• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,967
Next 10 →

ℓ-diversity: Privacy beyond k-anonymity

by Ashwin Machanavajjhala, Daniel Kifer, Johannes Gehrke, Muthuramakrishnan Venkitasubramaniam - IN ICDE , 2006
"... Publishing data about individuals without revealing sensitive information about them is an important problem. In recent years, a new definition of privacy called k-anonymity has gained popularity. In a k-anonymized dataset, each record is indistinguishable from at least k − 1 other records with resp ..."
Abstract - Cited by 672 (13 self) - Add to MetaCart
Publishing data about individuals without revealing sensitive information about them is an important problem. In recent years, a new definition of privacy called k-anonymity has gained popularity. In a k-anonymized dataset, each record is indistinguishable from at least k − 1 other records

A simple cooperative diversity method based on network path selection

by Aggelos Bletsas, Ashish Khisti, David P. Reed, Andrew Lippman - IEEE J. SELECT. AREAS COMMUN , 2006
"... Cooperative diversity has been recently proposed as a way to form virtual antenna arrays that provide dramatic gains in slow fading wireless environments. However, most of the proposed solutions require distributed space–time coding algorithms, the careful design of which is left for future investi ..."
Abstract - Cited by 452 (14 self) - Add to MetaCart
Cooperative diversity has been recently proposed as a way to form virtual antenna arrays that provide dramatic gains in slow fading wireless environments. However, most of the proposed solutions require distributed space–time coding algorithms, the careful design of which is left for future

The architecture of complexity

by Herbert A. Simon - Proceedings of the American Philosophical Society , 1962
"... A number of proposals have been advanced in recent years for the development of “general systems theory ” that, abstracting from properties peculiar to physical, biological, or social systems, would be applicable to all of them. 1 We might well feel that, while the goal is laudable, systems of such ..."
Abstract - Cited by 772 (1 self) - Add to MetaCart
A number of proposals have been advanced in recent years for the development of “general systems theory ” that, abstracting from properties peculiar to physical, biological, or social systems, would be applicable to all of them. 1 We might well feel that, while the goal is laudable, systems

Seven principles for good practice in undergraduate education

by W. Chickering, Zelda F. Gamson , 1987
"... Apathetic students, illiterate graduates, incompetent teaching, impersonal campuses-- so rolls the drumfire of criticism of higher education. More than two years of reports have spelled out the problems. States have been quick to respond by holding out carrots and beating with sticks. There are neit ..."
Abstract - Cited by 799 (0 self) - Add to MetaCart
. Develops reciprocity and cooperation among students. 3. Uses active learning techniques. 4. Gives prompt feedback. 5. Emphasizes time on task. 6. Communicates high expectations. 7. Respects diverse talents and ways of learning. We can do it ourselves-- with a little bit of help.... A Focus for Improvement

Principles and methods of Testing Finite State Machines -- a survey

by David Lee, Mihalis Yannakakis - PROCEEDINGS OF IEEE , 1996
"... With advanced computer technology, systems are getting larger to fulfill more complicated tasks, however, they are also becoming less reliable. Consequently, testing is an indispensable part of system design and implementation; yet it has proved to be a formidable task for complex systems. This moti ..."
Abstract - Cited by 345 (16 self) - Add to MetaCart
to model systems in diverse areas, including sequential circuits, certain types of programs, and, more recently, communication protocols. In a testing problem we have a machine about which we lack some information; we would like to deduce this information by providing a sequence of inputs to the machine

Index Structures for Path Expressions

by Tova Milo, Dan Suciu , 1997
"... In recent years there has been an increased interest in managing data which does not conform to traditional data models, like the relational or object oriented model. The reasons for this non-conformance are diverse. One one hand, data may not conform to such models at the physical level: it may be ..."
Abstract - Cited by 333 (7 self) - Add to MetaCart
In recent years there has been an increased interest in managing data which does not conform to traditional data models, like the relational or object oriented model. The reasons for this non-conformance are diverse. One one hand, data may not conform to such models at the physical level: it may

Characterization of microbial diversity by determining terminal restriction length polymorphisms of genes encoding 16S rDNA.

by Wen-Tso Liu , Terence L Marsh , Hans Cheng , Larry J Forney - Appl. Environ. Microbiol. , 1997
"... A quantitative molecular technique was developed for rapid analysis of microbial community diversity in various environments. The technique employed PCR in which one of the two primers used was fluorescently labeled at the 5 end and was used to amplify a selected region of bacterial genes encoding ..."
Abstract - Cited by 263 (7 self) - Add to MetaCart
A quantitative molecular technique was developed for rapid analysis of microbial community diversity in various environments. The technique employed PCR in which one of the two primers used was fluorescently labeled at the 5 end and was used to amplify a selected region of bacterial genes encoding

Collaboration and Control: Crisis Management and Multimedia Technology in London Underground Line Control Rooms

by Christian Heath, Paul Luff, Guildford Cambridge - Computer Supported Cooperative Work , 1992
"... Despite technical advances over the past few years in the area of systems support for cooperative work there is still relatively little understanding of the organisation of collaborative activity in real world, technologically supported, work environments. Indeed, it has been suggested that the fail ..."
Abstract - Cited by 262 (2 self) - Add to MetaCart
Despite technical advances over the past few years in the area of systems support for cooperative work there is still relatively little understanding of the organisation of collaborative activity in real world, technologically supported, work environments. Indeed, it has been suggested

Cooperative inquiry: Developing new technologies for children with children

by Allison Druin , 1999
"... In today’s homes and schools, children are emerging as frequent and experienced users of technology [3, 14]. As this trend continues, it becomes increasingly important to ask if we are fulfilling the technology needs of our children. To answer this question, I have developed a research approach that ..."
Abstract - Cited by 201 (46 self) - Add to MetaCart
be satisfied as technology users [17]. In recent years, numerous methodologies have been developed that bring technology users into the development process. Users have been described as active partners [6, 16, 29], inspectors or testers [24, 25], or research participants to be observed and/or interviewed [5

Optimum Relay Location in Cooperative Communication Networks with Single AF Relay

by Lei Xu, Hong-wei Zhang, Xiao-hui Li, Xian-liang Wu , 2010
"... In recent years cooperative diversity has been widely used in wireless networks. In particular, cooperative communication with a single relay is a simple, practical technology for wireless sensor networks. In this pa-per, we analyze several simple network topologies. Under the condition of equal pow ..."
Abstract - Add to MetaCart
In recent years cooperative diversity has been widely used in wireless networks. In particular, cooperative communication with a single relay is a simple, practical technology for wireless sensor networks. In this pa-per, we analyze several simple network topologies. Under the condition of equal
Next 10 →
Results 1 - 10 of 5,967
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University