• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,584
Next 10 →

Dynamic source routing in ad hoc wireless networks

by David B. Johnson, David A. Maltz - Mobile Computing , 1996
"... An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its desti ..."
Abstract - Cited by 3108 (31 self) - Add to MetaCart
An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its

Experimental Estimates of Education Production Functions

by Alan B. Krueger - Princeton University, Industrial Relations Section Working Paper No. 379 , 1997
"... This paper analyzes data on 11,600 students and their teachers who were randomly assigned to different size classes from kindergarten through third grade. Statistical methods are used to adjust for nonrandom attrition and transitions between classes. The main conclusions are (1) on average, performa ..."
Abstract - Cited by 529 (19 self) - Add to MetaCart
, performance on standardized tests increases by four percentile points the �rst year students attend small classes; (2) the test score advantage of students in small classes expands by about one percentile point per year in subsequent years; (3) teacher aides and measured teacher characteristics have little

Valgrind: A framework for heavyweight dynamic binary instrumentation

by Nicholas Nethercote, Julian Seward - In Proceedings of the 2007 Programming Language Design and Implementation Conference , 2007
"... Dynamic binary instrumentation (DBI) frameworks make it easy to build dynamic binary analysis (DBA) tools such as checkers and profilers. Much of the focus on DBI frameworks has been on performance; little attention has been paid to their capabilities. As a result, we believe the potential of DBI ha ..."
Abstract - Cited by 558 (5 self) - Add to MetaCart
Dynamic binary instrumentation (DBI) frameworks make it easy to build dynamic binary analysis (DBA) tools such as checkers and profilers. Much of the focus on DBI frameworks has been on performance; little attention has been paid to their capabilities. As a result, we believe the potential of DBI

Labeled Faces in the Wild: A Database for Studying Face Recognition in Unconstrained Environments

by Gary B. Huang, Manu Ramesh, Tamara Berg, Erik Learned-Miller
"... Face recognition has benefitted greatly from the many databases that have been produced to study it. Most of these databases have been created under controlled conditions to facilitate the study of specific parameters on the face recognition problem. These parameters include such variables as posi ..."
Abstract - Cited by 449 (11 self) - Add to MetaCart
as position, pose, lighting, expression, background, camera quality, occlusion, age, and gender. While there are many applications for face recognition technology in which one can control the parameters of image acquisition, there are also many applications in which the practitioner has little or no control

Background independent quantum gravity: a status report

by Abhay Ashtekar, Jerzy Lewandowski , 2004
"... The goal of this article is to present an introduction to loop quantum gravity —a background independent, non-perturbative approach to the problem of unification of general relativity and quantum physics, based on a quantum theory of geometry. Our presentation is pedagogical. Thus, in addition to pr ..."
Abstract - Cited by 259 (7 self) - Add to MetaCart
to providing a bird’s eye view of the present status of the subject, the article should also serve as a vehicle to enter the field and explore it in detail. To aid non-experts, very little is assumed beyond elements of general relativity, gauge theories and quantum field theory. While the article

A Descriptive Framework of Workspace Awareness for RealTime Groupware

by Carl Gutwin, Saul Greenberg - Computer Supported Cooperative Work , 2002
"... Abstract. Supporting awareness of others is an idea that holds promise for improving the usability of real-time distributed groupware. However, there is little principled information available about awareness that can be used by groupware designers. In this article, we develop a descriptive theory o ..."
Abstract - Cited by 251 (26 self) - Add to MetaCart
Abstract. Supporting awareness of others is an idea that holds promise for improving the usability of real-time distributed groupware. However, there is little principled information available about awareness that can be used by groupware designers. In this article, we develop a descriptive theory

What is coordination theory and how can it help design cooperative work systems?

by Thomas W. Malone, Kevin Crowston , 1990
"... It is possible to design cooperative work tools based only on “common sense ” and good intuitions. But the history of technology is replete with examples of good theories greatly aiding the development of useful technology. Where, then, might we look for theories to help us design computer-supported ..."
Abstract - Cited by 221 (7 self) - Add to MetaCart
It is possible to design cooperative work tools based only on “common sense ” and good intuitions. But the history of technology is replete with examples of good theories greatly aiding the development of useful technology. Where, then, might we look for theories to help us design computer

Guidelines for Using Multiple Views in Information Visualization

by Michelle Q. Wang Baldonado, Allison Woodruff - in Proceedings of AVI, 2000 , 2000
"... A multiple view system uses two or more distinct views to support the investigation of a single conceptual entity. Many such systems exist, ranging from computer-aided design (CAD) systems for chip design that display both the logical structure and the actual geometry of the integrated circuit to ov ..."
Abstract - Cited by 215 (0 self) - Add to MetaCart
A multiple view system uses two or more distinct views to support the investigation of a single conceptual entity. Many such systems exist, ranging from computer-aided design (CAD) systems for chip design that display both the logical structure and the actual geometry of the integrated circuit

The Adolescent Brain and Age-Related Behavioral Manifestations

by L. P. Spear - Journal of Safety Research , 2000
"... To successfully negotiate the developmental transition between youth and adulthood, adolescents must maneuver this often stressful period while acquiring skills necessary for independence. Certain behavioral features, including age-related increases in social behavior and risk-taking/novelty-seeking ..."
Abstract - Cited by 200 (0 self) - Add to MetaCart
-taking/novelty-seeking, are common among adolescents of diverse mammalian species and may aid in this process. Reduced positive incentive values from stimuli may lead adolescents to pursue new appetitive reinforcers through drug use and other risk-taking behaviors, with their relative insensitivity to drugs supporting comparatively

An experimental study of the skype peer-to-peer voip system

by Saikat Guha, Neil Daswani , 2006
"... Despite its popularity, relatively little is known about the traf-fic characteristics of the Skype VoIP system and how they differ from other P2P systems. We describe an experimen-tal study of Skype VoIP traffic conducted over a one month period, where over 30 million datapoints were collected re-ga ..."
Abstract - Cited by 193 (0 self) - Add to MetaCart
Despite its popularity, relatively little is known about the traf-fic characteristics of the Skype VoIP system and how they differ from other P2P systems. We describe an experimen-tal study of Skype VoIP traffic conducted over a one month period, where over 30 million datapoints were collected re
Next 10 →
Results 1 - 10 of 2,584
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University