Search results for "COD"

showing 10 items of 2985 documents

Il rinvenimento del Colosso di Barletta

2012

La statua imperiale di Barletta raffigura Teodosio II nel momento della pubblicazione del Codice Teodosiano (438/9 d.C.) ed è stata eretta da Valentiniano III, dopo il matrimonio della figlia del reggente orientale. Ritrovata a Ravenna nel febbraio 1231 da Federico II, è stata condotta nella dogana della Apulia.

Teodosio IICodice Teodosiano; Teodosio II; Diritto romanoCodice TeodosianoDiritto romano
researchProduct

Event generation and statistical sampling for physics with deep generative models and a density information buffer

2021

Simulating nature and in particular processes in particle physics require expensive computations and sometimes would take much longer than scientists can afford. Here, we explore ways to a solution for this problem by investigating recent advances in generative modeling and present a study for the generation of events from a physical process with deep generative models. The simulation of physical processes requires not only the production of physical events, but to also ensure that these events occur with the correct frequencies. We investigate the feasibility of learning the event generation and the frequency of occurrence with several generative machine learning models to produce events l…

Test data generationScienceMonte Carlo methodGeneral Physics and AstronomyFOS: Physical sciences01 natural sciencesCharacterization and analytical techniquesGeneral Biochemistry Genetics and Molecular BiologyArticleHigh Energy Physics - ExperimentHigh Energy Physics - Experiment (hep-ex)High Energy Physics - Phenomenology (hep-ph)0103 physical sciencesInformation theory and computationHigh Energy Physics010306 general physicsMultidisciplinary010308 nuclear & particles physicsEvent (computing)QStatisticsData ScienceSampling (statistics)General ChemistryDensity estimationAutoencoderHigh Energy Physics - PhenomenologyPhysics - Data Analysis Statistics and ProbabilityExperimental High Energy PhysicsAnomaly detectionAlgorithmImportance samplingData Analysis Statistics and Probability (physics.data-an)
researchProduct

Tres nuevos manuscritos de la Crónica do Imperador Beliandro: Descripción codicológica y análisis

2013

Damos noticia del hallazgo de tres nuevos manuscritos de la novela de caballerías Crónica do Imperador Beliandro, escrita en lengua portuguesa a inicios del siglo XVII y atribuida por la tradición bibliográfica a la pluma de la Condesa da Vidigueira, D. Leonor Coutinho de Távora. Los nuevos manuscritos, conservados en la Biblioteca del Museu Nacional de Arqueologia de Belém, en Lisboa, añaden valiosa información a los trabajos previos de Massaud Moisés, Benjamin Nicolaas Teensma, José Manuel Lucía Megías, Aurelio Vargas Díaz-Toledo y Nanci Romero.

Textos inéditosNovela de Caballerías Literatura Portuguesa; Codicología; Textos inéditosNovela de Caballerías Literatura PortuguesaCodicología
researchProduct

Cost-driven framework for progressive compression of textured meshes

2019

International audience; Recent advances in digitization of geometry and radiometry generate in routine massive amounts of surface meshes with texture or color attributes. This large amount of data can be compressed using a progressive approach which provides at decoding low complexity levels of details (LoDs) that are continuously refined until retrieving the original model. The goal of such a progressive mesh compression algorithm is to improve the overall quality of the transmission for the user, by optimizing the rate-distortion trade-off. In this paper, we introduce a novel meaningful measure for the cost of a progressive transmission of a textured mesh by observing that the rate-distor…

Texture atlasDecimationadaptive quantizationmultiplexingComputer scienceGeometry compressionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONInversesurface meshes02 engineering and technologyData_CODINGANDINFORMATIONTHEORYtexturesprogressive vs single-rate[INFO.INFO-CG]Computer Science [cs]/Computational Geometry [cs.CG]MultiplexingCCS CONCEPTS • Computing methodologies → Computer graphics020204 information systems0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingPolygon meshQuantization (image processing)AlgorithmDecoding methodsData compressionComputingMethodologies_COMPUTERGRAPHICS
researchProduct

I PROVVEDIMENTI EX ART. 709 TER C.P.C. E LE NOVITÀ DELLA LEGGE 26 NOVEMBRE 2021, N. 206

2022

Il capitolo analizza il rimedio dell'art. 709 ter c.p.c., i suoi presupposti sostanziali e le regole processuali di sua amministrazione, specie alla luce delle recenti novità introdotte dalla legge delega sulla riforma del processo civile

The chapter analyzes the remedy of the art. 709 ter of the Italian Criminal Code its substantive assumptions and the procedural rules for its administration especially in light of the recent innovations introduced by the Law 26 NOVEMBRE 2021 N. 206Settore IUS/01 - Diritto Privato
researchProduct

Tutela e sicurezza del lavoro tra centro e periferia: la sicurezza sui luoghi di lavoro

