• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 130
Next 10 →

A Relaxed but not Necessarily Constrained Way from the Top to the Sky ⋆

by Katja Hose, Christian Lemke, Kai-uwe Sattler, Daniel Zinn
"... Abstract. As P2P systems are a very popular approach that may connect a large number of peers, efficient query processing plays an important role. Appropriate strategies, however, have to take the characteristics of these systems into account. Due to the possibly large number of peers, extensive flo ..."
Abstract - Cited by 3 (3 self) - Add to MetaCart
flooding is not possible. The application of routing indexes is a commonly used technique to avoid this. Promising techniques to further reduce execution costs and interesting aspects are query operators like top-N and skyline, constraints, and the relaxation of exactness and/or completeness requirements

Materials for an exploratory theory of the network society.

by Manuel Castells , Anthony Giddens , Alain Touraine , Anthony Smith , Benjamin Barber , Peter Hall , Roger-Pol Droit , Sophie Watson , Frank Webster , Krishan Kumar , David Lyon , Craig Calhoun , Jeffrey Henderson , Ramon Ramos , Jose E Rodrigues-Ibanez , Jose F Tezanos , Mary Kaldor , Stephen Jones , Christopher Freeman - The British Journal of Sociology , 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract - Cited by 122 (0 self) - Add to MetaCart
. Thus, parties and leaders use access to power as ways to obtain resources for their trade. Political corruption becomes a systemic feature of information age politics. Since character assassination needs some substance from time to time, systemic political corruption provides ample opportunity, as a

Probing Particle Physics from Top Down with Cosmic Strings

by Robert H. Br
"... Making use of the wealth of new observational data coming from the sky it is possible to constrain particle physics theories beyond the Standard Model. One way to do this is illustrated in this article: a subset of theories admits cosmic string solutions, topologically stable matter field configurat ..."
Abstract - Add to MetaCart
Making use of the wealth of new observational data coming from the sky it is possible to constrain particle physics theories beyond the Standard Model. One way to do this is illustrated in this article: a subset of theories admits cosmic string solutions, topologically stable matter field

Binary white dwarfs in the halo of the Milky Way

by Pim Van Oirschot, Gijs Nelemans, Silvia Toonen, Onno Pols, Anthony G. A. Brown, Amina Helmi, Simon Portegies Zwart , 2014
"... Aims. We study single and binary white dwarfs in the inner halo of the Milky Way in order to learn more about the conditions under which the population of halo stars was born, such as the initial mass function (IMF), the star formation history, or the binary fraction. Methods. We simulate the evolut ..."
Abstract - Add to MetaCart
10 − 13 Gyrs ago. Gaia will be the first instument to constrain the bright end of the field halo WDLF, where contributions from binary WDs are considerable. Many of these will have He cores, of which a handful have atypical surface gravities (log g < 6) and reach luminosities log(L/L)> 0 in our

1Achievable Rate Regions for Two-Way Relay Channel using Nested Lattice Coding

by Sinda Smirani, Mohamed Kamoun, Mireille Sarkiss, Abdellatif Zaidi, Pierre Duhamel
"... Abstract—This paper studies Gaussian Two-Way Relay Chan-nel where two communication nodes exchange messages with each other via a relay. It is assumed that all nodes operate in half duplex mode without any direct link between the communication nodes. A compress-and-forward relaying strategy using ne ..."
Abstract - Add to MetaCart
Abstract—This paper studies Gaussian Two-Way Relay Chan-nel where two communication nodes exchange messages with each other via a relay. It is assumed that all nodes operate in half duplex mode without any direct link between the communication nodes. A compress-and-forward relaying strategy using

Author manuscript, published in "ICDT (2012) 46-60" Highly Expressive Query Languages for Unordered Data Trees ∗

by Serge Abiteboul, Pierre Bourhis, Victor Vianu , 2012
"... We study highly expressive query languages for unordered data trees, using as formal vehicles Active XML and extensions of languages in the while family. All languages may be seen as adding some form of control on top of a set of basic pattern queries. The results highlight the impact and interplay ..."
Abstract - Add to MetaCart
We study highly expressive query languages for unordered data trees, using as formal vehicles Active XML and extensions of languages in the while family. All languages may be seen as adding some form of control on top of a set of basic pattern queries. The results highlight the impact and interplay

1C-HiLasso: A Collaborative Hierarchical Sparse Modeling Framework

by Pablo Sprechmann, Guillermo Sapiro, Yonina C. Eldar
"... Sparse modeling is a powerful framework for data analysis and processing. Traditionally, encoding in this framework is performed by solving an `1-regularized linear regression problem, commonly referred to as Lasso or Basis Pursuit. In this work we combine the sparsity-inducing property of the Lasso ..."
Abstract - Add to MetaCart
then extend this approach to the collaborative case, where a set of simultaneously coded signals share the same sparsity pattern at the higher (group) level, but not necessarily at the lower (inside the group) level, obtaining the collaborative HiLasso model (C-HiLasso). Such signals then share the same

[2], Chapter 6):

by Gordon Mccabe, I ×r Σ , 2003
"... The purpose of this paper is to review, clarify, and critically analyse modern mathematical cosmology. The emphasis is upon the mathemati-cal structures involved, rather than numerical computations. The opening section reviews and clarifies the Friedmann-Robertson-Walker models of General Relativist ..."
Abstract - Add to MetaCart
Relativistic Cosmology, while Section 2 deals with the spatially homogeneous models. Particular attention is paid to the topological and geometrical aspects of these models. Section 3 explains how the mathe-matical formalism can be linked with astronomical observation. Sections 4 and 5 provide a critical

Magnet: Robust and Efficient Collection through Control and Data Plane Integration

by unknown authors
"... Despite being a core networking primitive, collection protocols today often suffer from poor reliability (e.g., 70%) in practice, and heavily used protocols have never been evaluated in terms of communication efficiency. Using detailed experimental studies, we describe three challenges that cause ex ..."
Abstract - Add to MetaCart
Despite being a core networking primitive, collection protocols today often suffer from poor reliability (e.g., 70%) in practice, and heavily used protocols have never been evaluated in terms of communication efficiency. Using detailed experimental studies, we describe three challenges that cause

COSMOLOGICAL MODELS OF MODIFIED GRAVITY

by Jolyon Keith Bloomfield, Ph. D , 2013
"... The recent discovery of dark energy has prompted an investigation of ways in which the accelerated expansion of the universe can be realized. In this dissertation, we present two separate projects related to dark energy. The first project analyzes a class of braneworld models in which multiple brane ..."
Abstract - Add to MetaCart
The recent discovery of dark energy has prompted an investigation of ways in which the accelerated expansion of the universe can be realized. In this dissertation, we present two separate projects related to dark energy. The first project analyzes a class of braneworld models in which multiple
Next 10 →
Results 1 - 10 of 130
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University