• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 27,048
Next 10 →

The Conventional Approach

by Chi Y Lee
"... Parking officials require a procedure to regularly monitor the performance of city center parking facilities, apportion long-term versus shortterm parking, and assess the effectiveness of parking regulation changes. ..."
Abstract - Add to MetaCart
Parking officials require a procedure to regularly monitor the performance of city center parking facilities, apportion long-term versus shortterm parking, and assess the effectiveness of parking regulation changes.

Three approaches to qualitative content analysis.

by Hsiu-Fang Hsieh , Sarah E Shannon , 2005
"... Content analysis is a widely used qualitative Researchers regard content analysis as a flexible method for analyzing text data The differentiation of content analysis is usually limited to classifying it as primarily a qualitative versus quantitative research method. A more thorough analysis of th ..."
Abstract - Cited by 729 (0 self) - Add to MetaCart
of approaches categorized as qualitative content analysis. We have identified three distinct approaches: conventional, directed, and summative. All three approaches are used to interpret text data from a predominately naturalistic paradigm. We begin with a brief review of the history and definitions of content

Scatter/Gather: A Cluster-based Approach to Browsing Large Document Collections

by Douglass R. Cutting, David R. Karger, Jan O. Pedersen, John W. Tukey , 1992
"... Document clustering has not been well received as an information retrieval tool. Objections to its use fall into two main categories: first, that clustering is too slow for large corpora (with running time often quadratic in the number of documents); and second, that clustering does not appreciably ..."
Abstract - Cited by 777 (12 self) - Add to MetaCart
improve retrieval. We argue that these problems arise only when clustering is used in an attempt to improve conventional search techniques. However, looking at clustering as an information access tool in its own right obviates these objections, and provides a powerful new access paradigm. We present a

Adaptive Protocols for Information Dissemination in Wireless Sensor Networks

by Wendi Rabiner Heinzelman, Joanna Kulik, Hari Balakrishnan , 1999
"... In this paper, we present a family of adaptive protocols, called SPIN (Sensor Protocols for Information via Negotiation) , that eciently disseminates information among sensors in an energy-constrained wireless sensor network. Nodes running a SPIN communication protocol name their data using high-lev ..."
Abstract - Cited by 671 (10 self) - Add to MetaCart
data for a given amount of energy than conventional approaches. We also nd that, in terms...

On the Criteria To Be Used in Decomposing Systems into Modules

by D. L. Parnas - Communications of the ACM , 1972
"... This paper discusses modularization as a mechanism for improving the flexibility and comprehensibility of a system while allowing the shortening of its development time. The effectiveness of a “modularization ” is dependent upon the criteria used in dividing the system into modules. A system design ..."
Abstract - Cited by 1585 (16 self) - Add to MetaCart
, if implemented with the conventional assumption that a module consists of one or more subroutines, will be less efficient in most cases. An alternative approach to implementation which does not have this effect is sketched.

Statecharts: A Visual Formalism For Complex Systems

by David Harel , 1987
"... We present a broad extension of the conventional formalism of state machines and state diagrams, that is relevant to the specification and design of complex discrete-event systems, such as multi-computer real-time systems, communication protocols and digital control units. Our diagrams, which we cal ..."
Abstract - Cited by 2704 (56 self) - Add to MetaCart
manageable and comprehensible. In fact, we intend to demonstrate here that statecharts counter many of the objections raised against conventional state diagrams, and thus appear to render specification by diagrams an attractive and plausible approach. Statecharts can be used either as a stand

The nas parallel benchmarks

by D. H. Bailey, E. Barszcz, J. T. Barton, D. S. Browning, R. L. Carter, R. A. Fatoohi, P. O. Frederickson, T. A. Lasinski, H. D. Simon, V. Venkatakrishnan, S. K. Weeratunga - The International Journal of Supercomputer Applications , 1991
"... A new set of benchmarks has been developed for the performance evaluation of highly parallel supercomputers. These benchmarks consist of ve \parallel kernel " benchmarks and three \simulated application" benchmarks. Together they mimic the computation and data movement characterist ..."
Abstract - Cited by 694 (9 self) - Add to MetaCart
characteristics of large scale computational uid dynamics applications. The principal distinguishing feature of these benchmarks is their \pencil and paper " speci cation | all details of these benchmarks are speci ed only algorithmically. In this way many of the di culties associated with conventional

Investor Protection and Corporate Governance

by Rafael La Porta, Florencio Lopez-de-Silanes, Andrei Shleifer, Robert Vishny , 1999
"... Recent research on corporate governance has documented large differences between countries in ownership concentration in publicly traded firms, in the breadth and depth of financial markets, and in the access of firms to external finance. We suggest that there is a common element to the explanations ..."
Abstract - Cited by 590 (11 self) - Add to MetaCart
the consequences of these differences, and suggest potential strategies of reform of corporate governance. We argue that the legal approach is a more fruitful way to understand corporate governance and its reform than the conventional distinction between bank-centered and market-centered financial systems.

Practical network support for IP traceback

by Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson , 2000
"... This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or “spoofed”, source ad ..."
Abstract - Cited by 678 (13 self) - Add to MetaCart
addresses. In this paper we describe a general purpose traceback mechanism based on probabilistic packet marking in the network. Our approach allows a victim to identify the network path(s) traversed by attack traffic without requiring interactive operational support from Internet Service Providers (ISPs

A blueprint for introducing disruptive technology into the internet

by Larry Peterson, Tom Anderson, David Culler, Timothy Roscoe , 2002
"... This paper argues that a new class of geographically distributed network services is emerging, and that the most effective way to design, evaluate, and deploy these services is by using an overlay-based testbed. Unlike conventional network testbeds, however, we advocate an approach that supports bot ..."
Abstract - Cited by 593 (43 self) - Add to MetaCart
This paper argues that a new class of geographically distributed network services is emerging, and that the most effective way to design, evaluate, and deploy these services is by using an overlay-based testbed. Unlike conventional network testbeds, however, we advocate an approach that supports
Next 10 →
Results 1 - 10 of 27,048
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University