• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 18,640
Next 10 →

CONTROLLABILITY OF PROCESSES WITH LARGE GAINS

by Sigurd Skogestad
"... Abstract: There is some disagreement in the literature on whether large plant gains are a problem or not when it comes to input-output controllability. In this paper, the effect of input errors is studied and controllability requirements are derived. The input disturbances can be attenuated by the u ..."
Abstract - Add to MetaCart
Abstract: There is some disagreement in the literature on whether large plant gains are a problem or not when it comes to input-output controllability. In this paper, the effect of input errors is studied and controllability requirements are derived. The input disturbances can be attenuated

On a Large-Gain Theorem

by Mustafa Khammash, Alexander Megretski, Tryphon T. Georgiou
"... The aim of this paper is to give a general quantitative requirement which the loop gain must satisfy in order to stabilize a given unstable (possibly nonlinear and time-varying) plant, namely that the gain must exceed one. Keywords: Large gain theorem, small gain theorem, stabilization of unstable s ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
The aim of this paper is to give a general quantitative requirement which the loop gain must satisfy in order to stabilize a given unstable (possibly nonlinear and time-varying) plant, namely that the gain must exceed one. Keywords: Large gain theorem, small gain theorem, stabilization of unstable

Cumulated Gain-based Evaluation of IR Techniques

by Kalervo Järvelin, Jaana Kekäläinen - ACM Transactions on Information Systems , 2002
"... Modem large retrieval environments tend to overwhelm their users by their large output. Since all documents are not of equal relevance to their users, highly relevant documents should be identified and ranked first for presentation to the users. In order to develop IR techniques to this direction, i ..."
Abstract - Cited by 694 (3 self) - Add to MetaCart
Modem large retrieval environments tend to overwhelm their users by their large output. Since all documents are not of equal relevance to their users, highly relevant documents should be identified and ranked first for presentation to the users. In order to develop IR techniques to this direction

The spread of obesity in a large social network over 32 years

by Nicholas A. Christakis, James H. Fowler - NEW ENGLAND JOURNAL OF MEDICINE , 2007
"... The prevalence of obesity has increased substantially over the past 30 years. We performed a quantitative analysis of the nature and extent of the person-to-person spread of obesity as a possible factor contributing to the obesity epidemic. Methods We evaluated a densely interconnected social networ ..."
Abstract - Cited by 509 (23 self) - Add to MetaCart
network of 12,067 people assessed repeatedly from 1971 to 2003 as part of the Framingham Heart Study. The body-mass index was available for all subjects. We used longitudinal statistical models to examine whether weight gain in one person was associated with weight gain in his or her friends, siblings

The Nature and Growth of Vertical Specialization in World Trade

by David Hummels - Journal of International Economics
"... Abstract: Dramatic changes are occurring in the nature of international trade. Production processes increasingly involve a sequential, vertical trading chain stretching across many countries, with each country specializing in particular stages of a good’s production sequence. We document a key aspe ..."
Abstract - Cited by 481 (20 self) - Add to MetaCart
and transport costs can lead to extensive vertical specialization, large trade growth, and large gains from trade. We formally illustrate these points by developing an extension of the Dornbusch-Fischer-Samuelson Ricardian trade model.

Capacity of multi-antenna Gaussian channels

by I. Emre Telatar - EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS , 1999
"... We investigate the use of multiple transmitting and/or receiving antennas for single user communications over the additive Gaussian channel with and without fading. We derive formulas for the capacities and error exponents of such channels, and describe computational procedures to evaluate such form ..."
Abstract - Cited by 2923 (6 self) - Add to MetaCart
such formulas. We show that the potential gains of such multi-antenna systems over single-antenna systems is rather large under independence assumptions for the fades and noises at different receiving antennas.

Opportunistic Beamforming Using Dumb Antennas

by Pramod Viswanath, David Tse, Rajiv Laroia - IEEE Transactions on Information Theory , 2002
"... Multiuser diversity is a form of diversity inherent in a wireless network, provided by independent time-varying channels across the different users. The diversity benefit is exploited by tracking the channel fluctuations of the users and scheduling transmissions to users when their instantaneous cha ..."
Abstract - Cited by 811 (1 self) - Add to MetaCart
channel quality is near the peak. The diversity gain increases with the dynamic range of the fluctuations and is thus limited in environments with little scattering and/or slow fading. In such environments, we propose the use of multiple transmit antennas to induce large and fast channel fluctuations so

Unsupervised Models for Named Entity Classification

by Michael Collins, Yoram Singer - In Proceedings of the Joint SIGDAT Conference on Empirical Methods in Natural Language Processing and Very Large Corpora , 1999
"... This paper discusses the use of unlabeled examples for the problem of named entity classification. A large number of rules is needed for coverage of the domain, suggesting that a fairly large number of labeled examples should be required to train a classifier. However, we show that the use of unlabe ..."
Abstract - Cited by 542 (4 self) - Add to MetaCart
This paper discusses the use of unlabeled examples for the problem of named entity classification. A large number of rules is needed for coverage of the domain, suggesting that a fairly large number of labeled examples should be required to train a classifier. However, we show that the use

XORs in the air: practical wireless network coding

by Sachin Katti, Hariharan Rahul, Wenjun Hu, Dina Katabi, Muriel Médard, Jon Crowcroft - In Proc. ACM SIGCOMM , 2006
"... This paper proposes COPE, a new architecture for wireless mesh networks. In addition to forwarding packets, routers mix (i.e., code) packets from different sources to increase the information content of each transmission. We show that intelligently mixing packets increases network throughput. Our de ..."
Abstract - Cited by 548 (20 self) - Add to MetaCart
the integration of network coding in the current network stack. We evaluate our design on a 20-node wireless network, and discuss the results of the first testbed deployment of wireless network coding. The results show that COPE largely increases network throughput. The gains vary from a few percent to several

A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks

by Wenliang Du, Jing Deng, Yunghsiang S. Han, Pramod K. Varshney, Jonathan Katz, Aram Khalili , 2003
"... this paper, we provide a framework in which to study the security of key pre-distribution schemes, propose a new key pre-distribution scheme which substantially improves the resilience of the network compared to previous schemes, and give an in-depth analysis of our scheme in terms of network resili ..."
Abstract - Cited by 552 (18 self) - Add to MetaCart
-scale network breaches to an adversary, and makes it necessary for the adversary to attack a large fraction of the network before it can achieve any significant gain
Next 10 →
Results 1 - 10 of 18,640
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University