Results 1 - 10
of
12,904
External Applications of Honey
"... According to the Ebers papyrus (1550 BC) honey is included in 147 prescriptions in external applications. Also according to the Smith papyrus (1700 BC) it was used in wound healing: “Thou shouldst bind [the wound] with fresh meat the first day [and] treat afterwards with grease, honey [and] lint eve ..."
Abstract
- Add to MetaCart
According to the Ebers papyrus (1550 BC) honey is included in 147 prescriptions in external applications. Also according to the Smith papyrus (1700 BC) it was used in wound healing: “Thou shouldst bind [the wound] with fresh meat the first day [and] treat afterwards with grease, honey [and] lint
Snakes, Shapes, and Gradient Vector Flow
- IEEE TRANSACTIONS ON IMAGE PROCESSING
, 1998
"... Snakes, or active contours, are used extensively in computer vision and image processing applications, particularly to locate object boundaries. Problems associated with initialization and poor convergence to boundary concavities, however, have limited their utility. This paper presents a new extern ..."
Abstract
-
Cited by 755 (16 self)
- Add to MetaCart
Snakes, or active contours, are used extensively in computer vision and image processing applications, particularly to locate object boundaries. Problems associated with initialization and poor convergence to boundary concavities, however, have limited their utility. This paper presents a new
Corporate Financing and Investment Decisions when Firms Have Information that Investors Do Not Have
, 1984
"... This paper considers a firm that must issue common stock to raise cash to undertake a valuable investment opportunity. Management is assumed to know more about the firm’s value than potential investors. Investors interpret the firm’s actions rationally. An. equilibrium mode1 of the issue-invest deci ..."
Abstract
-
Cited by 2602 (7 self)
- Add to MetaCart
, and to prefer debt to equity if external financing is required. Extensions and applications of the model are discussed.
Automatic Word Sense Discrimination
- Journal of Computational Linguistics
, 1998
"... This paper presents context-group discrimination, a disambiguation algorithm based on clustering. Senses are interpreted as groups (or clusters) of similar contexts of the ambiguous word. Words, contexts, and senses are represented in Word Space, a high-dimensional, real-valued space in which closen ..."
Abstract
-
Cited by 536 (1 self)
- Add to MetaCart
is automatic and unsupervised in both training and application: senses are induced from a corpus without labeled training insta,nces or other external knowledge sources. The paper demonstrates good performance of context-group discrimination for a sample of natural and artificial ambiguous words
External Memory Algorithms and Data Structures
, 1998
"... Data sets in large applications are often too massive to fit completely inside the computer's internal memory. The resulting input/output communication (or I/O) between fast internal memory and slower external memory (such as disks) can be a major performance bottleneck. In this paper, we surve ..."
Abstract
-
Cited by 349 (23 self)
- Add to MetaCart
Data sets in large applications are often too massive to fit completely inside the computer's internal memory. The resulting input/output communication (or I/O) between fast internal memory and slower external memory (such as disks) can be a major performance bottleneck. In this paper, we
The synchronous approach to reactive and real-time systems
- Proceedings of the IEEE
, 1991
"... This special issue is devoted to the synchronous approach to reactive and real-time programming. This introductory paper presents and discusses the application fields and the principles of synchronous programming. The major concern of the synchronous approach is to base synchronous programming langu ..."
Abstract
-
Cited by 436 (15 self)
- Add to MetaCart
This special issue is devoted to the synchronous approach to reactive and real-time programming. This introductory paper presents and discusses the application fields and the principles of synchronous programming. The major concern of the synchronous approach is to base synchronous programming
Safe Kernel Extensions Without Run-Time Checking
- Proc. of OSDI'96
"... Abstract This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel first defines a safety policy and makes it public. Then, using this policy, an application can provide binaries i ..."
Abstract
-
Cited by 429 (20 self)
- Add to MetaCart
Abstract This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel first defines a safety policy and makes it public. Then, using this policy, an application can provide binaries
ORIGINAL ARTICLE External application of traditional Chinese medicine
, 2014
"... Background Bone cancer pain presents a clinical challenge with limitations of current treatments. Many patients seek ad-ditional therapies that may relieve pain. Many external appli-cations of traditional Chinese medicines (EAs-TCMs) have been evaluated in clinical trials, but fewer are known about ..."
Abstract
- Add to MetaCart
Background Bone cancer pain presents a clinical challenge with limitations of current treatments. Many patients seek ad-ditional therapies that may relieve pain. Many external appli-cations of traditional Chinese medicines (EAs-TCMs) have been evaluated in clinical trials, but fewer are known about
A REPORT ON SIMULATING EXTERNAL APPLICATIONS WITH SOAMANET IN THE LOOP
, 2010
"... Service-Oriented Architectures (SOAs) are increasingly being used for designing and building large-scale net-worked and distributed systems. These systems are realized by dynamically composing a variety of network-available services. SOAMANET [15] provides a tool-suite for evaluation of such systems ..."
Abstract
- Add to MetaCart
Service-Oriented Architectures (SOAs) are increasingly being used for designing and building large-scale net-worked and distributed systems. These systems are realized by dynamically composing a variety of network-available services. SOAMANET [15] provides a tool-suite for evaluation of such systems that involve large-scale SOAs on dynamic network platforms, such as Mobile Ad-hoc Networks (MANETs). For mission critical
The Personal Adaptive In-Car HMI: Integration of External Applications for Personalized Use
"... Abstract. We describe an approach for integrating non-automotive ap-plications into in-car-entertainment systems while taking account of man-ifold personalization capabilities within a mobile environment. Adaptive user interfaces are generated for external applications using well-known interaction a ..."
Abstract
- Add to MetaCart
Abstract. We describe an approach for integrating non-automotive ap-plications into in-car-entertainment systems while taking account of man-ifold personalization capabilities within a mobile environment. Adaptive user interfaces are generated for external applications using well-known interaction
Results 1 - 10
of
12,904