• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 34,213
Next 10 →

Project Number:

by Acts Project Ac, Author(s) A. Steed (ucl, J. Tromp (nottingham
"... This document summarizes the work undertaken in the usability evaluation of the COVEN online applications. This is the first part of a four part deliverable, and it provides an overview of all results and summaries of the other three parts. Several threads of work were undertaken in this evaluation ..."
Abstract - Add to MetaCart
: P-public, R-restricted, L-limited, I-internal **Nature: P-Prototype, R-Report, S-Specification, T-Tool, O-Other . D3.5, Usage Evaluation of the Online Applications Part A: Overview and Summary of Evaluation ACTS Project COVEN, N. AC040 D3.5, Usage Evaluation of the Online Applications Part A

Project Number

by Project Title Deliverable , 2003
"... Keywords IST-1999-12324 Report Public D19 Algorithm Specific Toolbox NES/DOC/SAG/WP2/049/3 Marcus Schafheutle, SAG The purpose of this document is to describe the developed algorithm specific NESSIE tools. In contrast to the statistical tests of the NESSIE test suite, each of these too ..."
Abstract - Add to MetaCart
Keywords IST-1999-12324 Report Public D19 Algorithm Specific Toolbox NES/DOC/SAG/WP2/049/3 Marcus Schafheutle, SAG The purpose of this document is to describe the developed algorithm specific NESSIE tools. In contrast to the statistical tests of the NESSIE test suite, each of these tools is specific for only one individual algorithm. So their reusability is rather limited. Due to this fact only short descriptions of these tools are given. The software provided with these tools is not publicly available.

Project Number

by Ac Project Title, Deliverable Type P (public, Eric Johnson
"... : This report considers the use of smart cards as mobile personal security modules. The format of a smart card is described and the impact that this format has on both the way a smart card can be used as a security module and the limitations that the smart card imposes are discussed. The securit ..."
Abstract - Add to MetaCart
: This report considers the use of smart cards as mobile personal security modules. The format of a smart card is described and the impact that this format has on both the way a smart card can be used as a security module and the limitations that the smart card imposes are discussed. The security threats to smart cards, from physical to technological and environmental, are considered along with the various measures that are or can be adopted to prevent them. Further sections consider: . how the performance limitations of smart cards for cryptographic purposes may in certain circumstances, be circumvented . the use of operating system commands for application implementation and how this may be improved by use of an interpreter concept along the lines of the Java Card API . the required security functionality of a UIM in the UMTS system. Keyword List: ACTS, ASPeCT, card applications, SIM, GSM, security, smart card, UIM, UMTS Limiting Smart Card Constraints AC095/GD/W24/DS/P...

Near Optimal Signal Recovery From Random Projections: Universal Encoding Strategies?

by Emmanuel J. Candès , Terence Tao , 2004
"... Suppose we are given a vector f in RN. How many linear measurements do we need to make about f to be able to recover f to within precision ɛ in the Euclidean (ℓ2) metric? Or more exactly, suppose we are interested in a class F of such objects— discrete digital signals, images, etc; how many linear m ..."
Abstract - Cited by 1513 (20 self) - Add to MetaCart
-law), then it is possible to reconstruct f to within very high accuracy from a small number of random measurements. typical result is as follows: we rearrange the entries of f (or its coefficients in a fixed basis) in decreasing order of magnitude |f | (1) ≥ |f | (2) ≥... ≥ |f | (N), and define the weak-ℓp ball

A NEW POLYNOMIAL-TIME ALGORITHM FOR LINEAR PROGRAMMING

by N. Karmarkar - COMBINATORICA , 1984
"... We present a new polynomial-time algorithm for linear programming. In the worst case, the algorithm requires O(tf'SL) arithmetic operations on O(L) bit numbers, where n is the number of variables and L is the number of bits in the input. The running,time of this algorithm is better than the ell ..."
Abstract - Cited by 860 (3 self) - Add to MetaCart
We present a new polynomial-time algorithm for linear programming. In the worst case, the algorithm requires O(tf'SL) arithmetic operations on O(L) bit numbers, where n is the number of variables and L is the number of bits in the input. The running,time of this algorithm is better than

