• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,124
Next 10 →

Patents Record file:///C:/WIMR/remote_copy/faculty/documents/patents/NMR_sca...

by Moran Paul R. Winston-salem Nc
"... An NMR zeugmatographic scanner is modified to produce flow images. A motion sensitizing gradient field is applied to the gyromagnetic nuclei after transverse excitation and prior to emission measurement. The motion sensitized free induction signal which results is processed using an inverse Fourier ..."
Abstract - Add to MetaCart
An NMR zeugmatographic scanner is modified to produce flow images. A motion sensitizing gradient field is applied to the gyromagnetic nuclei after transverse excitation and prior to emission measurement. The motion sensitized free induction signal which results is processed using an inverse Fourier transformation to produce a number of useful images. Exemplary Claims Claim 1: In a gyromagnetic resonance instrument for producing an image of an extended subject which contains both stationary gyromagnetic material and moving gyromagnetic material, in +L which the instrument +L performs a measurement cycle by applying a transverse excitation signal to a gyromagnetic material and to thereby impart a transverse magnetic moment thereto, and which produces a FID signal responsive to emissions by the transversely magnetized gyromagnetic material, the improvement comprising: means for locating the position of the gyromagnetic material within the extended subject which is producing a FID signal; means for motion sensitizing a FID signal in which a motion sensitizing magnetic field gradient F is applied to the gyromagnetic material for a period of time 2 T after its transverse excitation and prior to the production of the FID signal, and wherein the motion sensitizing magnetic field gradient F has alternating polarity with respect to the gyromagnetic material such that its integral over the time period 2 T is substantially zero; and

An algorithm for finding best matches in logarithmic expected time

by Jerome H. Friedman, Jon Louis Bentley, Raphael Ari Finkel - ACM Transactions on Mathematical Software , 1977
"... An algorithm and data structure are presented for searching a file containing N records, each described by k real valued keys, for the m closest matches or nearest neighbors to a given query record. The computation required to organize the file is proportional to kNlogN. The expected number of recor ..."
Abstract - Cited by 764 (2 self) - Add to MetaCart
An algorithm and data structure are presented for searching a file containing N records, each described by k real valued keys, for the m closest matches or nearest neighbors to a given query record. The computation required to organize the file is proportional to kNlogN. The expected number

The grid file: an adaptable, symmetric multikey file structure

by J. Nievergelt, H. Hinterberger, K. C. Sevcik - In Trends in Information Processing Systems, Proc. 3rd ECZ Conference, A. Duijvestijn and P. Lockemann, Eds., Lecture Notes in Computer Science 123 , 1981
"... Traditional file structures that provide multikey access to records, for example, inverted files, are extensions of file structures originally designed for single-key access. They manifest various deficiencies in particular for multikey access to highly dynamic files. We study the dynamic aspects of ..."
Abstract - Cited by 426 (4 self) - Add to MetaCart
Traditional file structures that provide multikey access to records, for example, inverted files, are extensions of file structures originally designed for single-key access. They manifest various deficiencies in particular for multikey access to highly dynamic files. We study the dynamic aspects

Probabilistic Counting Algorithms for Data Base Applications

by Philippe Flajolet, G. N. Martin, G. Nigel Martin , 1985
"... This paper introduces a class of probabilistic counting lgorithms with which one can estimate the number of distinct elements in a large collection of data (typically a large file stored on disk) in a single pass using only a small additional storage (typically less than a hundred binary words) a ..."
Abstract - Cited by 444 (6 self) - Add to MetaCart
) and only a few operations per element scanned. The algorithms are based on statistical observations made on bits of hashed values of records. They are by con- struction totally insensitive to the replicafive structure of elements in the file; they can be used in the context of distributed systems

