• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 12,624
Next 10 →

Nanotubes, Controlled manner Correspondence to Author:

by R. S. Masareddy, V. G. Joshi, R. S. Sutar, S. K. Yellanki, Nano Carriers, Rahul S. Sutar, Ground Belgaum Karnataka
"... 5-ASA- 5-Aminosalicylic acid, Mc- Molar mass of the core, Mm- Molar mass of the branched monomer, Mt-Molar mass of the terminal groups, nc- Core multiplicity, nm- Branch-juncture multiplicity, G- Generation number, CMC- Critical micelle concentration, PEO- Poly (ethylene oxide) DNA- Di-ribo nucleic ..."
Abstract - Add to MetaCart
5-ASA- 5-Aminosalicylic acid, Mc- Molar mass of the core, Mm- Molar mass of the branched monomer, Mt-Molar mass of the terminal groups, nc- Core multiplicity, nm- Branch-juncture multiplicity, G- Generation number, CMC- Critical micelle concentration, PEO- Poly (ethylene oxide) DNA- Di-ribo nucleic acid MWNTs- Multi-walled nanotubes, SWNTs- Single-walled nanotubes, EAD- Electric arc discharge, CVD- Chemical vapor deposition, LA- Laser ablation, CNTs- Carbon nanotubes, MD- Molecular dynamics, MEMS- Microelectro mechanical systems,

Universally composable security: A new paradigm for cryptographic protocols

by Ran Canetti , 2013
"... We present a general framework for representing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols is preserved ..."
Abstract - Cited by 833 (37 self) - Add to MetaCart
, protocols are guaranteed to maintain their security in any context, even in the presence of an unbounded number of arbitrary protocol instances that run concurrently in an adversarially controlled manner. This is a useful guarantee, that allows arguing about the security of cryptographic protocols

A generalized processor sharing approach to flow control in integrated services networks: The single-node case

by Abhay K. Parekh, Robert G. Gallager - IEEE/ACM TRANSACTIONS ON NETWORKING , 1993
"... The problem of allocating network resources to the users of an integrated services network is investigated in the context of rate-based flow control. The network is assumed to be a virtual circuit, connection-based packet network. We show that the use of Generalized processor Sharing (GPS), when co ..."
Abstract - Cited by 2010 (5 self) - Add to MetaCart
The problem of allocating network resources to the users of an integrated services network is investigated in the context of rate-based flow control. The network is assumed to be a virtual circuit, connection-based packet network. We show that the use of Generalized processor Sharing (GPS), when

On Augmenting Reactivity With Deliberation in a Controlled Manner

by Jacek Malec - In proceedings of the workshop on Balancing Reactivity and Social Deliberation in Multi-Agent Systems, Fourteenth European Conference on Artificial Intelligence , 2000
"... . We argue that a reactive agent obeying the requirement of predictability imposed by a hard-real-time application domain cannot be equipped with an arbitrarily powerful deliberation capability as this would jeopardize the predictability of the agent's behaviour. Therefore such augmentation ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
such augmentation should be performed in a principled, controlled manner. We illustrate our line of thought with the example of Generic Layered Architecture used for creating reactive agents acting in dynamic environments requiring real-time responsiveness. 1 Introduction The interplay between reactivity

The program dependence graph and its use in optimization

by Jeanne Ferrante, Karl J. Ottenstein, Joe D. Warren - ACM Transactions on Programming Languages and Systems , 1987
"... In this paper we present an intermediate program representation, called the program dependence graph (PDG), that makes explicit both the data and control dependence5 for each operation in a program. Data dependences have been used to represent only the relevant data flow relationships of a program. ..."
Abstract - Cited by 996 (3 self) - Add to MetaCart
computationally related parts of the program, a single walk of these dependences is sufficient to perform many optimizations. The PDG allows transformations such as vectorization, that previ-ously required special treatment of control dependence, to be performed in a manner that is uniform for both control

Illusion and well-being: A social psychological perspective on mental health.

by Shelley E Taylor , Jonathon D Brown , Nancy Cantor , Edward Emery , Susan Fiske , Tony Green-Wald , Connie Hammen , Darrin Lehman , Chuck Mcclintock , Dick Nisbett , Lee Ross , Bill Swann , Joanne - Psychological Bulletin, , 1988
"... Many prominent theorists have argued that accurate perceptions of the self, the world, and the future are essential for mental health. Yet considerable research evidence suggests that overly positive selfevaluations, exaggerated perceptions of control or mastery, and unrealistic optimism are charac ..."
Abstract - Cited by 988 (20 self) - Add to MetaCart
Many prominent theorists have argued that accurate perceptions of the self, the world, and the future are essential for mental health. Yet considerable research evidence suggests that overly positive selfevaluations, exaggerated perceptions of control or mastery, and unrealistic optimism

Simplifying Discovered Process Models in a Controlled Manner

by Dirk Fahl
"... Process models discovered from a process log using process mining tend to be complex and have problems balancing between overfitting and underfitting. An overfitting model allows for too little behavior as it just permits the traces in the log and no other trace. An underfitting model allows for too ..."
Abstract - Add to MetaCart
for too much behavior as it permits traces that are significantly different from the behavior seen in the log. This paper presents a post-processing approach to simplify discovered process models while controlling the balance between overfitting and underfitting. The discovered process model, expressed

Fundamental Design Issues for the Future Internet

by Scott Shenker - IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS , 1995
"... The Internet has been a startling and dramatic success. However, multimedia applications, with their novel traffic characteristics and service requirements, pose an interesting challenge to the technical foundations of the Internet. In this paper we address some of the fundamental architectural d ..."
Abstract - Cited by 471 (3 self) - Add to MetaCart
design issues facing the future Internet. In particular, we discuss whether the Internet should adopt a new service model, how this service model should be invoked, and whether this service model should include admission control. These architectural issues are discussed in a nonrigorous manner

ADEPT flex - Supporting Dynamic Changes of Workflows Without Loosing Control

by Manfred Reichert, Peter Dadam - Journal of Intelligent Information Systems , 1998
"... . Today's workflow management systems (WFMSs) are only applicable in a secure and safe manner if the business process (BP) to be supported is well-structured and there is no need for ad hoc deviations at runtime. As only few BPs are static in this sense, this significantly limits the applicabil ..."
Abstract - Cited by 425 (112 self) - Add to MetaCart
. Today's workflow management systems (WFMSs) are only applicable in a secure and safe manner if the business process (BP) to be supported is well-structured and there is no need for ad hoc deviations at runtime. As only few BPs are static in this sense, this significantly limits

Heart and mind in conflict: Interplay of affect and cognition in consumer decision making

by Baba Shiv, Alexander Fedorikhin - Journal of Consumer Research , 1999
"... This article examines how consumer decision making is influenced by automat-ically evoked task-induced affect and by cognitions that are generated in a more controlled manner on exposure to alternatives in a choice task. Across two experiments respondents chose between two alternatives: one (chocola ..."
Abstract - Cited by 351 (4 self) - Add to MetaCart
This article examines how consumer decision making is influenced by automat-ically evoked task-induced affect and by cognitions that are generated in a more controlled manner on exposure to alternatives in a choice task. Across two experiments respondents chose between two alternatives: one
Next 10 →
Results 1 - 10 of 12,624
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University