• Documents
  • Authors
  • Tables

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,953
Next 10 →

Anti-de Sitter Space, Thermal Phase Transition, and Confinement in Gauge Theories

by Edward Witten - Adv. Theor. Math. Phys , 1998
"... The correspondence between supergravity (and string theory) on AdS space and boundary conformal field theory relates the thermodynamics of N = 4 super Yang-Mills theory in four dimensions to the thermodynamics of Schwarzschild black holes in Anti-de Sitter space. In this description, quantum phenome ..."
Abstract - Cited by 1083 (3 self) - Add to MetaCart
The correspondence between supergravity (and string theory) on AdS space and boundary conformal field theory relates the thermodynamics of N = 4 super Yang-Mills theory in four dimensions to the thermodynamics of Schwarzschild black holes in Anti-de Sitter space. In this description, quantum

Mining Frequent Patterns without Candidate Generation: A Frequent-Pattern Tree Approach

by Jiawei Han, Jian Pei, Yiwen Yin, Runying Mao - DATA MINING AND KNOWLEDGE DISCOVERY , 2004
"... Mining frequent patterns in transaction databases, time-series databases, and many other kinds of databases has been studied popularly in data mining research. Most of the previous studies adopt an Apriori-like candidate set generation-and-test approach. However, candidate set generation is still co ..."
Abstract - Cited by 1752 (64 self) - Add to MetaCart
FP-tree-based mining adopts a pattern-fragment growth method to avoid the costly generation of a large number of candidate sets, and (3) a partitioning-based, divide-and-conquer method is used to decompose the mining task into a set of smaller tasks for mining confined patterns in conditional

Diffusion kernels on graphs and other discrete input spaces

by Risi Imre Kondor, John Lafferty - in: Proceedings of the 19th International Conference on Machine Learning , 2002
"... The application of kernel-based learning algorithms has, so far, largely been confined to realvalued data and a few special data types, such as strings. In this paper we propose a general method of constructing natural families of kernels over discrete structures, based on the matrix exponentiation ..."
Abstract - Cited by 223 (5 self) - Add to MetaCart
The application of kernel-based learning algorithms has, so far, largely been confined to realvalued data and a few special data types, such as strings. In this paper we propose a general method of constructing natural families of kernels over discrete structures, based on the matrix exponentiation

Confined Space

by unknown authors , 1999
"... control of entry into confined spaces and hazardous spaces; safe systems of work inside confined spaces and hazardous spaces; and awareness and compliance with legal obligations with respect to confined spaces and hazardous spaces. 1.2 SCOPE This procedure applies to all staff, contractors and st ..."
Abstract - Add to MetaCart
control of entry into confined spaces and hazardous spaces; safe systems of work inside confined spaces and hazardous spaces; and awareness and compliance with legal obligations with respect to confined spaces and hazardous spaces. 1.2 SCOPE This procedure applies to all staff, contractors

Diffusion kernels on graphs and other discrete structures

by Risi Imre Kondor, John Lafferty - In Proceedings of the ICML , 2002
"... The application of kernel-based learning algorithms has, so far, largely been confined to realvalued data and a few special data types, such as strings. In this paper we propose a general method of constructing natural families of kernels over discrete structures, based on the matrix exponentiation ..."
Abstract - Cited by 176 (4 self) - Add to MetaCart
The application of kernel-based learning algorithms has, so far, largely been confined to realvalued data and a few special data types, such as strings. In this paper we propose a general method of constructing natural families of kernels over discrete structures, based on the matrix exponentiation

Coverage in Wireless Ad-hoc Sensor Networks

by Xiang-Yang Li, Peng-Jun Wan, Ophir Frieder , 2002
"... Sensor networks pose a number of challenging conceptual and optimization problems such as location, deployment, and tracking [1]. One of the fundamental problems in sensor networks is the calculation of the coverage. In [1], it is assumed that the sensor has the uniform sensing ability. In this pape ..."
Abstract - Cited by 162 (11 self) - Add to MetaCart
. Moreover, we show that the search space of the best coverage problem can be confined to the relative neighborhood graph, which can be constructed locally.

Confined Space Entry

by unknown authors
"... This chapter has been developed for confined space entry using the referenced WAC chapters as guidance. All confined space entries shall comply with this document to ensure the safety of personnel entering confined spaces on all WSDOT work sites. Contractors or subcontractors entering confined space ..."
Abstract - Add to MetaCart
This chapter has been developed for confined space entry using the referenced WAC chapters as guidance. All confined space entries shall comply with this document to ensure the safety of personnel entering confined spaces on all WSDOT work sites. Contractors or subcontractors entering confined

WATER COMPRESSIBILITY IN CONFINED SPACES

by A Amararene , M Gindre , J Y Le Huemu , C Nicot , W Urbach , M Waks
"... Abstract -In order to explore the compressibility of molecular films (reverse micelles), we custom-built a water sequestered in droplets surrounded by surfactant high-precision velocimeter. The apparatus comprises two ultrasonic small-sized cells, electronic generators and a computer-controlled dig ..."
Abstract - Add to MetaCart
Abstract -In order to explore the compressibility of molecular films (reverse micelles), we custom-built a water sequestered in droplets surrounded by surfactant high-precision velocimeter. The apparatus comprises two ultrasonic small-sized cells, electronic generators and a computer-controlled digital scope. We carried out a systematic study of the stability and reproducibility of the experimental set-up which yields an accuracy of The ultrasound velocity, the apparent volume, and compressibility of encapsulated water were determined in charged and uncharged molecular films as a function of between the measured parameters of encapsulated water, water concentration. We observed a close relationship the chemical nature of the surfactant molecular film and the number of water molec.ules in interaction. The values obtained are higher than that reported for bulk water and are assigned to the surfactant-water interactions arising between the head groups and water molecules.

Semiflexible Chains in Confined Spaces

by Greg Morrison, D. Thirumalai , 808
"... We develop an analytical method for studying the properties of a non-interacting Wormlike Chain (WLC) in confined geometries. The mean field-like theory replaces the rigid constraints of confinement with average constraints, thus allowing us to develop a tractable method for treating a WLC wrapped o ..."
Abstract - Add to MetaCart
We develop an analytical method for studying the properties of a non-interacting Wormlike Chain (WLC) in confined geometries. The mean field-like theory replaces the rigid constraints of confinement with average constraints, thus allowing us to develop a tractable method for treating a WLC wrapped

• Asbestos • Confined Spaces • Guarding

by Greg Stagbouer, Kevin Wolfe, Richard Kern , 2014
"... 4. Legislation section numbering – Model vs. consecutive Lew Pritchard ..."
Abstract - Add to MetaCart
4. Legislation section numbering – Model vs. consecutive Lew Pritchard
Next 10 →
Results 1 - 10 of 2,953
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University