• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 43
Next 10 →

Fuzzy Information Retrieval Model Based on Multiple Related

by Maria Angelica, A. Leite, Ivan L. M. Ricarte (orientador
"... Abstract – With the World Wide Web popularity the information retrieval area has a new challenge intending to retrieve information resources by their meaning by using a knowledge base. Nowadays ontologies are being used to model knowledge bases. To deal with knowledge subjectivity and uncertainty fu ..."
Abstract - Add to MetaCart
Abstract – With the World Wide Web popularity the information retrieval area has a new challenge intending to retrieve information resources by their meaning by using a knowledge base. Nowadays ontologies are being used to model knowledge bases. To deal with knowledge subjectivity and uncertainty

unknown title

by Eliyahu Osherovich
"... methods for phase retrieval ..."
Abstract - Add to MetaCart
methods for phase retrieval

1Sub-Nyquist Sampling: Bridging Theory and Practice

by Moshe Mishali, Yonina C. Eldar
"... [ A review of past and recent strategies for sub-Nyquist sampling] Signal processing methods have changed substantially over the last several decades. In modern applications, an increasing number of functions is being pushed forward to sophisticated software algorithms, leaving only delicate finely- ..."
Abstract - Add to MetaCart
-tuned tasks for the circuit level. Sampling theory, the gate to the digital world, is the key enabling this revolution, encompassing all aspects related to the conversion of continuous-time signals to discrete streams of numbers. The famous Shannon-Nyquist theorem has become a landmark: a mathematical

AND

by Tomer Michaeli, Yonina C. Eldar, Guillermo Sapiro , 2014
"... ar ..."
Abstract - Add to MetaCart
Abstract not found

Using Option Pricing to Value Commitment Flexibility in Multi-agent Systems

by Katia Sycara , 1997
"... With the explosive growth of internet activity, there will be an increasing reliance on intelligent software agents for electronic commerce and information retrieval. Such multi-agents systems will be comprised of self-motivated agents that interact with each other though negotiation and task delega ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
, valuing a contract under assumptions of uncertainty, risk reduction, making decisions in situations of asymmetric information, or situations of sequential subcontracting where each agent must decide to subcontract part of its current contract to others. Our model is based on financial option pricing

CORRECTING FOR PRECIPITATION EFFECTS IN SATELLITE-BASED PASSIVE MICROWAVE TROPICAL CYCLONE INTENSITY ESTIMATES

by Capt Wacker Robert S, Robert S. Wacker , 2005
"... Public reporting burden for this collection of Information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments ..."
Abstract - Add to MetaCart
Public reporting burden for this collection of Information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send

POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR

by Dominique Tschopp, Prof E. Telatar, Prof S. Diggavi, Prof M. Grossglauser, Prof J. -y, Le Boudec, Prof M. Mitzenmacher, Prof S. Shakkottai
"... 2010 to my wife, Joyce, and my family...- Résumé- ..."
Abstract - Add to MetaCart
2010 to my wife, Joyce, and my family...- Résumé-

guidance of Prof. Raj Jain)

by A Survey Of Kerberos V, Public-key Kerberos
"... Kerberos was initially developed at MIT as a part of Project Athena and in these days it is widely deployed single sign-on protocol that is developed to authenticate clients to multiple networked services. Furthermore, Cross-realm authentication is a useful and interesting component of Kerberos aime ..."
Abstract - Add to MetaCart
Kerberos was initially developed at MIT as a part of Project Athena and in these days it is widely deployed single sign-on protocol that is developed to authenticate clients to multiple networked services. Furthermore, Cross-realm authentication is a useful and interesting component of Kerberos

Chapter 12 Rough Sets and Rough Logic: A KDD Perspective

by Zdzis Law Pawlak, Lech Polkowski, Andrzej Skowron
"... Abstract Basic ideas of rough set theory were proposed by Zdzis law Pawlak [85, 86] in the early 1980’s. In the ensuing years, we have witnessed a systematic, world–wide growth of interest in rough sets and their applications. The main goal of rough set analysis is induction of approximations of con ..."
Abstract - Add to MetaCart
Abstract Basic ideas of rough set theory were proposed by Zdzis law Pawlak [85, 86] in the early 1980’s. In the ensuing years, we have witnessed a systematic, world–wide growth of interest in rough sets and their applications. The main goal of rough set analysis is induction of approximations

DOCTEUR EN SCIENCES

by Bhaskar Biswas, Bhaskar Biswas , 2010
"... Implementational aspects of code-based cryptography ..."
Abstract - Add to MetaCart
Implementational aspects of code-based cryptography
Next 10 →
Results 1 - 10 of 43
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University