Results 1  10
of
474,133
Graphs of Prescribed Girth and BiDegree
"... We say that a bipartite graph Γ(V1 ∪ V2, E) has bidegree r, s if every vertex from V1 has degree r and every vertex from V2 has degree s. Γ is called an (r, s, t)–graph if, additionally, the girth of Γ is 2t. For t> 3, very few examples of (r, s, t)–graphs were previously known. In this paper we ..."
Abstract

Cited by 11 (2 self)
 Add to MetaCart
We say that a bipartite graph Γ(V1 ∪ V2, E) has bidegree r, s if every vertex from V1 has degree r and every vertex from V2 has degree s. Γ is called an (r, s, t)–graph if, additionally, the girth of Γ is 2t. For t> 3, very few examples of (r, s, t)–graphs were previously known. In this paper
GRAPHS OF PRESCRIBED GIRTH AND BI–DEGREE1
"... We say that a bipartite graph Γ(V1 ∪ V2, E) has bidegree r, s if every vertex from V1 has degree r and every vertex from V2 has degree s. Γ is called an (r, s, t)–graph if, additionally, the girth of Γ is 2t. For t> 3, very few examples of (r, s, t)–graphs were previously known. In this paper we ..."
Abstract
 Add to MetaCart
We say that a bipartite graph Γ(V1 ∪ V2, E) has bidegree r, s if every vertex from V1 has degree r and every vertex from V2 has degree s. Γ is called an (r, s, t)–graph if, additionally, the girth of Γ is 2t. For t> 3, very few examples of (r, s, t)–graphs were previously known. In this paper
Linear pattern matching algorithms
 IN PROCEEDINGS OF THE 14TH ANNUAL IEEE SYMPOSIUM ON SWITCHING AND AUTOMATA THEORY. IEEE
, 1972
"... In 1970, Knuth, Pratt, and Morris [1] showed how to do basic pattern matching in linear time. Related problems, such as those discussed in [4], have previously been solved by efficient but suboptimal algorithms. In this paper, we introduce an interesting data structure called a bitree. A linear ti ..."
Abstract

Cited by 549 (0 self)
 Add to MetaCart
In 1970, Knuth, Pratt, and Morris [1] showed how to do basic pattern matching in linear time. Related problems, such as those discussed in [4], have previously been solved by efficient but suboptimal algorithms. In this paper, we introduce an interesting data structure called a bitree. A linear
Diversity and Multiplexing: A Fundamental Tradeoff in Multiple Antenna Channels
 IEEE Trans. Inform. Theory
, 2002
"... Multiple antennas can be used for increasing the amount of diversity or the number of degrees of freedom in wireless communication systems. In this paper, we propose the point of view that both types of gains can be simultaneously obtained for a given multiple antenna channel, but there is a fund ..."
Abstract

Cited by 1143 (20 self)
 Add to MetaCart
Multiple antennas can be used for increasing the amount of diversity or the number of degrees of freedom in wireless communication systems. In this paper, we propose the point of view that both types of gains can be simultaneously obtained for a given multiple antenna channel, but there is a
Geographic Concentration in U.S. Manufacturing Industries: A Dartboard Approach
 Journal of Political Economy
"... This paper discusses the prevalence of Silicon Valley–style localizations of individual manufacturing industries in the United States. A model in which localized industryspecific spillovers, natural advantages, and pure random chance all contribute to geographic concentration is used to develop a ..."
Abstract

Cited by 573 (16 self)
 Add to MetaCart
of the geographic areas for which data are available. As a consequence, comparisons of the degree of geographic concentration across industries can be made with more confidence. Our empirical results provide a strong reaffirmation of the previous wisdom in that we find almost all industries to be somewhat
Reliable Communication in the Presence of Failures
 ACM Transactions on Computer Systems
, 1987
"... The design and correctness of a communication facility for a distributed computer system are reported on. The facility provides support for faulttolerant process groups in the form of a family of reliable multicast protocols that can be used in both local and widearea networks. These protocols at ..."
Abstract

Cited by 556 (20 self)
 Add to MetaCart
attain high levels of concurrency, while respecting applicationspecific delivery ordering constraints, and have varying cost and performance that depend on the degree of ordering desired. In particular, a protocol that enforces causal delivery orderings is introduced and shown to be a valuable
How Iris Recognition Works
, 2003
"... Algorithms developed by the author for recognizing persons by their iris patterns have now been tested in six field and laboratory trials, producing no false matches in several million comparison tests. The recognition principle is the failure of a test of statistical independence on iris phase st ..."
Abstract

Cited by 495 (4 self)
 Add to MetaCart
structure encoded by multiscale quadrature wavelets. The combinatorial complexity of this phase information across different persons spans about 244 degrees of freedom and generates a discrimination entropy of about 3.2 bits/mm over the iris, enabling realtime decisions about personal identity
Books in graphs
, 2008
"... A set of q triangles sharing a common edge is called a book of size q. We write β (n, m) for the the maximal q such that every graph G (n, m) contains a book of size q. In this note 1) we compute β ( n, cn 2) for infinitely many values of c with 1/4 < c < 1/3, 2) we show that if m ≥ (1/4 − α) ..."
Abstract

Cited by 2380 (22 self)
 Add to MetaCart
A set of q triangles sharing a common edge is called a book of size q. We write β (n, m) for the the maximal q such that every graph G (n, m) contains a book of size q. In this note 1) we compute β ( n, cn 2) for infinitely many values of c with 1/4 < c < 1/3, 2) we show that if m ≥ (1/4 − α) n 2 with 0 < α < 17 −3 (), and G has no book of size at least graph G1 of order at least
USER ACCEPTANCE OF INFORMATION TECHNOLOGY: TOWARD A UNIFIED VIEW
, 2003
"... Information technology (IT) acceptance research has yielded many competing models, each with different sets of acceptance determinants. In this paper, we (1) review user acceptance literature and discuss eight prominent models, (2) empirically compare the eight models and their extensions, (3) formu ..."
Abstract

Cited by 1665 (9 self)
 Add to MetaCart
Information technology (IT) acceptance research has yielded many competing models, each with different sets of acceptance determinants. In this paper, we (1) review user acceptance literature and discuss eight prominent models, (2) empirically compare the eight models and their extensions, (3) formulate a unified model that integrates elements across the eight models, and (4) empirically validate the unified model. The eight models reviewed are the theory of reasoned action, the technology acceptance model, the motivational model, the theory of planned behavior, a model combining the technology acceptance model and the theory of planned behavior, the model of PC utilization, the innovation diffusion theory, and the social cognitive theory. Using data from four organizations over a sixmonth period with three points of measurement, the eight models explained between 17 percent and 53 percent of the variance in user intentions to use information technology. Next, a unified model, called the Unified Theory of Acceptance and Use of Technology (UTAUT), was formulated, with four core determinants of intention and usage, and up to four moderators of key relationships. UTAUT was then tested using the original data and found to outperform the eight individual models (adjusted R 2 of 69 percent). UTAUT was then confirmed with data from two new organizations with similar
Results 1  10
of
474,133