• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,888
Next 10 →

MIME (Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying and Describing the Format of Internet Message Bodies

by N. Borenstein, N. Freed - RFC 1521, BELLCORE, INNOSOFT , 1993
"... RFC 822 defines a message representation protocol which specifies considerable detail about message headers, but which leaves the message content, or message body, as flat ASCII text. This document redefines the format of message bodies to allow multi-part textual and non-textual message bodies to b ..."
Abstract - Cited by 403 (19 self) - Add to MetaCart
, this document is designed to provide facilities to include multiple objects in a single message, to represent body text in character sets other than US-ASCII, to represent formatted multi-font text messages, to represent non-textual material such as images and audio fragments, and generally to facilitate later

Classroom 2000: An Experiment with the Instrumentation of a Living Educational Environment

by Gregory D. Abowd - IBM Systems Journal , 2000
"... One potentially useful feature of future computing environments is the ability to capture the live experiences of the occupants and to provide that record to users for later access and review. Over the last 3 years, we have designed and extensively used a particular instrumented environment, the cla ..."
Abstract - Cited by 343 (21 self) - Add to MetaCart
One potentially useful feature of future computing environments is the ability to capture the live experiences of the occupants and to provide that record to users for later access and review. Over the last 3 years, we have designed and extensively used a particular instrumented environment

Why do Internet services fail, and what can be done about it?

by David Oppenheimer, Archana Ganapathi, David A. Patterson , 2003
"... In 1986 Jim Gray published his landmark study of the causes of failures of Tandem systems and the techniques Tandem used to prevent such failures [6]. Seventeen years later, Internet services have replaced fault-tolerant servers as the new kid on the 24x7-availability block. Using data from three la ..."
Abstract - Cited by 313 (10 self) - Add to MetaCart
In 1986 Jim Gray published his landmark study of the causes of failures of Tandem systems and the techniques Tandem used to prevent such failures [6]. Seventeen years later, Internet services have replaced fault-tolerant servers as the new kid on the 24x7-availability block. Using data from three

An effective hash-based algorithm for mining association rules

by Jong Soo Park, Ming-syan Chen, Philip S. Yu , 1995
"... In this paper, we examine the issue of mining association rules among items in a large database of sales transactions. The mining of association rules can be mapped into the problem of discovering large itemsets where a large itemset is a group of items which appear in a sufficient number of transac ..."
Abstract - Cited by 283 (3 self) - Add to MetaCart
the transaction database size at a much earlier stage of the iterations, thereby reducing the computational cost for later iterations significantly. Extensive simulation study is conducted to evaluate performance of the proposed algorithm. 1

Type Inclusion Constraints and Type Inference

by Alexander Aiken, Edward L. Wimmers - In Proceedings of the 1993 Conference on Functional Programming Languages and Computer Architecture , 1993
"... We present a general algorithm for solving systems of inclusion constraints over type expressions. The constraint language includes function types, constructor types, and liberal intersection and union types. We illustrate the application of our constraint solving algorithm with a type inference sys ..."
Abstract - Cited by 234 (21 self) - Add to MetaCart
system for the lambda calculus with constants. In this system, every pure lambda term has a (computable) type and every term typable in the Hindley/Milner system has all of its Hindley/Milner types. Thus, the inference system is an extension of the Hindley/Milner system that can type a very large set

Level set methods: An overview and some recent results

by Stanley Osher, Ronald P. Fedkiw - J. Comput. Phys , 2001
"... The level set method was devised by Osher and Sethian in [64] as a simple and versatile method for computing and analyzing the motion of an interface Γ in two or three dimensions. Γ bounds a (possibly multiply connected) region Ω. The goal is to compute and analyze the subsequent motion of Γ under a ..."
Abstract - Cited by 226 (11 self) - Add to MetaCart
a velocity field �v. This velocity can depend on position, time, the geometry of the interface and the external physics. The interface is captured for later time as the zero level set of a smooth (at least Lipschitz continuous) function ϕ(�x,t), i.e., Γ(t)={�x|ϕ(�x,t)=0}. ϕ is positive inside Ω

Defeasible Logic

by Donald Nute - Handbook of Logic in Artificial Intelligence and Logic Programming , 2001
"... We often reach conclusions partially on the basis that we do not have evidence that the conclusion is false. A newspaper story warning that the local water supply has been contaminated would prevent a person from drinking water from the tap in her home. This suggests that the absence of such evidenc ..."
Abstract - Cited by 219 (4 self) - Add to MetaCart
to spend the money. All to often we arrive at conclusions which we later retract when contrary evidence becomes available. The contrary evidence defeats our earlier reasoning. Much of our reasoning is defeasible in this way. Since around 1980, considerable research in AI has focused on how to model

Lipid Domain Structure of the Plasma Membrane 941

by Thomas Harder, Peter Scheiffele, Paul Verkade, Kai Simons , 1997
"... Abstract. Lateral assemblies of glycolipids and cholesterol, “rafts, ” have been implicated to play a role in cellular processes like membrane sorting, signal transduction, and cell adhesion. We studied the structure of raft domains in the plasma membrane of non-polarized cells. Overexpressed plasma ..."
Abstract - Cited by 198 (8 self) - Add to MetaCart
Abstract. Lateral assemblies of glycolipids and cholesterol, “rafts, ” have been implicated to play a role in cellular processes like membrane sorting, signal transduction, and cell adhesion. We studied the structure of raft domains in the plasma membrane of non-polarized cells. Overexpressed

Jacobi Angles For Simultaneous Diagonalization.

by Jean-François Cardoso, Jean-fran Cois Cardoso, ANTOINE SOULOUMIAC - SIAM J. Mat. Anal. Appl , 1996
"... . Simultaneous diagonalization of several matrices can be implemented by a Jacobi-like technique. This note gives the required Jacobi angles in close form. Key words. Simultaneous diagonalization, Jacobi iterations, eigenvalues, eigenvectors, structured eigenvalue problem. AMS subject classificati ..."
Abstract - Cited by 192 (3 self) - Add to MetaCart
identification problem [2] (see [3] for a later paper in English). The simultaneous diagonalization algorithm described in these papers is an extension of the Jacobi technique: a joint diagonality criterion is iteratively optimized under plane rotations. The purpose of this note is to complement [1] by giving a

System Z: a natural ordering of defaults with tractable applications to default reasoning

by Judea Pearl , 1990
"... Recent progress towards unifying the probabilistic and preferential models semantics for non-monotonic reasoning has led to a remarkable observation: Any consistent system of default rules imposes an unambiguous and natural ordering on these rules which, to emphasize its sim-ple and basic character, ..."
Abstract - Cited by 190 (0 self) - Add to MetaCart
its semantical origins, and iUustrates two simple entailment relationships in-duced by the ordering. Two extensions are then described, maximum-entropy and conditional entailment, which trade in computational simplicity for semantic refinements. 1. Description We begin with a set of rules R = {r
Next 10 →
Results 1 - 10 of 5,888
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University