• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 17,819
Next 10 →

A Transformation System for Developing Recursive Programs

by R. M. Burstall, John Darlington , 1977
"... A system of rules for transforming programs is described, with the programs in the form of recursion equations An initially very simple, lucid. and hopefully correct program IS transformed into a more efficient one by altering the recursion structure Illustrative examples of program transformations ..."
Abstract - Cited by 649 (3 self) - Add to MetaCart
are given, and a tentative implementation !s described Alternative structures for programs are shown, and a possible initial phase for an automatic or semiautomatic program manipulation system is lndmated KEY WORDS AND PHRASES program transformation, program mampulatlon, optimization, recursion CR

Romantic Love Conceptualized as an Attachment Process,”

by Cindy Hazan , Phillip Shaver , Mary Ainsworth , John Bowlby , Harry Gollob , Kirk-Patrick Lee , Roger Kobak , Anne Peplau , Harry Reis , Judith Schwartz , Ar-Lene Skolnick , Robert Sternberg - Journal of Personality and Social Psychology, , 1987
"... This article explores the possibility that romantic love is an attachment process--a biosocial process by which affectional bonds are formed between adult lovers, just as affectional bonds are formed earlier in life between human infants and their parents. Key components of attachment theory, devel ..."
Abstract - Cited by 729 (18 self) - Add to MetaCart
This article explores the possibility that romantic love is an attachment process--a biosocial process by which affectional bonds are formed between adult lovers, just as affectional bonds are formed earlier in life between human infants and their parents. Key components of attachment theory

Tropos: An Agent-Oriented Software Development Methodology

by Paolo Bresciani, Paolo Giorgini, Fausto Giunchiglia, John Mylopoulos, Anna Perini , 2003
"... Our goal in this paper is to introduce and motivate a methodology, called Tropos, for building agent oriented software systems. Tropos is based on two key ideas. First, the notion of agent and all related mentalistic notions (for instance goals and plans) are used in all phases of software develop ..."
Abstract - Cited by 461 (91 self) - Add to MetaCart
Our goal in this paper is to introduce and motivate a methodology, called Tropos, for building agent oriented software systems. Tropos is based on two key ideas. First, the notion of agent and all related mentalistic notions (for instance goals and plans) are used in all phases of software

Review Edoxaban: Review of Pharmacology and Key Phase I to III Clinical Trials

by Anna Plitt, Robert P. Giugliano, Venous Thromboembolism
"... Vitamin K antagonists (VKAs) remain the standard therapy for anticoagulation in prevention and treatment of venous throm-boembolism (VTE) and for the prevention of stroke in atrial fibrillation (AF). Due to numerous limitations of VKAs, target-specific oral anticoagulants have been developed. Edoxab ..."
Abstract - Add to MetaCart
-scale phase III trial in patients with symptomatic VTE demonstrated that edoxaban was noninferior to warfarin in preventing recurrent VTE and reduced bleeding. In the largest trial of anticoagulation in patients with AF to date, edoxaban was noninferior to warfarin in the prevention of stroke or systemic

Article Edoxaban: Review of Pharmacology and Key Phase I to III Clinical Trials

by Anna Plitt, Robert P. Giugliano, Venous Thromboembolism
"... Vitamin K antagonists (VKAs) remain the standard therapy for anticoagulation in prevention and treatment of venous throm-boembolism (VTE) and for the prevention of stroke in atrial fibrillation (AF). Due to numerous limitations of VKAs, target-specific oral anticoagulants have been developed. Edoxab ..."
Abstract - Add to MetaCart
-scale phase III trial in patients with symptomatic VTE demonstrated that edoxaban was noninferior to warfarin in preventing recurrent VTE and reduced bleeding. In the largest trial of anticoagulation in patients with AF to date, edoxaban was noninferior to warfarin in the prevention of stroke or systemic

Self-Organized Public-Key Management for Mobile Ad Hoc Networks

by Srdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux - IEEE TRANSACTIONS ON MOBILE COMPUTING , 2003
"... In contrast with conventional networks, mobile ad hoc networks usually do not provide online access to trusted authorities or to centralized servers, and they exhibit frequent partitioning due to link and node failures and to node mobility. For these reasons, traditional security solutions that requ ..."
Abstract - Cited by 257 (11 self) - Add to MetaCart
that require online trusted authorities or certificate repositories are not well-suited for securing ad hoc networks. In this paper, we propose a fully self-organized public-key management system that allows users to generate their public-private key pairs, to issue certificates, and to perform authentication

Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish)

by B. Schneier - IN FAST SOFTWARE ENCRYPTION, CAMBRIDGE SECURITY WORKSHOP PROCEEDINGS , 1994
"... Blowfish, a new secret-key block cipher, is proposed. It is a Feistel network, iterating a simple encryption function 16 times. The block size is 64 bits, and the key can be any length up to 448 bits. Although there is a complex initialization phase required before any encryption can take place, the ..."
Abstract - Cited by 217 (13 self) - Add to MetaCart
Blowfish, a new secret-key block cipher, is proposed. It is a Feistel network, iterating a simple encryption function 16 times. The block size is 64 bits, and the key can be any length up to 448 bits. Although there is a complex initialization phase required before any encryption can take place

Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks

by Ayfer Özgür, Olivier Lévêque, David Tse , 2007
"... n source and destination pairs randomly located in an area want to communicate with each other. Signals transmitted from one user to another at distance r apart are subject to a power loss of r −α as well as a random phase. We identify the scaling laws of the information theoretic capacity of the ne ..."
Abstract - Cited by 263 (18 self) - Add to MetaCart
n source and destination pairs randomly located in an area want to communicate with each other. Signals transmitted from one user to another at distance r apart are subject to a power loss of r −α as well as a random phase. We identify the scaling laws of the information theoretic capacity

[S0034-6861(97)00103-7] INTRODUCTION. A SUMMARY OF THE KEY PHASES IN THE BIRTH OF THE FULLERENES

by Harold Kroto
"... ce220-nm region of their laboratory data. Also at about this time Richard Smalley was developing a range of advanced chemical physics techniques which culminated in an ingenious apparatus which enabled small clusters ..."
Abstract - Add to MetaCart
ce220-nm region of their laboratory data. Also at about this time Richard Smalley was developing a range of advanced chemical physics techniques which culminated in an ingenious apparatus which enabled small clusters

Performance-Effective and Low-Complexity Task Scheduling for Heterogeneous Computing

by Haluk Topcuoglu, Min-you Wu, et al. - IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS , 2002
"... Efficient application scheduling is critical for achieving high performance in heterogeneous computing environments. The application scheduling problem has been shown to be NP-complete in general cases as well as in several restricted cases. Because of its key importance, this problem has been exte ..."
Abstract - Cited by 255 (0 self) - Add to MetaCart
Efficient application scheduling is critical for achieving high performance in heterogeneous computing environments. The application scheduling problem has been shown to be NP-complete in general cases as well as in several restricted cases. Because of its key importance, this problem has been
Next 10 →
Results 1 - 10 of 17,819
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University