• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 128,108
Next 10 →

The mathematics of infectious diseases

by Herbert W. Hethcote - SIAM Review , 2000
"... Abstract. Many models for the spread of infectious diseases in populations have been analyzed mathematically and applied to specific diseases. Threshold theorems involving the basic reproduction number R0, the contact number σ, and the replacement number R are reviewed for the classic SIR epidemic a ..."
Abstract - Cited by 490 (4 self) - Add to MetaCart
and endemic models. Similar results with new expressions for R0 are obtained for MSEIR and SEIR endemic models with either continuous age or age groups. Values of R0 and σ are estimated for various diseases including measles in Niger and pertussis in the United States. Previous models with age structure

Term Rewriting Systems

by J. W. Klop , 1992
"... Term Rewriting Systems play an important role in various areas, such as abstract data type specifications, implementations of functional programming languages and automated deduction. In this chapter we introduce several of the basic comcepts and facts for TRS's. Specifically, we discuss Abstra ..."
Abstract - Cited by 610 (18 self) - Add to MetaCart
Term Rewriting Systems play an important role in various areas, such as abstract data type specifications, implementations of functional programming languages and automated deduction. In this chapter we introduce several of the basic comcepts and facts for TRS's. Specifically, we discuss

An ecological perspective on health promotion programs

by Kenneth R. Mcleroy, Daniel Bibeau Phd, Allan Steckler Drph, Karen Glanz, Kenneth R. Mcleroy, Daniel Bibeau, Department Public Health - Health Education Quarterly , 1988
"... During the past 20 years there has been a dramatic increase in societal interest in preventing disability and death in the United States by changing individual behaviors linked to the risk of contracting chronic diseases. This renewed interest in health pro-motion and disease prevention has not been ..."
Abstract - Cited by 499 (2 self) - Add to MetaCart
not been without its critics. Some critics have accused proponents of life-style interventions of promoting a victim-blaming ideology by neglecting the importance of social influences on health and disease. This article proposes an ecological model for health promotion which focuses atten-tion on both

Games with Incomplete Information Played by 'Bayesian' Players, I-III

by John C Harsanyi - MANAGEMENT SCIENCE , 1967
"... The paper develops a new theory for the analysis of games with incomplete information where the players are uncertain about some important parameters of the game situation, such as the payoff functions, the strategies available to various players, the information other players have about the game, e ..."
Abstract - Cited by 787 (2 self) - Add to MetaCart
The paper develops a new theory for the analysis of games with incomplete information where the players are uncertain about some important parameters of the game situation, such as the payoff functions, the strategies available to various players, the information other players have about the game

Theory of Elasticity,

by S P Timoshenko , J N Goodier , 1951
"... ABSTRACT The knowledge of the in-situ stress field in rock masses is in general of crucial importance in various areas of geo-engineering, such as mining or civil underground excavations, hydrocarbon extraction, CO2 storage, hydraulic fracture operations, etc. In the context of the Finite Element ..."
Abstract - Cited by 710 (1 self) - Add to MetaCart
ABSTRACT The knowledge of the in-situ stress field in rock masses is in general of crucial importance in various areas of geo-engineering, such as mining or civil underground excavations, hydrocarbon extraction, CO2 storage, hydraulic fracture operations, etc. In the context of the Finite Element

Statistical pattern recognition: A review

by Anil K. Jain, Robert P. W. Duin, Jianchang Mao - IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE , 2000
"... The primary goal of pattern recognition is supervised or unsupervised classification. Among the various frameworks in which pattern recognition has been traditionally formulated, the statistical approach has been most intensively studied and used in practice. More recently, neural network techniques ..."
Abstract - Cited by 1035 (30 self) - Add to MetaCart
The primary goal of pattern recognition is supervised or unsupervised classification. Among the various frameworks in which pattern recognition has been traditionally formulated, the statistical approach has been most intensively studied and used in practice. More recently, neural network

A Survey of Computer Vision-Based Human Motion Capture

by Thomas B. Moeslund, Erik Granum - Computer Vision and Image Understanding , 2001
"... A comprehensive survey of computer vision-based human motion capture literature from the past two decades is presented. The focus is on a general overview based on a taxonomy of system functionalities, broken down into four processes: initialization, tracking, pose estimation, and recognition. Each ..."
Abstract - Cited by 515 (14 self) - Add to MetaCart
process is discussed and divided into subprocesses and/or categories of methods to provide a reference to describe and compare the more than 130 publications covered by the survey. References are included throughout the paper to exemplify important issues and their relations to the various methods. A

A Survey of Program Slicing Techniques

by F. Tip - JOURNAL OF PROGRAMMING LANGUAGES , 1995
"... A program slice consists of the parts of a program that (potentially) affect the values computed at some point of interest, referred to as a slicing criterion. The task of computing program slices is called program slicing. The original definition of a program slice was presented by Weiser in 197 ..."
Abstract - Cited by 790 (10 self) - Add to MetaCart
in 1979. Since then, various slightly different notions of program slices have been proposed, as well as a number of methods to compute them. An important distinction is that between a static and a dynamic slice. The former notion is computed without making assumptions regarding a program's input

Data Mining: An Overview from Database Perspective

by Ming-syan Chen, Jiawei Hun, Philip S. Yu - IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING , 1996
"... Mining information and knowledge from large databases has been recognized by many researchers as a key research topic in database systems and machine learning, and by many industrial companies as an important area with an opportunity of major revenues. Researchers in many different fields have sh ..."
Abstract - Cited by 532 (26 self) - Add to MetaCart
Mining information and knowledge from large databases has been recognized by many researchers as a key research topic in database systems and machine learning, and by many industrial companies as an important area with an opportunity of major revenues. Researchers in many different fields have

Service Disciplines for Guaranteed Performance Service in Packet-Switching Networks

by Hui Zhang - Proceedings of the IEEE , 1995
"... While today’s computer networks support only best-effort service, future packet-switching integrated-services networks will have to support real-time communication services that allow clients to transport information with performance guarantees expressed in terms of delay, delay jitter, throughput, ..."
Abstract - Cited by 609 (4 self) - Add to MetaCart
, and loss rate. An important issue in providing guaranteed performance service is the choice of the packet service discipline at switching nodes. In this paper, we survey several service disciplines that are proposed in the literature to provide per-connection end-to-end peqormance guarantees in packet
Next 10 →
Results 1 - 10 of 128,108
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University