• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,779
Next 10 →

Pushing the EL envelope

by Franz Baader, Sebastian Brand, Carsten Lutz - In Proc. of IJCAI 2005 , 2005
"... Recently, it has been shown that the small description logic (DL) EL, which allows for conjunction and existential restrictions, has better algorithmic properties than its counterpart FL0, which allows for conjunction and value restrictions. Whereas the subsumption problem in FL0 becomes already int ..."
Abstract - Cited by 461 (59 self) - Add to MetaCart
intractable in the presence of acyclic TBoxes, it remains tractable in EL even with general concept inclusion axioms (GCIs). On the one hand, we extend the positive result for EL by identifying a set of expressive means that can be added to EL without sacrificing tractability. On the other hand, we show

Précis of "The number sense"

by Stanislas Dehaene, Service Hospitalier, Frédéric Joliot, Place Du Général Leclerc
"... Number sense " is a short-hand for our ability to quickly understand, approximate, and manipulate numerical quantities. My hypothesis is that number sense rests on cerebral circuits that have evolved specifically for the purpose of representing basic arithmetic knowledge. Four lines of evidence ..."
Abstract - Cited by 313 (25 self) - Add to MetaCart
Number sense " is a short-hand for our ability to quickly understand, approximate, and manipulate numerical quantities. My hypothesis is that number sense rests on cerebral circuits that have evolved specifically for the purpose of representing basic arithmetic knowledge. Four lines

Cooperative sensing among cognitive radios

by Shridhar Mubaraq Mishra, Anant Sahai, Robert W. Brodersen - In Proc. of the IEEE International Conference on Communications (ICC , 2006
"... Abstract — Cognitive Radios have been advanced as a technology for the opportunistic use of under-utilized spectrum since they are able to sense the spectrum and use frequency bands if no Primary user is detected. However, the required sensitivity is very demanding since any individual Radio might f ..."
Abstract - Cited by 289 (15 self) - Add to MetaCart
and hence a few independent users perform better than many correlated users. Unfortunately, cooperative gain is very sensitive to adversarial/failing Cognitive Radios. Radios that fail in a known way (always report the presence/absence of a Primary user) can be compensated for by censoring them

MANAGING WITH STYLE: THE EFFECT OF MANAGERS ON FIRM POLICIES

by Marianne Bertrand, Antoinette Schoar , 2003
"... This paper investigates whether and how individual managers affect corporate behavior and performance. We construct a manager-firm matched panel data set which enables us to track the top managers across different firms over time. We find that manager fixed effects matter for a wide range of corpora ..."
Abstract - Cited by 251 (7 self) - Add to MetaCart
of corporate decisions. A significant extent of the heterogeneity in investment, financial and organizational practices of firms can be explained by the presence of manager fixed effects. We identify specific patterns in managerial decision making that appear to indicate general differences in “style” across

Estimating 3D Hand Pose From a Cluttered Image

by Vassilis Athitsos, Stan Sclaroff , 2003
"... A method is proposed that can generate a ranked list of plausible three-dimensional hand configurations that best match an input image. Hand pose estimation is formulated as an image database indexing problem, where the closest matches for an input hand image are retrieved from a large database of s ..."
Abstract - Cited by 173 (7 self) - Add to MetaCart
of synthetic hand images. In contrast to previous approaches, the system can function in the presence of clutter, thanks to two novel clutter-tolerant indexing methods. First, a computationally efficient approximation of the image-to-model chamfer distance is obtained by embedding binary edge images into a

Certificateless Public Key Cryptography

by Sattam S. Al-riyami, Kenneth G. Paterson - ASIACRYPT'03 , 2003
"... This paper introduces the concept of certificateless public key cryptography (CL-PKC). In contrast to traditional public key cryptographic systems, CL-PKC does not require the use of certificates to guarantee the authenticity of public keys. It does rely on the use of a trusted third party (TTP) who ..."
Abstract - Cited by 240 (4 self) - Add to MetaCart
) who is in possession of a master key. In these respects, CL-PKC is similar to identity-based public key cryptography (ID-PKC). On the other hand, CL-PKC does not suffer from the key escrow property that seems to be inherent in ID-PKC. Thus CL-PKC can be seen as a model for the use of public key

Symphony: Distributed Hashing in a Small World

by Gurmeet Singh Manku, Mayank Bawa, Prabhakar Raghavan - IN PROCEEDINGS OF THE 4TH USENIX SYMPOSIUM ON INTERNET TECHNOLOGIES AND SYSTEMS , 2003
"... We present Symphony, a novel protocol for maintaining distributed hash tables in a wide area network. The key idea is to arrange all participants along a ring and equip them with long distance contacts drawn from a family of harmonic distributions. Through simulation, we demonstrate that our constr ..."
Abstract - Cited by 211 (13 self) - Add to MetaCart
construction is scalable, flexible, stable in the presence of frequent updates and offers small average latency with only a handful of long distance links per node. The cost of updates when hosts join and leave is small.

On the Influence of the Kernel on the Consistency of Support Vector Machines

by Ingo Steinwart - Journal of Machine Learning Research , 2001
"... In this article we study the generalization abilities of several classifiers of support vector machine (SVM) type using a certain class of kernels that we call universal. It is shown that the soft margin algorithms with universal kernels are consistent for a large class of classification problems ..."
Abstract - Cited by 212 (21 self) - Add to MetaCart
problems including some kind of noisy tasks provided that the regularization parameter is chosen well. In particular we derive a simple su#cient condition for this parameter in the case of Gaussian RBF kernels. On the one hand our considerations are based on an investigation of an approximation property

Hands Up: Attentional Prioritization of Space Near the Hand

by Catherine L. Reed, Jefferson D. Grubb, Cleophus Steele, Catherine L. Reed, Jefferson D. Grubb, Cleophus Steele, We Thank Elizabetta Ládavas, Ro Farné, Rob Roberts
"... This study explored whether hand location affected spatial attention. The authors used a visual covertorienting paradigm to examine whether spatial attention mechanisms—location prioritization and shifting attention—were supported by bimodal, hand-centered representations of space. Placing 1 hand ne ..."
Abstract - Cited by 14 (1 self) - Add to MetaCart
next to a target location, participants detected visual targets following highly predictive visual cues. There was no a priori reason for the hand to influence task performance unless hand presence influenced attention. Results showed that target detection near the hand was facilitated relative

Rapid and simple method for preparation of RNA from Saccharomyces cerevisiae. Nucleic Acids Res

by Mark E. Schmitt, Timothy A. Brown, Bernard L. Trumpower , 1990
"... Most methods for isolation of RNA from yeast require tedious vortexing with glass beads, and give low yields when scaled down to 10 ml cultures (1). In addition, it is frequently desirable to prepare RNA from several different yeast strains grown under a variety of growth conditions, and preparation ..."
Abstract - Cited by 196 (1 self) - Add to MetaCart
, and preparations using glass beads are impractical when dealing with multiple samples. Heating and freezing of yeast cells in the presence of phenol and SDS has been used for large scale isolation of RNA from yeast (2). We report here a mini-prep version of yeast RNA isolation using phenol and SDS that allows
Next 10 →
Results 1 - 10 of 5,779
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University