• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 10,458
Next 10 →

Trace Scheduling: A Technique for Global Microcode Compaction

by Joseph A. Fisher - IEEE TRANSACTIONS ON COMPUTERS , 1981
"... Microcode compaction is the conversion of sequential microcode into efficient parallel (horizontal) microcode. Local com-paction techniques are those whose domain is basic blocks of code, while global methods attack code with a general flow control. Compilation of high-level microcode languages int ..."
Abstract - Cited by 683 (5 self) - Add to MetaCart
Microcode compaction is the conversion of sequential microcode into efficient parallel (horizontal) microcode. Local com-paction techniques are those whose domain is basic blocks of code, while global methods attack code with a general flow control. Compilation of high-level microcode languages

Stable isotope labeling by amino acids in cell culture, SILAC, as a simple and accurate approach to expression proteomics

by Shao-en Ong, Blagoy Blagoev, Irina Kratchmarova, Dan Bach Kristensen, Akhilesh P, Matthias Mann - Mol. Cell. Proteomics , 2002
"... The abbreviations used are: SILAC: Stable isotope labeling by amino acids in cell culture, 2DE: two dimensional (isoelectric focusing/SDS-PAGE) gel electrophoresis: ICATTM: isotope-coded affinity tag; MS: mass spectrometry; MALDI-TOF: matrix assisted laser desorption ionization-time of flight; PMF: ..."
Abstract - Cited by 595 (23 self) - Add to MetaCart
. Mammalian cell lines are grown in media lacking a standard essential amino acid but supplemented with a non-radioactive, isotopically labeled form of that amino acid, in this case deuterated leucine (Leu-d3). We find that growth of cells maintained in these media is no different from growth in normal media

Understanding Line Drawings of Scenes with Shadows

by David Waltz - The Psychology of Computer Vision , 1975
"... this paper, how can we recognize the identity of Figs. 2.1 and 2.2? Do we use' learning and knowledge to interpret what we see, or do we somehow automatically see the world as stable and independent bf lighting? What portions of scenes can we understand from local features alone, and what confi ..."
Abstract - Cited by 436 (0 self) - Add to MetaCart
shadow lines and regions, groups regions which belong to the same object, and notices such relations as contact or lack of contact between the objects, support and in-front-of/behind relations between the objects as well as information about the spatial orientation of various regions, all using

Intrusion Detection in Wireless Ad-Hoc Networks

by Yongguang Zhang, Wenke Lee , 2000
"... As the recent denial-of-service attacks on several major Internet sites have shown us, no open computer network is immune from intrusions. The wireless ad-hoc network is particularly vulnerable due to its features of open medium, dynamic changing topology, cooperative algorithms, lack of centralized ..."
Abstract - Cited by 415 (4 self) - Add to MetaCart
of centralized monitoring and management point, and lack of a clear line of defense. Many of the intrusion detection techniques developed on a xed wired network are not applicable in this new environment. How to do it dierently and effectively is a challenging research problem. In this paper, we rst examine

Get Another Label? Improving Data Quality and Data Mining Using Multiple, Noisy Labelers

by Victor S. Sheng, Foster Provost, Panagiotis G. Ipeirotis
"... This paper addresses the repeated acquisition of labels for data items when the labeling is imperfect. We examine the improvement (or lack thereof) in data quality via repeated labeling, and focus especially on the improvement of training labels for supervised induction. With the outsourcing of smal ..."
Abstract - Cited by 252 (12 self) - Add to MetaCart
This paper addresses the repeated acquisition of labels for data items when the labeling is imperfect. We examine the improvement (or lack thereof) in data quality via repeated labeling, and focus especially on the improvement of training labels for supervised induction. With the outsourcing

The Ultimate Display

by Ivan E. Sutherland - Proceedings of the IFIP Congress , 1965
"... Office, ARPA, OSD We live in a physical world whose properties we have come to know well through long familiarity. We sense an involvement with this physical world which gives us the ability to predict its properties well. For example, we can predict where objects will fall, how well-known shapes lo ..."
Abstract - Cited by 232 (0 self) - Add to MetaCart
look from other angles, and how much force is required to push objects against friction. We lack corresponding familiarity with the forces on charged particles, forces in non-uniform fields, the effects of nonprojective geometric transformations, and high-inertia, low friction motion. A display

A Study of Android Application Security.

by William Enck , Damien Octeau , Patrick Mcdaniel , Swarat Chaudhuri , 2011
"... Abstract The fluidity of application markets complicate smartphone security. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smartphone applications. This paper seeks to better understand smartphone applica ..."
Abstract - Cited by 218 (10 self) - Add to MetaCart
application security by studying 1,100 popular free Android applications. We introduce the ded decompiler, which recovers Android application source code directly from its installation image. We design and execute a horizontal study of smartphone applications based on static analysis of 21 million lines

with horizontally and

by unknown authors
"... line integrals for gravity anomalies of irregular 2D masses ..."
Abstract - Add to MetaCart
line integrals for gravity anomalies of irregular 2D masses

A principal-components analysis of the Narcissistic Personality Inventory and further evidence of its construct validity.

by Robert Raskin , Howard Terry , Kenneth Craik , John Kamp , Jill Novacek , Dan Ozer - Journal of Personality and Social Psychology, , 1988
"... We examined the internal and external validity of the Narcissistic Personality Inventory (NPI). Study 1 explored the internal structure of the NPI responses of 1,018 subjects. Using principal-components analysis, we analyzed the tetrachoric correlations among the NPI item responses and found eviden ..."
Abstract - Cited by 209 (1 self) - Add to MetaCart
and subsequently the superego; (c) shift from an id psychology to an ego psychology; and (d) object relations theory (e.g., As with many of Freud's more important concepts, his thinking pertaining to narcissism tended to follow two separate yet interdependent lines of development. On the one hand, narcissism

A Cooperative Intrusion Detection System for Ad Hoc Networks

by Yi-an Huang , 2003
"... Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, lack of centralized ..."
Abstract - Cited by 193 (3 self) - Add to MetaCart
monitoring and management point, and lack of a clear line of defense. In this paper, we report our progress in developing intrusion detection (ID) capabilities for MANET. Building on our prior work on anomaly detection, we investigate how to improve the anomaly detection approach to provide more details
Next 10 →
Results 1 - 10 of 10,458
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University