• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 11,606
Next 10 →

Domain names - Implementation and Specification

by P. Mockapetris - RFC-883, USC/Information Sciences Institute , 1983
"... This RFC describes the details of the domain system and protocol, and assumes that the reader is familiar with the concepts discussed in a companion RFC, "Domain Names- Concepts and Facilities " [RFC-1034]. The domain system is a mixture of functions and data types which are an official pr ..."
Abstract - Cited by 725 (9 self) - Add to MetaCart
and the Internet class RR data formats (e.g., host addresses). Since the previous RFC set, several definitions have changed, so some previous definitions are obsolete. Experimental or obsolete features are clearly marked in these RFCs, and such information should be used with caution. The reader is especially

Treadmarks: Shared memory computing on networks of workstations

by Cristiana Amza, Alan L. Cox, Hya Dwarkadas, Pete Keleher, Honghui Lu, Ramakrishnan Rajamony, Weimin Yu, Willy Zwaenepoel - Computer , 1996
"... TreadMarks supports parallel computing on networks of workstations by providing the application with a shared memory abstraction. Shared memory facilitates the transition from sequential to parallel programs. After identifying possible sources of parallelism in the code, most of the data structures ..."
Abstract - Cited by 487 (37 self) - Add to MetaCart
can be retained without change, and only synchronization needs to be added to achieve a correct shared memory parallel program. Additional transformations may be necessary to optimize performance, but this can be done in an incremental fashion. We discuss the techniques used in TreadMarks to provide e

Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,

by ] Richard Hackman , Grec R Oldham , 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract - Cited by 622 (2 self) - Add to MetaCart
of research, and inspired several successful change projects involving the redesign of work (e.g., For one, a number of researchers have been unable to provide empirical support for the major tenets of the two-factor theory itself (see, for example, Moreover, the theory does not provide for differences

Guided search: an alternative to the Feature Integration Model for visual search

by Jeremy M. Wolfe, Kyle R. Cave, Susan L. Franzel - Journal of Experimental Psychology: Human Perception & Performance , 1989
"... Subjects searched sets of items for targets defined by conjunctions of color and form, color and orientation, or color and size. Set size was varied and reaction times (RT) were measured. For many unpracticed subjects, the slopes of the resulting RT x Set Size functions are too shallow to be consist ..."
Abstract - Cited by 399 (25 self) - Add to MetaCart
of Ls, but the time required to find that T will increase markedly as the number of distracting Ls increases (Julesz & Bergen, 1983). The slope of the function relating RT to number of distractors gives an estimate of the cost in search time of each additional distrac-tor. In a T versus L task

Collusion-Secure Fingerprinting for Digital Data

by Dan Boneh, James Shaw - IEEE Transactions on Information Theory , 1996
"... This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data (e.g., software, documents, and images). Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy and trac ..."
Abstract - Cited by 353 (1 self) - Add to MetaCart
This paper discusses methods for assigning codewords for the purpose of fingerprinting digital data (e.g., software, documents, and images). Fingerprinting consists of uniquely marking and registering each copy of the data. This marking allows a distributor to detect any unauthorized copy

Experimental Queueing Analysis with Long-Range Dependent Packet Traffic

by Ashok Erramilli, Onuttom Narayan, Walter Willinger - IEEE/ACM Transactions on Networking , 1996
"... Recent traffic measurement studies from a wide range of working packet networks have convincingly established the presence of significant statistical features that are characteristic of fractal traffic processes, in the sense that these features span many time scales. Of particular interest in packe ..."
Abstract - Cited by 346 (14 self) - Add to MetaCart
in packet traffic modeling is a property called long-range dependence, which is marked by the presence of correlations that can extend over many time scales. In this paper, we demonstrate empirically that, beyond its statistical significance in traffic measurements, long-range dependence has considerable

Thematic relations as links between nominal reference and temporal constitution

by Manfred Krifka , 1992
"... This paper treats the correspondence between the reference type of NPs (i.e., mass nouns, count nouns, measure constructions, plurals) and the temporal constitution of verbal predicates (i.e., activities, accomplish-ments). A theory will be developed that handles the well known influence of the refe ..."
Abstract - Cited by 255 (4 self) - Add to MetaCart
This paper treats the correspondence between the reference type of NPs (i.e., mass nouns, count nouns, measure constructions, plurals) and the temporal constitution of verbal predicates (i.e., activities, accomplish-ments). A theory will be developed that handles the well known influence

End-to-end congestion control schemes: Utility functions, random losses and ECN marks

by Srisankar Kunniyur, R. Srikant - In Proceedings of IEEE Infocom , 2000
"... We present a framework for designing end-to-end congestion control schemes in a network where each user may have a different utility function and may experience non-congestion-related losses. We first show that there exists an additive increase-multiplicative decrease scheme using only end-to-end me ..."
Abstract - Cited by 215 (1 self) - Add to MetaCart
through the node, the appropriate marking level can be estimated using only aggregate flow measurements, i.e., per-flow measurements are not required. 1

Should Central Banks Respond to Movements

by S. Bernanke, Mark Gertler - in Asset Prices?”, American Economic Review , 2001
"... In recent decades, asset booms and busts have been important factors in macroeconomic fluctuations in both industrial and developing countries. In light of this experience, how, if at all, should central bankers respond to asset price volatility? We have addressed this issue in previous work (Ben Be ..."
Abstract - Cited by 222 (1 self) - Add to MetaCart
Bernanke and Mark Gertler, 1999). The context of our earlier study was the relatively new, but increasingly popular, monetary policy framework known as inflation targeting (see, e.g., Bernanke and Frederic Mishkin, 1997). In an inflation-targeting framework, publicly announced mediumterm inflation targets

Textpresso: An Ontology-Based Information Retrieval and Extraction System for Biological Literature

by Hans-michael Müller, Eimear E. Kenny, Paul W. Sternberg - PLoS Biol , 2004
"... We have developed Textpresso, a new text-mining system for scientific literature whose capabilities go far beyond those of a simple keyword search engine. Textpresso’s two major elements are a collection of the full text of scientific articles split into individual sentences, and the implementation ..."
Abstract - Cited by 208 (14 self) - Add to MetaCart
of categories of terms for which a database of articles and individual sentences can be searched. The categories are classes of biological concepts (e.g., gene, allele, cell or cell group, phenotype, etc.) and classes that relate two objects (e.g., association, regulation, etc.) or describe one (e
Next 10 →
Results 1 - 10 of 11,606
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University