• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,846
Next 10 →

Axiomatic quantum field theory in curved spacetime

by Stefan Hollands, Robert M. Wald , 2008
"... The usual formulations of quantum field theory in Minkowski spacetime make crucial use of features—such as Poincare invariance and the existence of a preferred vacuum state—that are very special to Minkowski spacetime. In order to generalize the formulation of quantum field theory to arbitrary globa ..."
Abstract - Cited by 689 (18 self) - Add to MetaCart
The usual formulations of quantum field theory in Minkowski spacetime make crucial use of features—such as Poincare invariance and the existence of a preferred vacuum state—that are very special to Minkowski spacetime. In order to generalize the formulation of quantum field theory to arbitrary

MACROECONOMICS AND REALITY

by Christopher A. Sims - ECONOMETRICA , 1980
"... Existing strategies for econometric analysis related to macroeconomics are subject to a number of serious objections, some recently formulated, some old. These objections are summarized in this paper, and it is argued that taken together they make it unlikely that macroeconomic models are in fact ov ..."
Abstract - Cited by 805 (1 self) - Add to MetaCart
Existing strategies for econometric analysis related to macroeconomics are subject to a number of serious objections, some recently formulated, some old. These objections are summarized in this paper, and it is argued that taken together they make it unlikely that macroeconomic models are in fact

On the Security of Public Key Protocols

by Danny Dolev, Andrew C. Yao , 1983
"... Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however, that an impr ..."
Abstract - Cited by 1383 (0 self) - Add to MetaCart
Recently the use of public key encryption to provide secure network communication has received considerable attention. Such public key systems are usually effective against passive eavesdroppers, who merely tap the lines and try to decipher the message. It has been pointed out, however

Numerical integration of the Cartesian equations of motion of a system with constraints: molecular dynamics of n-alkanes

by Jean-paul Ryckaert, Giovanni Ciccotti, Herman J. C. Berendsen - J. Comput. Phys , 1977
"... A numerical algorithm integrating the 3N Cartesian equations of motion of a system of N points subject to holonomic constraints is formulated. The relations of constraint remain perfectly fulfilled at each step of the trajectory despite the approximate character of numerical integration. The method ..."
Abstract - Cited by 704 (6 self) - Add to MetaCart
A numerical algorithm integrating the 3N Cartesian equations of motion of a system of N points subject to holonomic constraints is formulated. The relations of constraint remain perfectly fulfilled at each step of the trajectory despite the approximate character of numerical integration. The method

Policy gradient methods for reinforcement learning with function approximation.

by Richard S Sutton , David Mcallester , Satinder Singh , Yishay Mansour - In NIPS, , 1999
"... Abstract Function approximation is essential to reinforcement learning, but the standard approach of approximating a value function and determining a policy from it has so far proven theoretically intractable. In this paper we explore an alternative approach in which the policy is explicitly repres ..."
Abstract - Cited by 439 (20 self) - Add to MetaCart
proportional to the gradient: where α is a positive-definite step size. If the above can be achieved, then θ can usually be assured to converge to a locally optimal policy in the performance measure ρ. Unlike the value-function approach, here small changes in θ can cause only small changes in the policy

Dynamic Queries for Information Exploration: An Implementation and Evaluation

by Christopher Ahlberg, Christopher Williamson, Ben Shneiderman , 1992
"... We designed, implemented and evaluated a new concept for direct manipulation of databases, called dynamic queries, that allows users to formulate queries with graphical widgets, such as sliders. By providing a graphical visualization of the database and search results, users can find trends and exce ..."
Abstract - Cited by 328 (22 self) - Add to MetaCart
We designed, implemented and evaluated a new concept for direct manipulation of databases, called dynamic queries, that allows users to formulate queries with graphical widgets, such as sliders. By providing a graphical visualization of the database and search results, users can find trends

Stochastic global optimization

by Anatoly Zhigljavsky , 2008
"... Stochastic global optimization methods are methods for solving a global optimization prob-lem incorporating probabilistic (stochastic) elements, either in the problem data (the objective function, the constraints, etc.), or in the algorithm itself, or in both. Global optimization is a very important ..."
Abstract - Cited by 289 (6 self) - Add to MetaCart
∗ where f ∗ = minx∈Xf(x). Global optimization problems are usually formulated so that the structure of the feasible region X is relatively simple; this

Chlorpyrifos hazards to fish, wildlife, and invertebrates: a synoptic review.

by Ronald Eisler - U.S. Fish and Wildlife Research Service. Biological Report , 1988
"... Abstract Paraquat (1,1' -dimethyl-4,4'-bipyridinium) and its dichloride salt (1,1', dimethyl-4, 4'-bipyridinium dichloride) are broad-spectrum contact plant killers and herbage desiccants that were introduced commercially during the past 25 years. Today, they rank among the most ..."
Abstract - Cited by 279 (1 self) - Add to MetaCart
the most widely used herbicides globally and are frequently used in combination with other herbicides. The recommended paraquat field application rates for terrestrial weed control usually range between 0.28 and 1.12 kg/ha (0.25 and 1.0 lb/acre), and for aquatic weed control the range is 0.1 -2.0 mg

Quality Driven Web Services Composition

by Liangzhao Zeng, Jayant Kalagnanam, et al. , 2003
"... The process-driven composition of Web services is emerging as a promising approach to integrate business applications within and across organizational boundaries. In this approach, individual Web services are federated into composite Web services whose business logic is expressed as a process model. ..."
Abstract - Cited by 230 (7 self) - Add to MetaCart
. The tasks of this process model are essentially invocations to functionalities offered by the underlying component services. Usually, several component services are able to execute a given task, although with different levels of pricing and quality. In this paper, we advocate that the selection of component

Bayesian inference on phylogeny and its impact on evolutionary biology.

by John P Huelsenbeck , Fredrik Ronquist , Rasmus Nielsen , Jonathan P Bollback - Science , 2001
"... 1 As a discipline, phylogenetics is becoming transformed by a flood of molecular data. These data allow broad questions to be asked about the history of life, but also present difficult statistical and computational problems. Bayesian inference of phylogeny brings a new perspective to a number of o ..."
Abstract - Cited by 235 (10 self) - Add to MetaCart
). Usually all trees are considered a priori equally probable, and the likelihood is calculated under one of a number of standard Markov models of character evolution. The posterior probability, although easy to formulate, involves a summation over all trees and, for each tree, integration over all possible
Next 10 →
Results 1 - 10 of 4,846
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University