• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 368,832
Next 10 →

EXPIRES 1-2-2019.

by unknown authors
"... The following marks are published in compliance with section 12(a) of the Trademark Act of 1946. Applications for the registration of marks in more than one class have been filed as provided in section 30 of said act as amended by Public Law 772, 87th Congress, approved Oct. 9, 1962, 76 Stat. 769. O ..."
Abstract - Add to MetaCart
. Opposition under section 13 may be filed within thirty days of the date of this publication. See rules 2.101 to 2.105. A separate fee of three hundred dollars ($300.00) for opposing each mark in each class must accompany the opposition. SECTION 1. — INTERNATIONAL CLASSIFICATION The short titles associated

Data Security

by Dorothy E. Denning, Peter J. Denning , 1979
"... The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and ..."
Abstract - Cited by 611 (3 self) - Add to MetaCart
The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system

Economic analysis of cross section and panel data

by Jeffrey M. Wooldridge
"... ..."
Abstract - Cited by 3292 (18 self) - Add to MetaCart
Abstract not found

The Elements of Statistical Learning -- Data Mining, Inference, and Prediction

by Trevor Hastie, Robert Tibshirani, Jerome Friedman
"... ..."
Abstract - Cited by 1320 (13 self) - Add to MetaCart
Abstract not found

The implementation of the cilk-5 multithreaded language

by Matteo Frigo, Charles E. Leiserson, Keith H. Randall - In PLDI ’98: Proceedings of the ACM SIGPLAN 1998 conference on Programming language design and implementation , 1998
"... The fth release of the multithreaded language Cilk uses a provably good \work-stealing " scheduling algorithm similar to the rst system, but the language has been completely re-designed and the runtime system completely reengineered. The eciency of the new implementation was aided by a clear st ..."
Abstract - Cited by 493 (30 self) - Add to MetaCart
-rst " principle has led to a portable Cilk-5 im-plementation in which the typical cost of spawning a parallel thread is only between 2 and 6 times the cost of a C function call on a variety of contemporary machines. Many Cilk pro-grams run on one processor with virtually no degradation compared

Wireless Communications

by Andrea Goldsmith, Anaïs Nin , 2005
"... Copyright c ○ 2005 by Cambridge University Press. This material is in copyright. Subject to statutory exception and to the provisions of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University ..."
Abstract - Cited by 1129 (32 self) - Add to MetaCart
Copyright c ○ 2005 by Cambridge University Press. This material is in copyright. Subject to statutory exception and to the provisions of relevant collective licensing agreements, no reproduction of any part may take place without the written permission of Cambridge University

Tinydb: An acquisitional query processing system for sensor networks

by Samuel R. Madden, Michael J. Franklin, Joseph M. Hellerstein, Wei Hong - ACM Trans. Database Syst , 2005
"... We discuss the design of an acquisitional query processor for data collection in sensor networks. Acquisitional issues are those that pertain to where, when, and how often data is physically acquired (sampled) and delivered to query processing operators. By focusing on the locations and costs of acq ..."
Abstract - Cited by 609 (8 self) - Add to MetaCart
]: Languages—Query languages; H.2.4 [Database Management]: Systems—Distributed databases; query processing

Mining Generalized Association Rules

by Ramakrishnan Srikant, Rakesh Agrawal , 1995
"... We introduce the problem of mining generalized association rules. Given a large database of transactions, where each transaction consists of a set of items, and a taxonomy (is-a hierarchy) on the items, we find associations between items at any level of the taxonomy. For example, given a taxonomy th ..."
Abstract - Cited by 577 (7 self) - Add to MetaCart
We introduce the problem of mining generalized association rules. Given a large database of transactions, where each transaction consists of a set of items, and a taxonomy (is-a hierarchy) on the items, we find associations between items at any level of the taxonomy. For example, given a taxonomy

USER ACCEPTANCE OF INFORMATION TECHNOLOGY: TOWARD A UNIFIED VIEW

by Viswanath Venkatesh, Michael G. Morris, Gordon B. Davis, Fred D. Davis , 2003
"... Information technology (IT) acceptance research has yielded many competing models, each with different sets of acceptance determinants. In this paper, we (1) review user acceptance literature and discuss eight prominent models, (2) empirically compare the eight models and their extensions, (3) formu ..."
Abstract - Cited by 1665 (9 self) - Add to MetaCart
the original data and found to outperform the eight individual models (adjusted R 2 of 69 percent). UTAUT was then confirmed with data from two new organizations with similar

Wavelets and Subband Coding

by Martin Vetterli, Jelena Kovačević , 2007
"... ..."
Abstract - Cited by 608 (32 self) - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 368,832
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University