• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 444
Next 10 →

Materials for an exploratory theory of the network society.

by Manuel Castells , Anthony Giddens , Alain Touraine , Anthony Smith , Benjamin Barber , Peter Hall , Roger-Pol Droit , Sophie Watson , Frank Webster , Krishan Kumar , David Lyon , Craig Calhoun , Jeffrey Henderson , Ramon Ramos , Jose E Rodrigues-Ibanez , Jose F Tezanos , Mary Kaldor , Stephen Jones , Christopher Freeman - The British Journal of Sociology , 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract - Cited by 122 (0 self) - Add to MetaCart
the construction of an analytical framework that could inform, and better organize, further research. However, given the dif culty of the task, and the necessarily collective character of this endeavour, what is presented here should be considered, literally, as materials to be used in the building of a

KeySlinger and StarSlinger: Secure Key Exchange and Encrypted File Transfer

by On Smartphones, Jason Lee , 2011
"... necessarily representing the official policies or endorsements, either express or implied, of ARO, ..."
Abstract - Add to MetaCart
necessarily representing the official policies or endorsements, either express or implied, of ARO,

An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes

by Pierre-louis Cayrel, Sidi Mohamed, El Yousfi Alaoui, Gerhrad Hoffmann, Pascal Véron
"... Abstract. The concept of threshold ring signature in code-based cryptography was introduced by Aguilar et al. in [1]. Their proposal uses Stern’s identification scheme as basis. In this paper we construct a novel threshold ring signature scheme built on the q-SD identification scheme recently propos ..."
Abstract - Add to MetaCart
proposed by Cayrel et al. in [14]. Our proposed scheme benefits of a performance gain as a result of the reduction in the soundness error from 2/3 for Stern’s scheme to 1/2 per round for the q-SD scheme. Our threshold ring signature scheme uses random linear codes over the field Fq, secure in the random

under a Creative Commons Attribution Non-Commercial No Derivatives

by Sira Gonzalez, Deparment Of Electrical, Electronic Engineering , 2013
"... the condition that they attribute it, that they do not use it for commercial purposes and that they do not alter, transform or build upon it. For any reuse or redistribution, researchers must make clear to others the licence terms of this work. ..."
Abstract - Add to MetaCart
the condition that they attribute it, that they do not use it for commercial purposes and that they do not alter, transform or build upon it. For any reuse or redistribution, researchers must make clear to others the licence terms of this work.

Phase behaviour of the restricted

by Primitive Model , 2003
"... The phase behaviour of the restricted primitive model (RPM) is studied us-ing a microscopic approach recently developed for the description of phase transitions in binary uid mixtures. For the model we obtain the explicit ex-pression for the functional of the grand partition function. Based on the f ..."
Abstract - Add to MetaCart
The phase behaviour of the restricted primitive model (RPM) is studied us-ing a microscopic approach recently developed for the description of phase transitions in binary uid mixtures. For the model we obtain the explicit ex-pression for the functional of the grand partition function. Based

CORRECTING FOR PRECIPITATION EFFECTS IN SATELLITE-BASED PASSIVE MICROWAVE TROPICAL CYCLONE INTENSITY ESTIMATES

by Capt Wacker Robert S, Robert S. Wacker , 2005
"... Public reporting burden for this collection of Information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments ..."
Abstract - Add to MetaCart
Public reporting burden for this collection of Information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this

Abstract Multichannel Communication in Contiki's Low-power IPv6 Stack

by Ipv Stack, Beshr Al Nahas, Beshr Al Nahas
"... Vast majority of wireless appliances used in household, industry and medical field share the ISM frequency band. These devices need to coexist and thus are challenged to tolerate their mutual interference. One way of dealing with this is by using frequency hopping; where the device changes its radio ..."
Abstract - Add to MetaCart
is used. We introduce a low-power pseudo-random frequency-hopping MAC protocol which is specifically characterized as a duty cycled asynchronous sender-initiated LPL style protocol. We illustrate two flavors of the protocol; one that does not use any dedicated channel and another which allows dedicated

1On the Identifiability of Overcomplete Dictionaries via the Minimisation Principle Underlying K-SVD

by Karin Schnass , 2013
"... This article gives theoretical insights into the performance of K-SVD, a dictionary learning algorithm that has gained significant popularity in practical applications. The particular question studied here is when a dictionary Φ ∈ Rd×K can be recovered as local minimum of the minimisation criterion ..."
Abstract - Add to MetaCart
underlying K-SVD from a set of N training signals yn = Φxn. A theoretical analysis of the problem leads to two types of identifiability results assuming the training signals are generated from a tight frame with coefficients drawn from a random symmetric distribution. First asymptotic results showing

Unsupervised statistical learning underpins computational, behavioural, and neural manifestations of musical expectation.

by Marcus T Pearce , Herrojo Ruiz , Selina Kapasi , Geraint A Wiggins , Joydeep Bhattacharya - NeuroImage, , 2010
"... The ability to anticipate forthcoming events has clear evolutionary advantages, and predictive successes or failures often entail significant psychological and physiological consequences. In music perception, the confirmation and violation of expectations are critical to the communication of emotio ..."
Abstract - Cited by 24 (6 self) - Add to MetaCart
(Fp1, Fp2, F7, F3, Fz, F4, F8, FC3, FCz, FC4, C5, C3, Cz, C4, C6, CP5, CP3, CPz, CP4, CP6, P7, P3, Pz, P4, P8, O1, Oz, O2) We used the EEGLAB Matlab® Toolbox (Delorme and Makeig, 2004) for visualization and filtering purposes. A high-pass filter at 0.5 Hz was applied to remove linear trends and a

unknown title

by Supervisor Dr, G. Vuuren, Co-supervisor Prof, P. Styger , 2011
"... Risk-based capital measures for operational risk management ..."
Abstract - Add to MetaCart
Risk-based capital measures for operational risk management
Next 10 →
Results 1 - 10 of 444
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University