• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 37,338
Next 10 →

Axiomatic quantum field theory in curved spacetime

by Stefan Hollands, Robert M. Wald , 2008
"... The usual formulations of quantum field theory in Minkowski spacetime make crucial use of features—such as Poincare invariance and the existence of a preferred vacuum state—that are very special to Minkowski spacetime. In order to generalize the formulation of quantum field theory to arbitrary globa ..."
Abstract - Cited by 689 (18 self) - Add to MetaCart
The usual formulations of quantum field theory in Minkowski spacetime make crucial use of features—such as Poincare invariance and the existence of a preferred vacuum state—that are very special to Minkowski spacetime. In order to generalize the formulation of quantum field theory to arbitrary

Does the autistic child have a theory of mind

by Simon Baron-cohen, Alan M. Leslie, Uta Frith - Cognition , 1985
"... We use a new model of metarepresentational development to predict a cognitive deficit which could explain a crucial component of the social impairment in childhood autism. One of the manifestations of a basic metarepresentational ca-pacity is a ‘theory of mind’. We have reason to believe that autist ..."
Abstract - Cited by 596 (47 self) - Add to MetaCart
We use a new model of metarepresentational development to predict a cognitive deficit which could explain a crucial component of the social impairment in childhood autism. One of the manifestations of a basic metarepresentational ca-pacity is a ‘theory of mind’. We have reason to believe

Efficient similarity search in sequence databases

by Rakesh Agrawal, Christos Faloutsos, Arun Swami , 1994
"... We propose an indexing method for time sequences for processing similarity queries. We use the Discrete Fourier Transform (DFT) to map time sequences to the frequency domain, the crucial observation being that, for most sequences of practical interest, only the first few frequencies are strong. Anot ..."
Abstract - Cited by 515 (19 self) - Add to MetaCart
We propose an indexing method for time sequences for processing similarity queries. We use the Discrete Fourier Transform (DFT) to map time sequences to the frequency domain, the crucial observation being that, for most sequences of practical interest, only the first few frequencies are strong

Two-Sided Matching: A Study in Game-Theoretic Modeling and Analysis

by Alvin E. Roth, Marilda, A. Oliveira - Econometric Society Monograph Series , 1990
"... Reading this text on the application of game theory to two-sided matching problems, I relived an experience shared by many readers of this journal-the process known as &dquo;resident match.&dquo; At a prescribed moment, over 90 % of sen-ior medical students frantically tear open an envelope ..."
Abstract - Cited by 705 (25 self) - Add to MetaCart
chewing up our preference lists and spitting out one of the more crucial decisions in our lives, some of us sought as-surances that the algorithm, named NIMP (the National In-tern Matching Program), was fair and just. We were told, or maybe we rationalized, that it was of no use to lie to NIMP.

Differential Cryptanalysis of DES-like Cryptosystems

by Eli Biham, Adi Shamir - CRYPTO'91 , 1991
"... The Data Encryption Standard (DES) is the best known and most widely used cryptosystem for civilian applications. It was developed at IBM and adopted by the National Buraeu of Standards in the mid 70's, and has successfully withstood all the attacks published so far in the open literature. In t ..."
Abstract - Cited by 676 (9 self) - Add to MetaCart
The Data Encryption Standard (DES) is the best known and most widely used cryptosystem for civilian applications. It was developed at IBM and adopted by the National Buraeu of Standards in the mid 70's, and has successfully withstood all the attacks published so far in the open literature

GPS-Less Low Cost Outdoor Localization for Very Small Devices.

by Nirupama Bulusu , John Heidemann , Deborah Estrin - IEEE Personal Communications Magazine, , 2000
"... Abstract-Instrumenting the physical world through large networks of wireless sensor nodes, particularly for applications like environmental monitoring of water and soil, requires that these nodes be very small, light, untethered and unobtrusive. The problem of localization, i.e., determining where ..."
Abstract - Cited by 1000 (27 self) - Add to MetaCart
a given node is physically located in a network is a challenging one, and yet extremely crucial for many of these applications. Practical considerations such as the small size, form factor, cost and power constraints of nodes preclude the reliance on GPS (Global Positioning System) on all nodes

Theory of Elasticity,

by S P Timoshenko , J N Goodier , 1951
"... ABSTRACT The knowledge of the in-situ stress field in rock masses is in general of crucial importance in various areas of geo-engineering, such as mining or civil underground excavations, hydrocarbon extraction, CO2 storage, hydraulic fracture operations, etc. In the context of the Finite Element ..."
Abstract - Cited by 710 (1 self) - Add to MetaCart
ABSTRACT The knowledge of the in-situ stress field in rock masses is in general of crucial importance in various areas of geo-engineering, such as mining or civil underground excavations, hydrocarbon extraction, CO2 storage, hydraulic fracture operations, etc. In the context of the Finite Element

Valgrind: A framework for heavyweight dynamic binary instrumentation

by Nicholas Nethercote, Julian Seward - In Proceedings of the 2007 Programming Language Design and Implementation Conference , 2007
"... Dynamic binary instrumentation (DBI) frameworks make it easy to build dynamic binary analysis (DBA) tools such as checkers and profilers. Much of the focus on DBI frameworks has been on performance; little attention has been paid to their capabilities. As a result, we believe the potential of DBI ha ..."
Abstract - Cited by 558 (5 self) - Add to MetaCart
register and memory value with another value that describes it. This support accounts for several crucial design features that distinguish Valgrind from other DBI frameworks. Because of these features, lightweight tools built with Valgrind run comparatively slowly, but Valgrind can be used to build more

Computer Vision

by Kusuma Kumari B. M , 1982
"... Driver inattention is one of the main causes of traffic accidents. Monitoring a driver to detect inattention is a complex problem that involves physiological and behavioral elements. Different approaches have been made, and among them Computer Vision has the potential of monitoring the person behind ..."
Abstract - Cited by 1041 (11 self) - Add to MetaCart
the use of infrared light which is harmful for the human eye. Motor vehicle accidents cause injury and death, and this system will help to decrease the amount of crashes due to fatigued drivers. The proposed algorithm will work in three main stages. In first stage the face of the driver is detected

Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach

by Jiawei Han, Jian Pei, Yiwen Yin, Runying Mao - DATA MINING AND KNOWLEDGE DISCOVERY , 2004
"... Mining frequent patterns in transaction databases, time-series databases, and many other kinds of databases has been studied popularly in data mining research. Most of the previous studies adopt an Apriori-like candidate set generation-and-test approach. However, candidate set generation is still co ..."
Abstract - Cited by 1752 (64 self) - Add to MetaCart
costly, especially when there exist a large number of patterns and/or long patterns. In this study, we propose a novel frequent-pattern tree (FP-tree) structure, which is an extended prefix-tree structure for storing compressed, crucial information about frequent patterns, and develop an efficient FP
Next 10 →
Results 1 - 10 of 37,338
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University