• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 449
Next 10 →

The spandrels of San Marco and the Panglossian paradigm: a critique of the adaptationist programme.

by S J Gould , R C Lewontin - Proceedings of the Royal Society of London Series B, Biological Sciences , 1979
"... An adaptationist programme has dominated evolutionary thought in England and the United States during the past 40 years. It is based on faith in the power of natural selection as an optimizing agent. It proceeds by breaking an organism into unitary 'traits' and proposing an adaptive story ..."
Abstract - Cited by 538 (2 self) - Add to MetaCart
story for each considered separately. Trade-offs among competing selective demands exert the onlv brake upon perfection; non-optimality is thereby rendered as a result of adaptation as well. We criticize this approach and attempt to reassert a competing notion (long popular in continental Europe

TRADE-OFFS ON ANTENNA FABRICATION

by Dr. Marv Ryken
"... This paper addresses the future military munitions ' system requirements for antennas in terms of the existing versus new fabrication technology. The antenna requirements of the future smart munitions will be GPS for precision guidance and TM for system performance testing. The environmental re ..."
Abstract - Add to MetaCart
compares the existing antenna fabrication technology of Teflon based dielectric printed circuits versus multilayer alumina in the green state, a technology that has been perfected for fabricating microwave integrated circuits (MIC's). The trade-offs that will be addressed are temperature, shock, cost

Parallel Mining of Association Rules

by Rakesh Agrawal, John C. Shafer - IEEE Transactions on Knowledge and Data Engineering , 1996
"... We consider the problem of mining association rules on a shared-nothing multiprocessor. We present three algorithms that explore a spectrum of trade-offs between computation, communication, memory usage, synchronization, and the use of problem-specific information. The best algorithm exhibits near p ..."
Abstract - Cited by 325 (3 self) - Add to MetaCart
We consider the problem of mining association rules on a shared-nothing multiprocessor. We present three algorithms that explore a spectrum of trade-offs between computation, communication, memory usage, synchronization, and the use of problem-specific information. The best algorithm exhibits near

The Inflation Output Trade-Off Revisited∗

by Gauti B. Eggertsson, Marc P. Giannoni , 2013
"... A rich literature from the 1970s shows that as inflation expectations become more and more in-grained, monetary policy looses its stimulative effect. In the extreme, with perfectly anticipated infla-tion, there is no trade-off between inflation and output. A recent literature on the interest-rate ze ..."
Abstract - Add to MetaCart
A rich literature from the 1970s shows that as inflation expectations become more and more in-grained, monetary policy looses its stimulative effect. In the extreme, with perfectly anticipated infla-tion, there is no trade-off between inflation and output. A recent literature on the interest

Corruption in the Context of Moral Trade-offs

by James Dungan , Adam Waytz , Liane Young , James Dungan , Boston College - Journal of Interdisciplinary Economics , 2014
"... Abstract Moral psychology has begun to characterize the circumstances that lead people to commit moral violations. However, the decision to engage in corrupt behavior may not always reflect a choice between right and wrong. Rather, the decision may represent a tradeoff between competing moral conce ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract Moral psychology has begun to characterize the circumstances that lead people to commit moral violations. However, the decision to engage in corrupt behavior may not always reflect a choice between right and wrong. Rather, the decision may represent a tradeoff between competing moral

Algorithms for scheduling imprecise computations

by Jane W. S. Liu, Kwei-jay Lin, Wei-kuan Shih, Albert Chuang-shi Yu - IEEE Computer , 1991
"... n a hard real-time cyctem, every time-T critical task must meet its timing con-1 straint, typically specified as its deadline. (A task is a granule of computa-tion treated by the scheduler as a unit of work to be allocated processor time, or scheduled.) If any time-critical task fails to complete an ..."
Abstract - Cited by 256 (17 self) - Add to MetaCart
: Frames of fuzzy images and rough estimates of location produced in time may be better than perfect images and accurate location data produced too late. In this article, we review workload mod-els that quantify the trade-off between re-sult quality andcomputation time. We also describe scheduling

Communication over fading channels with delay constraints

by Randall A. Berry, Robert G. Gallager - IEEE Transactions on Information Theory , 2002
"... We consider a user communicating over a fading channel with perfect channel state information. Data is assumed to arrive from some higher layer application and is stored in a buffer until it is transmitted. We study adapting the user's transmission rate and power based on the channel state info ..."
Abstract - Cited by 252 (7 self) - Add to MetaCart
to variable-length codewords. The trade-off between the average delay and the average transmission power required for reliable communication is analyzed. A dynamic programming formulation is given to find all Pareto optimal power/delay operating points. We then quantify the behavior of this tradeoff

SSN college of engineering

by R. Balasubramanian, Post Graduate Scholar
"... Lightweight cryptography is an interesting phenomenon that provides the perfect trade-off among security, higher throughput, low-power consumption, and compactness. Designing lightweight cryptography is a challenging issue. In this paper, Mixcolumn operation in the Advanced Encryption Standard (AES) ..."
Abstract - Add to MetaCart
Lightweight cryptography is an interesting phenomenon that provides the perfect trade-off among security, higher throughput, low-power consumption, and compactness. Designing lightweight cryptography is a challenging issue. In this paper, Mixcolumn operation in the Advanced Encryption Standard (AES

ªThe Breakup of Nations: A Political Economy Analysis,º ECARE Discussion paper

by Patrick Bolton, Geâ, Rard Roland , 1994
"... This paper develops a model of the breakup or uni®cation of nations. In each nation the decision to separate is taken by majority voting. A basic trade-off be-tween the ef®ciency gains of uni®cation and the costs in terms of loss of control on political decisions is highlighted. The model emphasizes ..."
Abstract - Cited by 224 (0 self) - Add to MetaCart
This paper develops a model of the breakup or uni®cation of nations. In each nation the decision to separate is taken by majority voting. A basic trade-off be-tween the ef®ciency gains of uni®cation and the costs in terms of loss of control on political decisions is highlighted. The model

The relay selection and transmission trade-off in cooperative communication systems

by V. Mehta, N. B. Yim - IEEE Trans. Wireless Commun , 2010
"... A common and practical paradigm in cooperative communication systems is the use of a dynamically selected best relay to decode and forward information from a source to a destination. Such systems use two phases a relay selection phase, in which the system uses transmission time and energy to select ..."
Abstract - Cited by 13 (7 self) - Add to MetaCart
the best relay, and a data transmission phase, in which it uses the spatial diversity benefits of selection to transmit data. In this paper, we derive closed-form expressions for the overall throughput and energy consumption, and study the time and energy trade-off between the selection and data
Next 10 →
Results 1 - 10 of 449
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University