• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 249,625
Next 10 →

RECENT RESEARCH ACTIVITIES RELATED TO THE PROPOSAL Recent Contributions

by Lev V. Idels , 2008
"... Summary. We examine the economical and biological effects of protected patches and harvesting on resource populations. Marine Protected Area (MPA) design is a joint economic and biological problem, and MPA creation alters economic incentives. The purpose of the proposed research is to consider a new ..."
Abstract - Add to MetaCart
Summary. We examine the economical and biological effects of protected patches and harvesting on resource populations. Marine Protected Area (MPA) design is a joint economic and biological problem, and MPA creation alters economic incentives. The purpose of the proposed research is to consider a

Adverse Rotorcraft-Pilot Coupling: Recent Research Activities

by Oliver Dieterich, Joachim Götz, Binh Dang Vu, Eurocopter Deutschland, Gmbh Dlr Onera, Henk Haverdings, Pierangelo Masarati, Marilena Pavel, Michael Jump, Massimo Gennaretti - in Europe”, 34th European Rotorcraft Forum, September16-19, 2008
"... Abstract: Unintended and unexpected oscillations or divergences of the pilot-rotorcraft system have become a critical issue for augmented helicopters with modern flight control systems. The rapid advances in the field of high response actuation and highly augmented flight control systems have increa ..."
Abstract - Cited by 8 (7 self) - Add to MetaCart
feedback loop: pilot – control system – rotorcraft. Based on numerous flight events in the past, several types of RPCs have been observed differing in their frequency content as well as in the underlying physics and human behaviour. In Europe, research activities were launched in 2005 under the umbrella

RECENT RESEARCH ACTIVITIES IN VIDEOSURVEILLANCE AT UNIFI::MICC

by Lamberto Ballan, Marco Bertini, Alberto Del Bimbo, Fabrizio Dini, Lorenzo Seidenari
"... 1. Real time face tracking and validation for visual logging Recently, image quality validation has been largely investigated to increase recognition rates and to support decisions of authentication systems. This may be useful to alarm a video surveillance application for a particular intrusion even ..."
Abstract - Add to MetaCart
1. Real time face tracking and validation for visual logging Recently, image quality validation has been largely investigated to increase recognition rates and to support decisions of authentication systems. This may be useful to alarm a video surveillance application for a particular intrusion

A Measurement Study of Peer-to-Peer File Sharing Systems

by Stefan Saroiu , P. Krishna Gummadi, Steven D. Gribble , 2002
"... The popularity of peer-to-peer multimedia file sharing applications such as Gnutella and Napster has created a flurry of recent research activity into peer-to-peer architectures. We believe that the proper evaluation of a peer-to-peer system must take into account the characteristics of the peers th ..."
Abstract - Cited by 1254 (15 self) - Add to MetaCart
The popularity of peer-to-peer multimedia file sharing applications such as Gnutella and Napster has created a flurry of recent research activity into peer-to-peer architectures. We believe that the proper evaluation of a peer-to-peer system must take into account the characteristics of the peers

Dropout from higher education: A theoretical synthesis of recent research

by Vincent Tinto - Review of Educational Research , 1975
"... Despite the very extensive literature on dropout from higher education, much remains unknown about the nature of the dropout process. In large measure, the failure of past research to delineate more clearly the multiple characteristics of dropout can be traced to two major shortcomings; namely, inad ..."
Abstract - Cited by 798 (2 self) - Add to MetaCart
Despite the very extensive literature on dropout from higher education, much remains unknown about the nature of the dropout process. In large measure, the failure of past research to delineate more clearly the multiple characteristics of dropout can be traced to two major shortcomings; namely

A Survey of active network Research

by David L. Tennenhouse, Jonathan M. Smith - IEEE Communications , 1997
"... Active networks are a novel approach to network architecture in which the switches of the network perform customized computations on the messages flowing through them. This approach is motivated by both lead user applications, which perform user-driven computation at nodes within the network today, ..."
Abstract - Cited by 549 (29 self) - Add to MetaCart
, and the emergence of mobile code technologies that make dynamic network service innovation attainable. In this paper, we discuss two approaches to the realization of active networks and provide a snapshot of the current research issues and activities. Introduction – What Are Active Networks? In an active network

The Skill Content of Recent Technological Change: An Empirical Exploration

by David H. Autor, Frank Levy, Richard J. Murnane , 2000
"... Recent empirical and case study evidence documents a strong association between the adoption of computers and increased use of college educated or non-production workers. With few exceptions, the conceptual link explaining how computer technology complements skilled labor or substitutes for unskille ..."
Abstract - Cited by 643 (28 self) - Add to MetaCart
Recent empirical and case study evidence documents a strong association between the adoption of computers and increased use of college educated or non-production workers. With few exceptions, the conceptual link explaining how computer technology complements skilled labor or substitutes

A New Location Technique for the Active Office

by Andy Ward, Alan Jones , 1997
"... Configuration of the computing and communications systems found at home and in the workplace is a complex task that currently requires the attention of the user. Recently, researchers have begun to examine computers that would autonomously change their functionality based on observations of who or ..."
Abstract - Cited by 515 (4 self) - Add to MetaCart
Configuration of the computing and communications systems found at home and in the workplace is a complex task that currently requires the attention of the user. Recently, researchers have begun to examine computers that would autonomously change their functionality based on observations of who

A Roadmap of Agent Research and Development

by Nicholas R. Jennings, Katia Sycara, Michael Wooldridge - INT JOURNAL OF AUTONOMOUS AGENTS AND MULTI-AGENT SYSTEMS , 1998
"... This paper provides an overview of research and development activities in the field of autonomous agents and multi-agent systems. It aims to identify key concepts and applications, and to indicate how they relate to one-another. Some historical context to the field of agent-based computing is give ..."
Abstract - Cited by 511 (8 self) - Add to MetaCart
This paper provides an overview of research and development activities in the field of autonomous agents and multi-agent systems. It aims to identify key concepts and applications, and to indicate how they relate to one-another. Some historical context to the field of agent-based computing

Towards an Active Network Architecture

by David L. Tennenhouse, David J. Wetherall - Computer Communication Review , 1996
"... Active networks allow their users to inject customized programs into the nodes of the network. An extreme case, in which we are most interested, replaces packets with "capsules" -- program fragments that are executed at each network router/switch they traverse. Active architectures permit ..."
Abstract - Cited by 497 (7 self) - Add to MetaCart
Active networks allow their users to inject customized programs into the nodes of the network. An extreme case, in which we are most interested, replaces packets with "capsules" -- program fragments that are executed at each network router/switch they traverse. Active architectures permit
Next 10 →
Results 1 - 10 of 249,625
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University