• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 18,677
Next 10 →

On Codes That Avoid Specified Differences

by Bruce E. Moision, Alon Orlitsky, Paul H. Siegel - IEEE Transactions on Information Theory , 2001
"... Certain magnetic recording applications call for a large number of sequences whose differences do not include certain disallowed binary patterns. We show that the number of such sequences increases exponentially with their length and that the exponent, or capacity, is the logarithm of the joint spec ..."
Abstract - Cited by 32 (2 self) - Add to MetaCart
Certain magnetic recording applications call for a large number of sequences whose differences do not include certain disallowed binary patterns. We show that the number of such sequences increases exponentially with their length and that the exponent, or capacity, is the logarithm of the joint

Fitting a mixture model by expectation maximization to discover motifs in biopolymers.

by Timothy L Bailey , Charles Elkan - Proc Int Conf Intell Syst Mol Biol , 1994
"... Abstract The algorithm described in this paper discovers one or more motifs in a collection of DNA or protein sequences by using the technique of expect~tiou ma.,dmization to fit a two-component finite mixture model to the set of sequences. Multiple motifs are found by fitting a mixture model to th ..."
Abstract - Cited by 947 (5 self) - Add to MetaCart
to the data, probabilistically erasing tile occurrences of the motif thus found, and repeating the process to find successive motifs. The algorithm requires only a set of unaligned sequences and a number specifying the width of the motifs as input. It returns a model of each motif and a threshold which

A method for obtaining digital signatures and public-key cryptosystems.

by R L Rivest , A Shamir , L Adleman - Communications of the ACM, , 1978
"... Abstract An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key. This has two important consequences: 1. Couriers or other secure means are not needed to transmit keys, since a message can be encip ..."
Abstract - Cited by 3894 (24 self) - Add to MetaCart
to a publicly specified power e, and then taking the remainder when the result is divided by the publicly specified product, n, of two large secret prime numbers p and q. Decryption is similar; only a different, secret, power d is used, where e · d ≡ 1 (mod (p − 1) · (q − 1)). The security

The “What” and “Why” of Goal Pursuits: Human Needs and the Self-Determination of Behavior

by Edward L. Deci, Richard M. Ryan , 2000
"... Self-determination theory (SDT) maintains that an understanding of human motiva-tion requires a consideration of innate psychological needs for competence, auton-omy, and relatedness. We discuss the SDT concept of needs as it relates to previous need theories, emphasizing that needs specify the nece ..."
Abstract - Cited by 1105 (36 self) - Add to MetaCart
Self-determination theory (SDT) maintains that an understanding of human motiva-tion requires a consideration of innate psychological needs for competence, auton-omy, and relatedness. We discuss the SDT concept of needs as it relates to previous need theories, emphasizing that needs specify

Generative communication in Linda

by David Gelernter - ACM Transactions on Programming Languages and Systems , 1985
"... Generative communication is the basis of a new distributed programming langauge that is intended for systems programming in distributed settings generally and on integrated network computers in particular. It differs from previous interprocess communication models in specifying that messages be adde ..."
Abstract - Cited by 1194 (2 self) - Add to MetaCart
Generative communication is the basis of a new distributed programming langauge that is intended for systems programming in distributed settings generally and on integrated network computers in particular. It differs from previous interprocess communication models in specifying that messages

Static Scheduling of Synchronous Data Flow Programs for Digital Signal Processing

by Edward Ashford Lee, David G. Messerschmitt - IEEE TRANSACTIONS ON COMPUTERS , 1987
"... Large grain data flow (LGDF) programming is natural and convenient for describing digital signal processing (DSP) systems, but its runtime overhead is costly in real time or cost-sensitive applications. In some situations, designers are not willing to squander computing resources for the sake of pro ..."
Abstract - Cited by 598 (37 self) - Add to MetaCart
flow (SDF) differs from traditional data flow in that the amount of data produced and consumed by a data flow node is specified a priori for each input and output. This is equivalent to specifying the relative sample rates in signal processing system. This means that the scheduling of SDF nodes need

Mega: molecular evolutionary genetic analysis software for microcomputers

by Sudhir Kumar, Koichiro Tamura, Masatoshi Nei - CABIOS , 1994
"... A computer program package called MEGA has been developed for estimating evolutionary distances, reconstructing phylogenetic trees and computing basic statistical quantities from molecular data. It is written in C+ + and is intended to be used on IBM and IBM-compatible personal computers. In this pr ..."
Abstract - Cited by 505 (10 self) - Add to MetaCart
. In this program, various methods for estimating evolutionary distances from nucleotide and amino acid sequence data, three different methods of phylogenetic inference (UPGMA, neighbor-joining and maximum parsimony) and two statistical tests of topological differences are included. For the maximum parsimony method

A social-cognitive approach to motivation and personality

by Carol S. Dweck, Ellen L. Leggett - Psychological Review , 1988
"... Past work has documented and described major patterns of adaptive and maladaptive behavior: the mastery-oriented and the helpless patterns. In this article, we present a research-based model that accounts for these patterns in terms of underlying psychological processes. The model specifies how indi ..."
Abstract - Cited by 964 (20 self) - Add to MetaCart
Past work has documented and described major patterns of adaptive and maladaptive behavior: the mastery-oriented and the helpless patterns. In this article, we present a research-based model that accounts for these patterns in terms of underlying psychological processes. The model specifies how

The JPEG still picture compression standard

by Gregory K. Wallace - Communications of the ACM , 1991
"... This paper is a revised version of an article by the same title and author which appeared in the April 1991 issue of Communications of the ACM. For the past few years, a joint ISO/CCITT committee known as JPEG (Joint Photographic Experts Group) has been working to establish the first international c ..."
Abstract - Cited by 1138 (0 self) - Add to MetaCart
compression standard for continuous-tone still images, both grayscale and color. JPEG’s proposed standard aims to be generic, to support a wide variety of applications for continuous-tone images. To meet the differing needs of many applications, the JPEG standard includes two basic compression methods, each

Image Inpainting

by Marcelo Bertalmio, Guillermo Sapiro , 2000
"... Inpainting, the technique of modifying an image in an undetectable form, is as ancient as art itself. The goals and applications of inpainting are numerous, from the restoration of damaged paintings and photographs to the removal/replacement of selected objects. In this paper, we introduce a novel a ..."
Abstract - Cited by 531 (25 self) - Add to MetaCart
that isophote lines arriving at the regions ’ boundaries are completed inside. In contrast with previous approaches, the technique here introduced does not require the user to specify where the novel information comes from. This is automatically done (and in a fast way), thereby allowing to simultaneously fill
Next 10 →
Results 1 - 10 of 18,677
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University