, we apply our basic mechanism to well known Roommate Problem. Since the roommate problem is in one-sided game patern, firstly we propose an auxiliary function to convert the game semi centralized two-sided game, because our basic mechanism is designed for this framework. We show that this process is succesful in finding a stable matching in the existence of stability. We also show that our mechanism easily and simply tells us if a profile lacks of stability by using purified orderings. Finally, we show a method to find all the stable matching in the existence of multi stability. The method is simply to run the mechanism for all of the top agents in the social preference.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As a reaction against derivational frameworks, Construction Grammar accords no place to regular alternations between two surface patterns. This paper argues for a more tolerant position towards alternations. With respect to the well-known placement variability of verbal particles (pick up the book / pick the book up), the author grants that there is little reason for analysing one ordering as underlying the other but goes on to show that it is equally problematic to claim that the two orderings code two different meanings (or serve two different functions) and therefore cannot be linked in the grammar as variants of a single category. The alternative offered here is to consider the two orderings as two “allostructions” of a more general transitive verb-particle construction underspecified for word order.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

It has been observed in various practical applications that data do not conform to the normal distribution, which is symmetric with no skewness. The skew normal distribution proposed by Azzalini(1985) is appropriate for the analysis of data which is unimodal but exhibits some skewness. The skew normal distribution includes the normal distribution as a special case where the skewness parameter is zero. In this thesis, we study the structural properties of the skew normal distribution, with an emphasis on the reliability properties of the model. More specifically, we obtain the failure rate, the mean residual life function, and the reliability function of a skew normal random variable. We also compare it with the normal distribution with respect to certain stochastic orderings. Appropriate machinery is developed to obtain the reliability of a component when the strength and stress follow the skew normal distribution. Finally, IQ score data from Roberts (1988) is analyzed to illustrate the procedure.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

En noviembre de 2007 fue sancionada la Ley Nacional No. 26.331 ("Ley de bosques"), que insta a cada provincia a realizar un Ordenamiento Territorial de Bosques Nativos. Salta fue una de las primeras jurisdicciones en llevarlo adelante, a través de la Ley No. 7.543 sancionada en diciembre de 2008. En este artículo, a partir del análisis legal, documental y hemerográfico, y de entrevistas realizadas en el marco de nuestra investigación doctoral, ofrecemos una cronología y un análisis del caso salteño, con el objetivo de indagar en los proyectos territoriales en tensión que se hicieron presentes en torno a la definición de la política ambiental de cuidado de los bosques nativos, y sugerimos una serie de perspectivas a futuro en vistas de los posibles re-(des)ordenamientos territoriales

Relevância:

10.00% 10.00%

Publicador:

Resumo:

En noviembre de 2007 fue sancionada la Ley Nacional No. 26.331 ("Ley de bosques"), que insta a cada provincia a realizar un Ordenamiento Territorial de Bosques Nativos. Salta fue una de las primeras jurisdicciones en llevarlo adelante, a través de la Ley No. 7.543 sancionada en diciembre de 2008. En este artículo, a partir del análisis legal, documental y hemerográfico, y de entrevistas realizadas en el marco de nuestra investigación doctoral, ofrecemos una cronología y un análisis del caso salteño, con el objetivo de indagar en los proyectos territoriales en tensión que se hicieron presentes en torno a la definición de la política ambiental de cuidado de los bosques nativos, y sugerimos una serie de perspectivas a futuro en vistas de los posibles re-(des)ordenamientos territoriales

Relevância:

10.00% 10.00%

Publicador:

Resumo:

En noviembre de 2007 fue sancionada la Ley Nacional No. 26.331 ("Ley de bosques"), que insta a cada provincia a realizar un Ordenamiento Territorial de Bosques Nativos. Salta fue una de las primeras jurisdicciones en llevarlo adelante, a través de la Ley No. 7.543 sancionada en diciembre de 2008. En este artículo, a partir del análisis legal, documental y hemerográfico, y de entrevistas realizadas en el marco de nuestra investigación doctoral, ofrecemos una cronología y un análisis del caso salteño, con el objetivo de indagar en los proyectos territoriales en tensión que se hicieron presentes en torno a la definición de la política ambiental de cuidado de los bosques nativos, y sugerimos una serie de perspectivas a futuro en vistas de los posibles re-(des)ordenamientos territoriales

Relevância:

10.00% 10.00%

Publicador:

Resumo:

En noviembre de 2007 fue sancionada la Ley Nacional No. 26.331 ("Ley de bosques"), que insta a cada provincia a realizar un Ordenamiento Territorial de Bosques Nativos. Salta fue una de las primeras jurisdicciones en llevarlo adelante, a través de la Ley No. 7.543 sancionada en diciembre de 2008. En este artículo, a partir del análisis legal, documental y hemerográfico, y de entrevistas realizadas en el marco de nuestra investigación doctoral, ofrecemos una cronología y un análisis del caso salteño, con el objetivo de indagar en los proyectos territoriales en tensión que se hicieron presentes en torno a la definición de la política ambiental de cuidado de los bosques nativos, y sugerimos una serie de perspectivas a futuro en vistas de los posibles re-(des)ordenamientos territoriales