2013

Il saggio prende in esame la complessa questione del riparto di competenze tra Stato e Regioni alla luce del Titolo V della Costituzione in materia di salute e sicurezza sui luoghi di lavoro. Il riparto di competenze tra centro e periferia è stato oggetto di una limitata analisi da parte della dottrina e della giurisprudenza, che si sono concentrate in particolare sulla disciplina del mercato del lavoro. L’Autore descrive un sistema multilivello, caratterizzato dalla compresenza di fonti nazionali e regionali, della contrattazione collettiva, nonché di codici di condotta. Sulla scorta di una ricostruzione del quadro normativo e dei percorsi della giurisprudenza, il saggio propone una lettur…

The essay examines the complex issue of the division of powers between the State and the Regions according to Title V of the Constitution concerning health and safety at workplace. This division between the center and the periphery has been subject to a limited review by doctrine and jurisprudence expecially focusing on the regulation of labour market. The Author describes a multilevel system characterized by the presence of national and regional sources collective bargaining and codes of conduct. On the basis of a reconstruction of the regulatory framework and the judicial statements the paper proposes a dynamic reading of the relationship between center and periphery in which the axis of the system remains however anchored to the national jurisdiction along with important regulatory issues left to the regional legislation.Settore IUS/07 - Diritto Del Lavoro
researchProduct

The Italian Method of la drammatica: its Legacy and Reception

2014

The volume The Italian Method of la drammatica: its Legacy and Reception includes the long and complex investigation to identify the Italian acting-code system of the drammatica used by nineteenth-century Italian actors such as Adelaide Ristori Giovanni Grasso Tommaso Salvini Eleonora Duse. In particular their acting inspired Stanislavky who reformed twentieth-century stage. The declamatory code of the drammatica was composed by symbols for notation of voice and gesture which Italian actors marked in their prompt-books. The discovery of the drammatica’s code sheds new light on nineteenth-century acting. Having deciphered the phonetic symbols of the code Anna Sica has given birth an investigation with a group of outstanding scholars in an attempt to explore the drammatica’s legacy and its reception in Europe as well as in Asia. At this stage new evidence has emerged proving that for instance the symbol used by the drammatica actors to sign the colorito vocale was known to English actors in the second half of the nineteenth century. By noting how Adelaide Ristori passed on her art to Irving’s actress Genevieve Ward and how Stanislavsky almost aflame moulded his system from Duse’s acting an unexplored variety in the reception of the drammatica’s legacy is revealed.Settore L-ART/05 - Discipline Dello Spettacolo
researchProduct

A loop-free two-close Gray-code algorithm for listing k-ary Dyck words

2006

AbstractP. Chase and F. Ruskey each published a Gray code for length n binary strings with m occurrences of 1, coding m-combinations of n objects, which is two-close—that is, in passing from one binary string to its successor a single 1 exchanges positions with a 0 which is either adjacent to the 1 or separated from it by a single 0. If we impose the restriction that any suffix of a string contains at least k−1 times as many 0's as 1's, we obtain k-suffixes: suffixes of k-ary Dyck words. Combinations are retrieved as special case by setting k=1 and k-ary Dyck words are retrieved as a special case by imposing the additional condition that the entire string has exactly k−1 times as many 0's a…

Theoretical Computer ScienceCombinatoricsGray codeComputational Theory and MathematicsDiscrete Mathematics and CombinatoricsTwo-closeBinary stringsSpecial caseSuffixk-ary Dyck wordsGray codeLoop-free algorithmAlgorithmMathematicsCoding (social sciences)Journal of Discrete Algorithms
researchProduct

Parallel Calculation of CCSDT and Mk-MRCCSDT Energies.

2010

A scheme for the parallel calculation of energies at the coupled-cluster singles, doubles, and triples (CCSDT) level of theory, several approximate iterative CCSDT schemes (CCSDT-1a, CCSDT-1b, CCSDT-2, CCSDT-3, and CC3), and for the state-specific multireference coupled-cluster ansatz suggested by Mukherjee with a full treatment of triple excitations (Mk-MRCCSDT) is presented. The proposed scheme is based on the adaptation of a highly efficient serial coupled-cluster code leading to a communication-minimized implementation by parallelizing the time-determining steps. The parallel algorithm is tailored for affordable cluster architectures connected by standard communication networks such as …

Theoretical computer scienceBasis (linear algebra)Computer scienceComputationGigabit EthernetCode (cryptography)Parallel algorithmBenchmark (computing)Basis functionPhysical and Theoretical ChemistryComputer Science ApplicationsComputational scienceAnsatzJournal of chemical theory and computation
researchProduct

"Master-Slave" Biological Network Alignment

2010

Performing global alignment between protein-protein interaction (PPI) networks of different organisms is important to infer knowledge about conservation across species. Known methods that perform this task operate symmetrically, that is to say, they do not assign a distinct role to the input PPI networks. However, in most cases, the input networks are indeed distinguishable on the basis of how well the corresponding organism is biologically well-characterized. For well-characterized organisms the associated PPI network supposedly encode in a sound manner all the information about their proteins and associated interactions, which is far from being the case for not well characterized ones. He…

Theoretical computer scienceBasis (linear algebra)business.industryComputer scienceFingerprint (computing)Process (computing)Master/slaveENCODETask (computing)Bioinformatics network analysisArtificial intelligencebusinessBiological networkOrganism
researchProduct