• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,158
Next 10 →

SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks

by Yih-Chun Hu, David B. Johnson, Adrian Perrig , 2003
"... An ad hoc network is a collection of wireless computers (nodes), communicating among themselves over possibly multihop paths, without the help of any infrastructure such as base stations or access points. Although many previous ad hoc network routing protocols have been based in part on distance vec ..."
Abstract - Cited by 534 (8 self) - Add to MetaCart
. In order to support use with nodes of limited CPU processing capability, and to guard against Denial-of-Service attacks in which an attacker attempts to cause other nodes to consume excess network bandwidth or processing time, we use efficient one-way hash functions and do not use asymmetric cryptographic

Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions

by Gediminas Adomavicius, Alexander Tuzhilin - IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING , 2005
"... This paper presents an overview of the field of recommender systems and describes the current generation of recommendation methods that are usually classified into the following three main categories: content-based, collaborative, and hybrid recommendation approaches. This paper also describes vario ..."
Abstract - Cited by 1490 (23 self) - Add to MetaCart
various limitations of current recommendation methods and discusses possible extensions that can improve recommendation capabilities and make recommender systems applicable to an even broader range of applications. These extensions include, among others, an improvement of understanding of users and items

A Tutorial on Visual Servo Control

by Seth Hutchinson, Greg Hager, Peter Corke - IEEE TRANSACTIONS ON ROBOTICS AND AUTOMATION , 1996
"... This paper provides a tutorial introduction to visual servo control of robotic manipulators. Since the topic spans many disciplines our goal is limited to providing a basic conceptual framework. We begin by reviewing the prerequisite topics from robotics and computer vision, including a brief review ..."
Abstract - Cited by 839 (26 self) - Add to MetaCart
This paper provides a tutorial introduction to visual servo control of robotic manipulators. Since the topic spans many disciplines our goal is limited to providing a basic conceptual framework. We begin by reviewing the prerequisite topics from robotics and computer vision, including a brief

Vogels, U-Net: a user-level network interface for parallel and distributed computing, in:

by Anindya Basu , Vineet Buch , Werner Vogels , Thorsten Von Eicken - Proceedings of the 15th ACM Symposium on Operating System Principles, ACM, , 1995
"... Abstract The U-Net communication architecture provides processes with a virtual view of a network device to enable user-level access to high-speed communication devices. The architecture, implemented on standard workstations using off-the-shelf ATM communication hardware, removes the kernel from th ..."
Abstract - Cited by 597 (17 self) - Add to MetaCart
the communication path, while still providing full protection. The model presented by U-Net allows for the construction of protocols at user level whose performance is only limited by the capabilities of network. The architecture is extremely flexible in the sense that traditional protocols like TCP and UDP

Social capital, intellectual capital, and the organizational advantage

by Janine Nahapiet - Academy of Management Review , 1998
"... Scholars of the theory of the firm have begun to emphasize the sources and conditions of what has been described a s "the organizational advantage, " rather than focus on the causes and consequences of market failure. Typically, researchers see such organizational advantage a s accruing fr ..."
Abstract - Cited by 1215 (2 self) - Add to MetaCart
from the particular capabilities organizations have for creating and sharing knowledge. In this article we seek to contribute to this body 01 work by developing the following arguments: (1) social capital facilitates the creation of new intellectual capital. (2) organizations. a s institutional

A Proposal to add Explicit Congestion Notification (ECN) to IP

by K. Ramakrishnan, S. Floyd , 1999
"... This note describes a proposed addition of ECN (Explicit Congestion Notification) to IP. TCP is currently the dominant transport protocol used in the Internet. We begin by describing TCP's use of packet drops as an indication of congestion. Next we argue that with the addition of active queue m ..."
Abstract - Cited by 472 (26 self) - Add to MetaCart
management (e.g., RED) to the Internet infrastructure, where routers detect congestion before the queue overflows, routers are no longer limited to packet drops as an indication of congestion. Routers could instead set a Congestion Experienced (CE) bit in the packet header of packets from ECN-capable

Reflective and impulsive determinants of social behavior

by Fritz Strack - Personality and Social Psychology Review , 2004
"... This article describes a 2-systems model that explains social behavior as a joint function of reflective and impulsive processes. In particular, it is assumed that social behavior is controlled by 2 interacting systems that follow different operating principles. The reflective system generates behav ..."
Abstract - Cited by 365 (5 self) - Add to MetaCart
This article describes a 2-systems model that explains social behavior as a joint function of reflective and impulsive processes. In particular, it is assumed that social behavior is controlled by 2 interacting systems that follow different operating principles. The reflective system generates

Instrumenting the world with wireless sensor networks

by D. Estrin, L. Girod, G. Pottie, M. Srivastava - ICASSP , 2001
"... Pervasive micro-sensing and actuation may revolutionize the way in which we understand and manage complex physical systems: from airplane wings to complex ecosystems. The capabilities for detailed physical monitoring and manipulation offer enormous opportunities for almost every scientific disciplin ..."
Abstract - Cited by 349 (10 self) - Add to MetaCart
Pervasive micro-sensing and actuation may revolutionize the way in which we understand and manage complex physical systems: from airplane wings to complex ecosystems. The capabilities for detailed physical monitoring and manipulation offer enormous opportunities for almost every scientific

Capability Maturity Model . . .

by Mark C. Paulk, Mark C. Paulk, Bill Curtis, Bill Curtis, Mary Beth Chrissis, Mary Beth Chrissis, Charles V. Weber, Charles V. Weber, Thomas R. Miller, Lt Col , 1993
"... (maximum 200 words) 14. SUBJECT TERMS 15. NUMBER OF PAGES 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY CLASSIFICATION OF THIS PAGE UNCLASSIFIED 19. SECURITY CLASSIFICATION OF ABSTRACT UNCLASSIFIED 20. LIMITATION OF ABSTRACT UL NSN 7540-01-280-5500 Standard Form 298 ..."
Abstract - Cited by 253 (5 self) - Add to MetaCart
(Rev. 2-89) Prescribed by ANSI Std. Z39-18 298-102 Capability Maturity Model SM for Software, Version 1.1 Mark C. Paulk, Bill Curtis, Mary Beth Chrissis, Charles V. Weber In November 1986, the Software Engineering Institute (SEI), with assistance from the Mitre Corporation, began developing a process

Holistic twig joins: optimal XML pattern matching

by Nicolas Bruno, Nick Koudas, Divesh Srivastava - in: Proceedings of ACM SIGMOD International Conference on Management of Data, 2002
"... XML employs a tree-structured data model, and, naturally, XML queries specify patterns of selection predicates on multiple elements related by a tree structure. Finding all occurrences of such a twig pattern in an XML database is a core operation for XML query processing. Prior work has typically de ..."
Abstract - Cited by 344 (8 self) - Add to MetaCart
XML employs a tree-structured data model, and, naturally, XML queries specify patterns of selection predicates on multiple elements related by a tree structure. Finding all occurrences of such a twig pattern in an XML database is a core operation for XML query processing. Prior work has typically
Next 10 →
Results 1 - 10 of 6,158
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University