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 1933 public letter to Wilhelm Furtwängler, Joseph Goebbels synthesized the official understanding of the link between politics, art and society in the early steps of the Third Reich. By assuming the ethos of art, politics acquired a plastic agency to mold its objects —population and the state— as a unified entity in the form of a ‘national-popular community’ (Volksgemeinschaft); in turn, by infusing art with a political valence, it became part of a wider governmental apparatus that reshaped aesthetic discourses and practices. Similar remarks could be made about the ordering of cities and territories in this period. Dictatorial imaginations mobilized urbanism —including urban theory, urban design and planning— as a fundamental tool for social organization. Under their aegis the production of space became a moment in a wider production of society. Many authors suggest that this political-spatial nexus is intrinsic to modernity itself, beyond dictatorial regimes. In this light, I propose to use dictatorial urbanisms as an analytical opportunity to delve into some concealed features of modern urban design and planning. This chapter explores some of these aspects from a theoretical standpoint, focusing on the development of dictatorial planning mentalities and spatial rationalities and drawing links to other historical episodes in order to inscribe the former in a broader genealogy of urbanism. Needless to say, I don’t suggest that we use dictatorships as mere templates to understand modern productions of space. Instead, these cases provide a crude version of some fundamental drives in the operationalization of urbanism as an instrument of social regulation, showing how far the modern imagination of sociospatial orderings can go. Dictatorial urbanisms constituted a set of experiences where many dreams and aspirations of modern planning went to die. But not, as the conventional account would have it, because the former were the antithesis of the latter, but rather because they worked as the excess of a particular orientation of modern spatial governmentalities — namely, their focus on calculation, social engineering and disciplinary spatialities, and their attempt to subsume a wide range of everyday practices under institutional structuration by means of spatial mediations. In my opinion the interest of dictatorial urbanisms lies in their role as key regulatory episodes in a longer history of our urban present. They stand as a threshold between the advent of planning in the late 19th and early 20th century, and its final consolidation as a crucial state instrument after World War II. We need, therefore, to pay attention to these experiences vis-à-vis the alleged ‘normal’ development of the field in contemporary democratic countries in order to develop a full comprehension thereof.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Real-time control programs are often used in contexts where (conceptually) they run forever. Repetitions within such programs (or their specifications) may either (i) be guaranteed to terminate, (ii) be guaranteed to never terminate (loop forever), or (iii) may possibly terminate. In dealing with real-time programs and their specifications, we need to be able to represent these possibilities, and define suitable refinement orderings. A refinement ordering based on Dijkstra's weakest precondition only copes with the first alternative. Weakest liberal preconditions allow one to constrain behaviour provided the program terminates, which copes with the third alternative to some extent. However, neither of these handles the case when a program does not terminate. To handle this case a refinement ordering based on relational semantics can be used. In this paper we explore these issues and the definition of loops for real-time programs as well as corresponding refinement laws.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Production to order and production in advance has been compared in many frameworks. In this paper we investigate a mixed production in advance version of the capacity-constrained Bertrand-Edgeworth duopoly game and determine the solution of the respective timing game. We show that a pure-strategy (subgame-perfect) Nash-equilibrium point exists for all possible orderings of moves. It is pointed out that unlike the production-to-order case, the equilibrium of the timing game lies at simultaneous moves. An analysis of the public firm's impact on social welfare is also carried out. All the results are compared to those of the production-to order version of the respective game.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Authentication plays an important role in how we interact with computers, mobile devices, the web, etc. The idea of authentication is to uniquely identify a user before granting access to system privileges. For example, in recent years more corporate information and applications have been accessible via the Internet and Intranet. Many employees are working from remote locations and need access to secure corporate files. During this time, it is possible for malicious or unauthorized users to gain access to the system. For this reason, it is logical to have some mechanism in place to detect whether the logged-in user is the same user in control of the user's session. Therefore, highly secure authentication methods must be used. We posit that each of us is unique in our use of computer systems. It is this uniqueness that is leveraged to "continuously authenticate users" while they use web software. To monitor user behavior, n-gram models are used to capture user interactions with web-based software. This statistical language model essentially captures sequences and sub-sequences of user actions, their orderings, and temporal relationships that make them unique by providing a model of how each user typically behaves. Users are then continuously monitored during software operations. Large deviations from "normal behavior" can possibly indicate malicious or unintended behavior. This approach is implemented in a system called Intruder Detector (ID) that models user actions as embodied in web logs generated in response to a user's actions. User identification through web logs is cost-effective and non-intrusive. We perform experiments on a large fielded system with web logs of approximately 4000 users. For these experiments, we use two classification techniques; binary and multi-class classification. We evaluate model-specific differences of user behavior based on coarse-grain (i.e., role) and fine-grain (i.e., individual) analysis. A specific set of metrics are used to provide valuable insight into how each model performs. Intruder Detector achieves accurate results when identifying legitimate users and user types. This tool is also able to detect outliers in role-based user behavior with optimal performance. In addition to web applications, this continuous monitoring technique can be used with other user-based systems such as mobile devices and the analysis of network traffic.