• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,282
Next 10 →

Bandera: Extracting Finite-state Models from Java Source Code

by James C. Corbett, Matthew B. Dwyer, John Hatcliff, Shawn Laubach, Corina S. Pasareanu, Hongjun Zheng - IN PROCEEDINGS OF THE 22ND INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING , 2000
"... Finite-state verification techniques, such as model checking, have shown promise as a cost-effective means for finding defects in hardware designs. To date, the application of these techniques to software has been hindered by several obstacles. Chief among these is the problem of constructing a fini ..."
Abstract - Cited by 654 (33 self) - Add to MetaCart
Finite-state verification techniques, such as model checking, have shown promise as a cost-effective means for finding defects in hardware designs. To date, the application of these techniques to software has been hindered by several obstacles. Chief among these is the problem of constructing a

Towards flexible teamwork

by Milind Tambe - JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH , 1997
"... Many AI researchers are today striving to build agent teams for complex, dynamic multi-agent domains, with intended applications in arenas such as education, training, entertainment, information integration, and collective robotics. Unfortunately, uncertainties in these complex, dynamic domains obst ..."
Abstract - Cited by 570 (59 self) - Add to MetaCart
Many AI researchers are today striving to build agent teams for complex, dynamic multi-agent domains, with intended applications in arenas such as education, training, entertainment, information integration, and collective robotics. Unfortunately, uncertainties in these complex, dynamic domains

What Is Coefficient alpha? An Examination of Theory and Applications

by Jose M. Cortina - Journal of Applied Psychology , 1993
"... Psychological research involving scale construction has been hindered considerably by a wide-spread lack of understanding of coefficient alpha and reliability theory in general. A discussion of the assumptions and meaning of coefficient alpha is presented. This discussion is followed by a demonstrat ..."
Abstract - Cited by 393 (0 self) - Add to MetaCart
Psychological research involving scale construction has been hindered considerably by a wide-spread lack of understanding of coefficient alpha and reliability theory in general. A discussion of the assumptions and meaning of coefficient alpha is presented. This discussion is followed by a

Using an Expressive Description Logic: FaCT or Fiction?

by Ian R. Horrocks - In Proc. of KR-98 , 1998
"... Description Logics form a family of formalisms closely related to semantic networks but with the distinguishing characteristic that the semantics of the concept description language is formally defined, so that the subsumption relationship between two concept descriptions can be computed by a suitab ..."
Abstract - Cited by 273 (50 self) - Add to MetaCart
suitable algorithm. Description Logics have proved useful in a range of applications but their wider acceptance has been hindered by their limited expressiveness and the intractability of their subsumption algorithms. This paper addresses both these issues by describing a sound and complete tableaux

McRT-STM: a High Performance Software Transactional Memory System for a Multi-Core Runtime

by Bratin Saha, Ali-reza Adl-tabatabai, Richard L. Hudson, Chi Cao Minh, Benjamin Hertzberg - In Proc. of the 11th ACM Symp. on Principles and Practice of Parallel Programming , 2006
"... Applications need to become more concurrent to take advantage of the increased computational power provided by chip level multiprocessing. Programmers have traditionally managed this concurrency using locks (mutex based synchronization). Unfortunately, lock based synchronization often leads to deadl ..."
Abstract - Cited by 241 (14 self) - Add to MetaCart
Applications need to become more concurrent to take advantage of the increased computational power provided by chip level multiprocessing. Programmers have traditionally managed this concurrency using locks (mutex based synchronization). Unfortunately, lock based synchronization often leads

Improved proxy re-encryption schemes with applications to secure distributed storage

by Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger - IN NDSS , 2005
"... In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. We predict that fast and secure re-encryption will become increasingly popu ..."
Abstract - Cited by 203 (15 self) - Add to MetaCart
In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. We predict that fast and secure re-encryption will become increasingly

2007) “Do formal intellectual property rights hinder the free flow of scientific knowledge? An empirical test of the anti-commons hypothesis

by Fiona Murray, Scott Stern - Journal of Economic Behavior and Organization
"... While the impact of intellectual property rights on the diffusion and use of scientific knowledge is at the heart of contemporary policy debates, evidence about the role of patents in science has been anecdotal. Although many scholars suggest that IPR has a positive effect on cumulative innovation, ..."
Abstract - Cited by 124 (18 self) - Add to MetaCart
scientific research activities. This article frames this issue around the concept of dual knowledge, in which a single discovery may contribute to both scientific research and useful commercial applications. A key implication of dual knowledge is that it may be simultaneously instantiated as a scientific

Some chemistry of hindered organoboranes

by Pelter A N , 1994
"... Abstract. Boron stabilised carbanions can be ma& through the use of highly hindered diarylboranes. Some reactions of the anions so produced are discussed. A spin-off of this work is the production of some stable mono and diarylboranes which hold great promise as reagents of general application. ..."
Abstract - Add to MetaCart
Abstract. Boron stabilised carbanions can be ma& through the use of highly hindered diarylboranes. Some reactions of the anions so produced are discussed. A spin-off of this work is the production of some stable mono and diarylboranes which hold great promise as reagents of general application

A Quality of Service Architecture that Combines Resource Reservation and Application Adaptation

by Ian Foster, Alain Roy , 2000
"... Abstract—Reservation and adaptation are two well-known and effective techniques for enhancing the end-to-end performance of network applications. However, both techniques also have limitations, particularly when dealing with high-bandwidth, dynamic flows: fixed-capability reservations tend to be was ..."
Abstract - Cited by 165 (10 self) - Add to MetaCart
Abstract—Reservation and adaptation are two well-known and effective techniques for enhancing the end-to-end performance of network applications. However, both techniques also have limitations, particularly when dealing with high-bandwidth, dynamic flows: fixed-capability reservations tend

Does Technology Hinder or Enhance Learning

by Wai Mei Yeung-fang
"... In higher education, many lecturers are facing the challenges of reaching excellence in both research and teaching. While some of them might admit that if technology would be most useful if it could maximize their time for research and minimize their time for teaching, many lecturers are concerned w ..."
Abstract - Add to MetaCart
of the application. However, technology is a double-edge sword; when technology is misused or abused, opportunities in technology could turn into dilemmas. This paper includes many examples of such opportunities and dilemmas in the areas of learning environment, content development, information access, task
Next 10 →
Results 1 - 10 of 2,282
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University