Showing 841 - 860 results of 2,654 for search 'PVSM~', query time: 1.15s Refine Results
  1. 841
  2. 842
  3. 843
  4. 844
  5. 845
  6. 846
  7. 847
  8. 848
  9. 849
  10. 850
  11. 851

    The EBITDA disclosed by companies listed on Brazil stock exchange (B3): locations, types, and occurrence count by Shaiane Pisa Kistner, Orion Augusto Platt Neto

    Published 2025-01-01
    “…Of these, 94.3% (317 companies) disclosed the Original EBITDA with conciliation, as regulated by the Brazilian Securities and Exchange Commission (CVM). However, 12 companies (3.1% of the sample) only disclosed Adjusted EBITDA (without publishing the Original EBITDA in parallel), not in accordance with the regulation. …”
    Get full text
    Article
  12. 852
  13. 853
  14. 854
  15. 855
  16. 856
  17. 857

    Dimension reduction for maximum matchings and the Fastest Mixing Markov Chain by Jain, Vishesh, Pham, Huy, Vuong, Thuy-Duong

    Published 2023-07-01
    “…Let $G = (V,E)$ be an undirected graph with maximum degree $\Delta $ and vertex conductance $\Psi ^*(G)$. We show that there exists a symmetric, stochastic matrix $P$, with off-diagonal entries supported on $E$, whose spectral gap $\gamma ^*(P)$ satisfies \[ \Psi ^*(G)^{2}/\log \Delta \lesssim \gamma ^*(P) \lesssim \Psi ^*(G). \] Our bound is optimal under the Small Set Expansion Hypothesis, and answers a question of Olesker-Taylor and Zanetti, who obtained such a result with $\log \Delta $ replaced by $\log |V|$.In order to obtain our result, we show how to embed a negative-type semi-metric $d$ defined on $V$ into a negative-type semi-metric $d^{\prime }$ supported in $\mathbb{R}^{O(\log \Delta )}$, such that the (fractional) matching number of the weighted graph $(V,E,d)$ is approximately equal to that of $(V,E,d^{\prime })$.…”
    Get full text
    Article
  18. 858
  19. 859

    APPLYING SOME MATCHING ALGORITHMS FOR SEQUENCE IGNATURE TO ANALYZE AND DETECT ENTRIES INTO SYSTEM NETWORKS by Pham Nguyen Huy Phuong, Dang Le Nam

    Published 2013-06-01
    “…In this paper, the pattern matching algorithms is deployed by emulating forms of network attacks on intrusion detection system together with firewall IOS/I PS. Additionally, tools for network monitoring such as open source munintools,are also used to analyze and evaluate the performance of network-attack. …”
    Get full text
    Article
  20. 860