Results 1 - 10
of
9,197
Learning by Doing and Learning from Others: Human Capital and Technical Change in Agriculture
- Journal of Political Economy
, 1995
"... University of PennsylvaniaHousehold-level panel data from a nationally representative sample of rural Indian households describing the adoption and profitability of high-yielding seed varieties (HYVs) associated with the Green Revolution are used to test the implications of a model incorporating lea ..."
Abstract
-
Cited by 414 (11 self)
- Add to MetaCart
University of PennsylvaniaHousehold-level panel data from a nationally representative sample of rural Indian households describing the adoption and profitability of high-yielding seed varieties (HYVs) associated with the Green Revolution are used to test the implications of a model incorporating
Editorial: Three types of interaction
- The American Journal of Distance Education
, 1992
"... Many of the greatest problems of communicating about concepts, and, therefore, practice in distance education arise from our use of crude hypothetical constructs-terms like distance, independence, and interaction, which are used in very imprecise and general ways, each having acquired a multiplicity ..."
Abstract
-
Cited by 405 (0 self)
- Add to MetaCart
and instructor, but by too few users in the more technical and specific meanings as discussed, for example, by Saba (1988), Keegan (1988), Shale (1988), or Moore (1984). Interaction is another important term that carries so many meanings as to be almost useless unless specific submeanings can be defined
DESIGN AND PERFORMANCE OF THE NEW SARTORIUS 1 KG VACUUM MASS COMPARATOR AT PTB
"... Abstract: A new type of a 1 kg vacuum mass comparator was developed in a collaboration between the Sartorius AG, the Technical University Ilmenau and the BIPM. The first comparator of this new type was installed at PTB. In this paper the set-up of the system and the local conditions are described. F ..."
Abstract
- Add to MetaCart
Abstract: A new type of a 1 kg vacuum mass comparator was developed in a collaboration between the Sartorius AG, the Technical University Ilmenau and the BIPM. The first comparator of this new type was installed at PTB. In this paper the set-up of the system and the local conditions are described
Logic Synthesis and Optimization Benchmarks User Guide Version 3.0
, 1991
"... This report is issued to provide documentation for the benchmark examples used in conjunction with the 1991 MCNC International Workshop on Logic Synthesis and the extention of the 1989 Logic Synthesis and Optimization Benchmarks User Guide. Its distribution is limited to peer communication and to pa ..."
Abstract
-
Cited by 331 (0 self)
- Add to MetaCart
and to participants of the workshop. This report contains material previously published and distributed by the University of California (Copyright 1979, 1980, 1983, 1986 Regents of the University of California) and Stanford University. For information about the ideas expressed herein, contact the author(s) directly
NetSolve: A Network Server for Solving Computational Science Problems
- The International Journal of Supercomputer Applications and High Performance Computing
, 1995
"... This paper presents a new system, called NetSolve, that allows users to access computational resources, such as hardware and software, distributed across the network. This project has been motivated by the need for an easy-to-use, efficient mechanism for using computational resources remotely. Ease ..."
Abstract
-
Cited by 304 (30 self)
- Add to MetaCart
on any heterogeneous network and is implemented as a fault-tolerant client-server application. Keywords Distributed System, Heterogeneity, Load Balancing, Client-Server, Fault Tolerance, Linear Algebra, Virtual Library. University of Tennessee - Technical report No cs-95-313 Department of Computer
Pseudorandom generators for space-bounded computation
- Combinatorica
, 1992
"... Pseudorandom generators are constructed which convert O(SlogR) truly random bits to R bits that appear random to any algorithm that runs in SPACE(S). In particular, any randomized polynomial time algorithm that runs in space S can be simulated using only O(Slogn) random bits. An application of these ..."
Abstract
-
Cited by 237 (10 self)
- Add to MetaCart
of these generators is an explicit construction of universal traversal sequences (for arbitrary graphs) of length n O(l~ The generators constructed are technically stronger than just appearing random to spacebounded machines, and have several other applications. In particular, applications are given for "
A System for Video Surveillance and Monitoring
, 2000
"... Under the three-year Video Surveillance and Monitoring (VSAM) project (1997--1999), the Robotics Institute at Carnegie Mellon University (CMU) and the Sarnoff Corporation developed a system for autonomous Video Surveillance and Monitoring. The technical approach uses multiple, cooperative video s ..."
Abstract
-
Cited by 232 (0 self)
- Add to MetaCart
Under the three-year Video Surveillance and Monitoring (VSAM) project (1997--1999), the Robotics Institute at Carnegie Mellon University (CMU) and the Sarnoff Corporation developed a system for autonomous Video Surveillance and Monitoring. The technical approach uses multiple, cooperative video
Theories of Abstraction
- Artificial Intelligence
, 1997
"... ion Fausto Giunchiglia, Adolfo Villafiorita, and Toby Walsh November 1997 Technical Report MRG/DIST # 97-0051 universit`a di genova facolt`a di ingegneria dipartimento informatica sistemistica telematica Theories of Abstraction F. Giunchiglia 1;2 A. Villafiorita 1 T. Walsh 3 faust ..."
Abstract
-
Cited by 212 (17 self)
- Add to MetaCart
ion Fausto Giunchiglia, Adolfo Villafiorita, and Toby Walsh November 1997 Technical Report MRG/DIST # 97-0051 universit`a di genova facolt`a di ingegneria dipartimento informatica sistemistica telematica Theories of Abstraction F. Giunchiglia 1;2 A. Villafiorita 1 T. Walsh 3
Continuous Time-Varying Scalar Systems - a Behavioural Approach
, 2000
"... We introduce a behavioural approach to linear time-varying systems p( d dt )w 1 = q( d dt )w 2 , where p(D); q(D) belong to M[D], i.e. the skew polynomial ring with real meromorphic coefficients M, indeterminate D, and multiplication rule Df = fD+ f . Willem's behavioural approach to tim ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
and autonomous behaviours are introduced and characterized. Institute of Mathematics, Technical University Ilmenau, Weimarer Strae 25, 98693 Ilmenau, FRG, ilchmann@mathematik.tu-ilmenau.de y Department of Electrical and Electronic Engineering, The University of Melbourne, Parkville, Victoria 3052, Australia
Trapdoors for Hard Lattices and New Cryptographic Constructions
, 2007
"... We show how to construct a variety of “trapdoor ” cryptographic tools assuming the worstcase hardness of standard lattice problems (such as approximating the shortest nonzero vector to within small factors). The applications include trapdoor functions with preimage sampling, simple and efficient “ha ..."
Abstract
-
Cited by 191 (26 self)
- Add to MetaCart
“hash-and-sign ” digital signature schemes, universally composable oblivious transfer, and identity-based encryption. A core technical component of our constructions is an efficient algorithm that, given a basis of an arbitrary lattice, samples lattice points from a Gaussian-like probability
Results 1 - 10
of
9,197