• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,443
Next 10 →

Applying New Scheduling Theory to Static Priority Pre-Emptive Scheduling

by N. Audsley, A. Burns, M. Richardson, K. Tindell, A. J. Wellings - Software Engineering Journal , 1993
"... The paper presents exact schedulability analyses for real-time systems scheduled at run-time with a static priority pre-emptive dispatcher. The tasks to be scheduled are allowed to experience internal blocking (from other tasks with which they share resources) and (with certain restrictions) release ..."
Abstract - Cited by 448 (64 self) - Add to MetaCart
. The predictions that follow from this analysis are seen to be in close agreement with the behaviour exhibited during simulation studies. 1.

Close agreement between the orientation dependence of hydrogen bonds observed in protein structures and quantum mechanical calculations

by Alexandre V Morozov , Tanja Kortemme , Kiril Tsemekhman , David Baker - Proc. Natl. Acad. Sci. USA 101 , 2004
"... Hydrogen bonding is a key contributor to the exquisite specificity of the interactions within and between biological macromolecules, and hence accurate modeling of such interactions requires an accurate description of hydrogen bonding energetics. Here we investigate the orientation and distance dep ..."
Abstract - Cited by 32 (8 self) - Add to MetaCart
dependence of hydrogen bonding energetics by combining two quite disparate but complementary approaches: quantum mechanical electronic structure calculations and protein structural analysis. We find a remarkable agreement between the energy landscapes obtained from the electronic structure calculations

On the gauge theory/geometry correspondence

by Rajesh Gopakumar, Cumrun Vafa - Adv. Theor. Math. Phys , 1999
"... The ’t Hooft expansion of SU(N) Chern-Simons theory on S3 is proposed to be exactly dual to the topological closed string theory on the S2 blow up of the conifold geometry. The B-field on the S2 has magnitude Ngs = λ, the ’t Hooft coupling. We are able to make a number of checks, such as finding exa ..."
Abstract - Cited by 274 (36 self) - Add to MetaCart
The ’t Hooft expansion of SU(N) Chern-Simons theory on S3 is proposed to be exactly dual to the topological closed string theory on the S2 blow up of the conifold geometry. The B-field on the S2 has magnitude Ngs = λ, the ’t Hooft coupling. We are able to make a number of checks, such as finding

Towards a modern theory of adaptive networks: expectation and prediction

by Richard S. Sutton, Andrew G. Barto - Psychol. Rev , 1981
"... Many adaptive neural network theories are based on neuronlike adaptive elements that can behave as single unit analogs of associative conditioning. In this article we develop a similar adaptive element, but one which is more closely in accord with the facts of animal learning theory than elements co ..."
Abstract - Cited by 282 (18 self) - Add to MetaCart
Many adaptive neural network theories are based on neuronlike adaptive elements that can behave as single unit analogs of associative conditioning. In this article we develop a similar adaptive element, but one which is more closely in accord with the facts of animal learning theory than elements

A general theory of phase noise in electrical oscillators

by Ali Hajimiri, Thomas H. Lee - IEEE J. SOLID-STATE CIRCUITS , 1998
"... A general model is introduced which is capable of making accurate, quantitative predictions about the phase noise of different types of electrical oscillators by acknowledging the true periodically time-varying nature of all oscillators. This new approach also elucidates several previously unknown ..."
Abstract - Cited by 264 (16 self) - Add to MetaCart
design criteria for reducing close-in phase noise by identifying the mechanisms by which intrinsic device noise and external noise sources contribute to the total phase noise. In particular, it explains the details of how 1=f noise in a device upconverts into close-in phase noise and identifies methods

Extracting topographic structure from digital elevation data for geographic information system analysis. Photogrammetric Engineering and Remote

by S. K. Jenson, J. O. Domingue - Sensing , 1988
"... ABSTRACT: Software tools have been developed at the U.S. Geological Survey’s EROS Data Center to extract topographic structure and to delineate watersheds and overland flow paths from digital elevation models. The tools are special purpose FORTRAN programs interfaced with general-purpose raster and ..."
Abstract - Cited by 235 (0 self) - Add to MetaCart
and their manually delineated counterparts generally show close agreement, indicating that these software tools will save analyst time spent in manual interpretation and digitizing.