The theory and practice of corporate finance: Evidence from the field

by John R. Graham, Campbell R. Harvey - Journal of Financial Economics , 2001
"... We survey 392 CFOs about the cost of capital, capital budgeting, and capital structure. Large firms rely heavily on present value techniques and the capital asset pricing model, while small firms are relatively likely to use the payback criterion. We find that a surprising number of firms use their ..."
Abstract - Cited by 725 (23 self) - Add to MetaCart
We survey 392 CFOs about the cost of capital, capital budgeting, and capital structure. Large firms rely heavily on present value techniques and the capital asset pricing model, while small firms are relatively likely to use the payback criterion. We find that a surprising number of firms use

Cyberguide: A Mobile Context-Aware Tour Guide

by Gregory D. Abowd, Christopher G. Atkeson, Jason Hong, Sue Long, Rob Kooper, Mike Pinkerton , 1996
"... Future computing environments will free the user from the constraints of the desktop. Applications for a mobile environment should take advantage of contextual information, suach as position, to offer greater services to the user. In his paper, we present the Cyberguide project, in which we are buil ..."
Abstract - Cited by 652 (24 self) - Add to MetaCart
Future computing environments will free the user from the constraints of the desktop. Applications for a mobile environment should take advantage of contextual information, suach as position, to offer greater services to the user. In his paper, we present the Cyberguide project, in which we

Generating Representative Web Workloads for Network and Server Performance Evaluation

by Paul Barford, Mark Crovella , 1997
"... One role for workload generation is as a means for understanding how servers and networks respond to variation in load. This enables management and capacity planning based on current and projected usage. This paper applies a number of observations of Web server usage to create a realistic Web worklo ..."
Abstract - Cited by 944 (11 self) - Add to MetaCart
One role for workload generation is as a means for understanding how servers and networks respond to variation in load. This enables management and capacity planning based on current and projected usage. This paper applies a number of observations of Web server usage to create a realistic Web

Myrinet: A Gigabit-per-Second Local Area Network

by Nanette J. Boden, Danny Cohen, Robert E. Felderman, Alan E. Kulawik, Charles L. Seitz, Jakov N. Seizovic, Wen-king Su - IEEE Micro , 1995
"... Abstract. Myrinet is a new type of local-area network (LAN) based on the technology used for packet communication and switching within "massivelyparallel processors " (MPPs). Think of Myrinet as an MPP message-passing network that can span campus dimensions, rather than as a wide-a ..."
Abstract - Cited by 1011 (0 self) - Add to MetaCart
such as Ethernet and FDDI, it is helpful to start with Myrinet's genealogy. Myrinet is rooted in the results of two ARPA-sponsored research projects, the Caltech Mosaic, an experimental, fine-grain multicomputer [1], and the USC Information Sciences Institute (USC/ISI) ATOMIC LAN [2, 3], which was built using

An inventory for measuring depression

by A. T. Beck, C. H. Ward, J. Mock M. D - Archives of General Psychiatry , 1961
"... The difficulties inherent in obtaining con-sistent and adequate diagnoses for the pur-poses of research and therapy have been pointed out by a number of authors. Pasamanick12 in a recent article viewed the low interclinician agreement on diagnosis as an indictment of the present state of psychiatry ..."
Abstract - Cited by 1195 (0 self) - Add to MetaCart
The difficulties inherent in obtaining con-sistent and adequate diagnoses for the pur-poses of research and therapy have been pointed out by a number of authors. Pasamanick12 in a recent article viewed the low interclinician agreement on diagnosis as an indictment of the present state of psychiatry
Next 10 →
Results 1 - 10 of 34,213
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University