• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 40,452
Next 10 →

by Conventional Method

by Gagi Tauhidur Rahman, M. M. Haque, Md. Akhter Farooque
"... UV- Vis., and some physical measurements. IR spectral studies show the binding sites of the Schiff base ligand with the metal ion. Molar conductance data and magnetic susceptibility measurements give evidence for monomeric and electrolytic nature of the complexes. Structural ..."
Abstract - Add to MetaCart
UV- Vis., and some physical measurements. IR spectral studies show the binding sites of the Schiff base ligand with the metal ion. Molar conductance data and magnetic susceptibility measurements give evidence for monomeric and electrolytic nature of the complexes. Structural

Learning to predict by the methods of temporal differences

by Richard S. Sutton - MACHINE LEARNING , 1988
"... This article introduces a class of incremental learning procedures specialized for prediction – that is, for using past experience with an incompletely known system to predict its future behavior. Whereas conventional prediction-learning methods assign credit by means of the difference between predi ..."
Abstract - Cited by 1521 (56 self) - Add to MetaCart
This article introduces a class of incremental learning procedures specialized for prediction – that is, for using past experience with an incompletely known system to predict its future behavior. Whereas conventional prediction-learning methods assign credit by means of the difference between

Multidimensional Access Methods

by Volker Gaede, Oliver Günther , 1998
"... Search operations in databases require special support at the physical level. This is true for conventional databases as well as spatial databases, where typical search operations include the point query (find all objects that contain a given search point) and the region query (find all objects that ..."
Abstract - Cited by 686 (3 self) - Add to MetaCart
Search operations in databases require special support at the physical level. This is true for conventional databases as well as spatial databases, where typical search operations include the point query (find all objects that contain a given search point) and the region query (find all objects

A Survey of Weak Instruments and Weak Identification in Generalized Method of Moments

by James H. Stock, Jonathan H. Wright, Motohiro Yogo - Journal of Business & Economic Statistics , 2002
"... Weak instruments arise when the instruments in linear instrumental variables (IV) regression are weakly correlated with the included endogenous variables. In generalized method of moments (GMM), more generally, weak instruments correspond to weak identification of some or all of the unknown paramete ..."
Abstract - Cited by 484 (11 self) - Add to MetaCart
Weak instruments arise when the instruments in linear instrumental variables (IV) regression are weakly correlated with the included endogenous variables. In generalized method of moments (GMM), more generally, weak instruments correspond to weak identification of some or all of the unknown

Space/Time Trade-offs in Hash Coding with Allowable Errors

by Burton H. Bloom - Communications of the ACM , 1970
"... this paper trade-offs among certain computational factors in hash coding are analyzed. The paradigm problem considered is that of testing a series of messages one-by-one for membership in a given set of messages. Two new hash- coding methods are examined and compared with a particular conventional h ..."
Abstract - Cited by 2097 (0 self) - Add to MetaCart
this paper trade-offs among certain computational factors in hash coding are analyzed. The paradigm problem considered is that of testing a series of messages one-by-one for membership in a given set of messages. Two new hash- coding methods are examined and compared with a particular conventional

Genetic Algorithms for Multiobjective Optimization: Formulation, Discussion and Generalization

by Carlos M. Fonseca, Peter J. Fleming , 1993
"... The paper describes a rank-based fitness assignment method for Multiple Objective Genetic Algorithms (MOGAs). Conventional niche formation methods are extended to this class of multimodal problems and theory for setting the niche size is presented. The fitness assignment method is then modified to a ..."
Abstract - Cited by 633 (15 self) - Add to MetaCart
The paper describes a rank-based fitness assignment method for Multiple Objective Genetic Algorithms (MOGAs). Conventional niche formation methods are extended to this class of multimodal problems and theory for setting the niche size is presented. The fitness assignment method is then modified

Three approaches to qualitative content analysis.

by Hsiu-Fang Hsieh , Sarah E Shannon , 2005
"... Content analysis is a widely used qualitative Researchers regard content analysis as a flexible method for analyzing text data The differentiation of content analysis is usually limited to classifying it as primarily a qualitative versus quantitative research method. A more thorough analysis of th ..."
Abstract - Cited by 729 (0 self) - Add to MetaCart
Content analysis is a widely used qualitative Researchers regard content analysis as a flexible method for analyzing text data The differentiation of content analysis is usually limited to classifying it as primarily a qualitative versus quantitative research method. A more thorough analysis

Recovering High Dynamic Range Radiance Maps from Photographs

by Paul E. Debevec, Jitendra Malik
"... We present a method of recovering high dynamic range radiance maps from photographs taken with conventional imaging equipment. In our method, multiple photographs of the scene are taken with different amounts of exposure. Our algorithm uses these differently exposed photographs to recover the respon ..."
Abstract - Cited by 859 (15 self) - Add to MetaCart
We present a method of recovering high dynamic range radiance maps from photographs taken with conventional imaging equipment. In our method, multiple photographs of the scene are taken with different amounts of exposure. Our algorithm uses these differently exposed photographs to recover

Computing semantic relatedness using Wikipedia-based explicit semantic analysis

by Evgeniy Gabrilovich, Shaul Markovitch - In Proceedings of the 20th International Joint Conference on Artificial Intelligence , 2007
"... Computing semantic relatedness of natural language texts requires access to vast amounts of common-sense and domain-specific world knowledge. We propose Explicit Semantic Analysis (ESA), a novel method that represents the meaning of texts in a high-dimensional space of concepts derived from Wikipedi ..."
Abstract - Cited by 562 (9 self) - Add to MetaCart
Computing semantic relatedness of natural language texts requires access to vast amounts of common-sense and domain-specific world knowledge. We propose Explicit Semantic Analysis (ESA), a novel method that represents the meaning of texts in a high-dimensional space of concepts derived from

Identification of programmed cell death in situ via specific labeling of nuclear DNA fragmentation

by Yael Gavrieli, Yoav Sherman, Shmuel A. Ben-sasson - J. Cell , 1992
"... Abstract. Programmed cell death (PCD) plays a key role in developmental biology and in maintenance of the steady state in continuously renewing tissues. Currently, its existence is inferred mainly from gel electrophoresis of a pooled DNA extract as PCD was shown to be associated with DNA fragmentati ..."
Abstract - Cited by 691 (0 self) - Add to MetaCart
fragmentation. Based on this observation, we describe here the development of a method for the in situ visualization of PCD at the single-cell level, while preserving tissue architecture. Conventional histological sections, pretreated with protease, were nick end labeled with biotinylated poly dU, introduced
Next 10 →
Results 1 - 10 of 40,452
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University