Linear Modeling Of mRNA Expression Levels During CNS Development And Injury

by Patrik D'Haeseleer, Xiling Wen, Stefanie Fuhrman, X. Wen, S. Fuhrman, Roland Somogyi , 1999
"... this paper, we will leave out the inputs to these genes. Since the least squares solution essentially solves a linear regression for each gene independently, failure to achieve a biologically plausible model for some of the genes does not imply that the rest of the model is unreliable. The sum of in ..."
Abstract - Cited by 239 (3 self) - Add to MetaCart
of input weights to each gene is close to zero, i.e. there seem to be no genes that are primarily positively or negatively influenced by other genes. However, the sum of output weights from each gene varies more widely, with a standard deviation that is almost a magnitude larger than for the sum of input

Global and regional climate changes due to black carbon,

by V Ramanathan , G Carmichael - Nat. Geosci., , 2008
"... Figure 1: Global distribution of BC sources and radiative forcing. a, BC emission strength in tons per year from a study by Bond et al. Full size image (42 KB) Review Nature Geoscience 1, 221 -227 (2008 Black carbon in soot is the dominant absorber of visible solar radiation in the atmosphere. Ant ..."
Abstract - Cited by 228 (5 self) - Add to MetaCart
in the tropics and East Asia are the major source regions 18, 19 Full size image (16 KB) Their concentrations peak close to major source regions and give rise to regional hotspots of BC-induced atmospheric solar heating Radiative forcing of the climate system Solar absorption by BC increases inversely

Robust fuzzy extractors and authenticated key agreement from close secrets.

by Yevgeniy Dodis , Jonathan Katz , Leonid Reyzin , Adam Smith - Advances in Cryptology—CRYPTO 2006, , 2006
"... Abstract Consider two parties holding samples from correlated distributions W and W ′ , respectively, that are within distance t of each other in some metric space. These parties wish to agree on a uniformly distributed secret key R by sending a single message over an insecure channel controlled by ..."
Abstract - Cited by 68 (19 self) - Add to MetaCart
Abstract Consider two parties holding samples from correlated distributions W and W ′ , respectively, that are within distance t of each other in some metric space. These parties wish to agree on a uniformly distributed secret key R by sending a single message over an insecure channel controlled by an all-powerful adversary. We consider both the keyless case, where the parties share no additional secret information, and the keyed case, where the parties share a long-term secret SK that they can use to generate a sequence of session keys {R j } using multiple pairs {(W j , W ′ j )}. The former has applications to, e.g., biometric authentication, while the latter arises in, e.g., the bounded storage model with errors. Our results improve upon previous work in several respects: • The best previous solution for the keyless case with no errors (i.e., t = 0) requires the min-entropy of W to exceed 2n/3, where n is the bit-length of W . Our solution applies whenever min-entropy of W exceeds the minimal possible threshold n/2, and yields a longer key. • Previous solutions for the keyless case in the presence of errors (i.e., t > 0) required random oracles. We give the first constructions (for certain metrics) in the standard model. • Previous solutions for the keyed case were stateful. We give the first stateless solution.

Sample size in factor analysis

by Robert C. Maccallum, Keith F. Widaman, Shaobo Zhang, Sehee Hong, Robert C. Maccallum, Shaobo Zhang, Sehee Hong - Psychol. Methods
"... The factor analysis literature includes a range of recommendations regarding the minimum sample size necessary to obtain factor solutions that are adequately stable and that correspond closely to population factors. A fundamental misconception about this issue is that the minimum sample size, or the ..."
Abstract - Cited by 202 (4 self) - Add to MetaCart
The factor analysis literature includes a range of recommendations regarding the minimum sample size necessary to obtain factor solutions that are adequately stable and that correspond closely to population factors. A fundamental misconception about this issue is that the minimum sample size
Next 10 →
Results 1 - 10 of 5,443
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University