The NBER patent citations data file: Lessons, insights and methodological tools

by Bronwyn Hall, Adam Jaffe, Manuel Trajtenberg , 2001
"... This paper pulls together material from multiple research projects spanning approximately a decade, and hence it would be impossible to thank everyone who contributed to it. Still, our co-authors Rebecca Henderson and Michael Fogarty, and research assistants Meg Fernando, Abi Rubin, Guy Michaels and ..."
Abstract - Cited by 266 (3 self) - Add to MetaCart
and Michael Katz deserve special thanks. Above all, this paper – indeed much of the patent-related research of the past two decades – could never have come to pass without the inspiration, support and

A Trace-Driven Analysis of the UNIX 4.2 BSD File System

by John Ousterhout, Herve Da Costa, David Harrison, John A. Kunze, Mike Kupfer, James G. Thompson , 1985
"... We analyzed the UNIX 4.2 BSD file system by recording userlevel activity in trace files and writing programs to analyze the traces. The tracer did not record individual read and write operations, yet still provided tight bounds on what information was accessed and when. The trace analysis shows that ..."
Abstract - Cited by 277 (5 self) - Add to MetaCart
We analyzed the UNIX 4.2 BSD file system by recording userlevel activity in trace files and writing programs to analyze the traces. The tracer did not record individual read and write operations, yet still provided tight bounds on what information was accessed and when. The trace analysis shows

Automated Whitebox Fuzz Testing

by Patrice Godefroid, Michael Y. Levin, David Molnar
"... Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a program and test the resulting values. We present an alternative whitebox fuzz testing approach inspired by recent advances in ..."
Abstract - Cited by 311 (25 self) - Add to MetaCart
in symbolic execution and dynamic test generation. Our approach records an actual run of the program under test on a well-formed input, symbolically evaluates the recorded trace, and gathers constraints on inputs capturing how the program uses these. The collected constraints are then negated one by one

Interpreting the data: Parallel analysis with Sawzall.

by Rob Pike , Sean Dorward , Robert Griesemer , Sean Quinlan - Scientific Programming Journal, , 2005
"... Abstract Very large data sets often have a flat but regular structure and span multiple disks and machines. Examples include telephone call records, network logs, and web document repositories. These large data sets are not amenable to study using traditional database techniques, if only because th ..."
Abstract - Cited by 273 (0 self) - Add to MetaCart
Abstract Very large data sets often have a flat but regular structure and span multiple disks and machines. Examples include telephone call records, network logs, and web document repositories. These large data sets are not amenable to study using traditional database techniques, if only because

The Effect of File Sharing on Record Sales: An Empirical Analysis

by Felix Oberholzer-gee, Koleman Strumpf - Journal of Political Economy , 2004
"... numerous seminars, and two anonymous referees for helpful comments. This project would not have been possible without the assistance of several individuals and organizations. MixMasterFlame and the FlameNap network shared P2P data with us, and BigChampagne LLC, the CMJ Network, Nathaniel Leibowitz, ..."
Abstract - Cited by 162 (2 self) - Add to MetaCart
numerous seminars, and two anonymous referees for helpful comments. This project would not have been possible without the assistance of several individuals and organizations. MixMasterFlame and the FlameNap network shared P2P data with us, and BigChampagne LLC, the CMJ Network, Nathaniel Leibowitz, and Nevil Brownlee generously provided auxiliary data. We thank Keith Ross and David Weekly for assistance in understanding the KaZaA, OpenNap, and WinMX search protocols and database indices. Sarah Woolverton and Christina Hsiung Chen

Desinging File Systems for Digital Video and Audio

by P. Venkat Rangan, Harrick M. Vin - Proc. 13 th. ACM Symposium on Operating Systems Principles (SOSP'91 , 1991
"... We address the unique requirements of a multimedia file system such as continuous storage and retrieval of media, maintenance of synchronization between multiple media streams, and efficient manipulation of huge media objects. We present a model that relates disk and device characteristics to the re ..."
Abstract - Cited by 171 (17 self) - Add to MetaCart
to the recording rate, and derive storage granularity and scatten’ng parameters that guarantee continuous access. In order for the file system to support multiple concurrent requests, we develop admission control algorithms for determining whether a new request can be accepted without violating the realtime
Next 10 →
Results 1 - 10 of 5,124
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University