• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 7,501
Next 10 →

The irreducibility of the space of curves of given genus

by P. Deligne, D. Mumford - Publ. Math. IHES , 1969
"... Fix an algebraically closed field k. Let Mg be the moduli space of curves of genus g over k. The main result of this note is that Mg is irreducible for every k. Of course, whether or not M s is irreducible depends only on the characteristic of k. When the characteristic s o, we can assume that k ~- ..."
Abstract - Cited by 506 (2 self) - Add to MetaCart
strengthened his method so that it applies in all characteristics (SGA 7, ~968) 9 Mumford has also given a proof using theta functions in char. ~2. The result is this: Stable Reduction Theorem.-- Let R be a discrete valuation ring with quotient field K. Let A be an abelian variety over K. Then there exists a

Model-Based Analysis of Oligonucleotide Arrays: Model Validation, Design Issues and Standard Error Application

by Cheng Li, Wing Hung Wong , 2001
"... Background: A model-based analysis of oligonucleotide expression arrays we developed previously uses a probe-sensitivity index to capture the response characteristic of a specific probe pair and calculates model-based expression indexes (MBEI). MBEI has standard error attached to it as a measure of ..."
Abstract - Cited by 775 (28 self) - Add to MetaCart
Background: A model-based analysis of oligonucleotide expression arrays we developed previously uses a probe-sensitivity index to capture the response characteristic of a specific probe pair and calculates model-based expression indexes (MBEI). MBEI has standard error attached to it as a measure

Indexing based on scale invariant interest points

by Krystian Mikolajczyk, Cordelia Schmid - In Proceedings of the 8th International Conference on Computer Vision , 2001
"... This paper presents a new method for detecting scale invariant interest points. The method is based on two recent results on scale space: 1) Interest points can be adapted to scale and give repeatable results (geometrically stable). 2) Local extrema over scale of normalized derivatives indicate the ..."
Abstract - Cited by 409 (32 self) - Add to MetaCart
This paper presents a new method for detecting scale invariant interest points. The method is based on two recent results on scale space: 1) Interest points can be adapted to scale and give repeatable results (geometrically stable). 2) Local extrema over scale of normalized derivatives indicate

A Fuzzy Commitment Scheme

by Ari Juels, Martin Wattenberg - ACM CCS'99 , 1999
"... We combine well-known techniques from the areas of errorcorrecting codes and cryptography to achieve a new type of cryptographic primitive that we refer to as a fuzzy commitment scheme. Like a conventional cryptographic commitment scheme, our fuzzy commitment scheme is both concealing and binding: i ..."
Abstract - Cited by 344 (1 self) - Add to MetaCart
that it accepts a witness that is close to the original encrypting witness in a suitable metric, but not necessarily identical. This characteristic of our fuzzy commitment scheme makes it useful for applications such as biometric authentication systems, in which data is subject to random noise. Because the scheme

Visual Simulation of Smoke

by Ronald Fedkiw, Jos Stam, Henrik Wann Jensen , 2001
"... In this paper, we propose a new approach to numerical smoke simulation for computer graphics applications. The method proposed here exploits physics unique to smoke in order to design a numerical method that is both fast and efficient on the relatively coarse grids traditionally used in computer gra ..."
Abstract - Cited by 346 (22 self) - Add to MetaCart
by others. In addition, we introduce a physically consistent vorticity confinement term to model the small scale rolling features characteristic of smoke that are absent on most coarse grid simulations. Our model also correctly handles the interaction of smoke with moving objects. Keywords: Smoke

An Integrated Congestion Management Architecture for Internet Hosts

by Hari Balakrishnan, Hariharan S. Rahul, Srinivasan Seshan - In Proc. ACM SIGCOMM , 1999
"... This paper presents a novel framework for managing network congestion from an end-to-end perspective. Our work is motivated by several trends in traffic patterns that threaten the long-term stability of the Internet. These trends include the use of multiple independent concurrent flows by Web app ..."
Abstract - Cited by 295 (24 self) - Add to MetaCart
integrates congestion management across all applications and transport protocols. The CM maintains congestion parameters and exposes an API to enable applications to learn about network characteristics, pass information to the CM, and schedule data transmissions. Internally, it uses a stable rate

Teachers and student achievement in the Chicago public high schools

by Daniel Aaronson, Lisa Barrow, William Sander , 2003
"... Using unique administrative data on Chicago public high school students and their teachers, we estimate the importance of teachers for student mathematical achievement. We find that teachers are educationally and statistically important. To be sure, sampling variation and other measurement issues ca ..."
Abstract - Cited by 241 (0 self) - Add to MetaCart
, or 25 to 45 percent of an average school year, to a student's math score performance. Additionally, our teacher quality ratings remain relatively stable for an individual instructor over time, are reasonably impervious to controlling for non-math teachers, and do not appear to be driven

Recognition of Human Iris Patterns for Biometric Identification

by Libor Masek , 2003
"... A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. Most commercial iris recognition systems use patent ..."
Abstract - Cited by 151 (0 self) - Add to MetaCart
A biometric system provides automatic identification of an individual based on a unique feature or characteristic possessed by the individual. Iris recognition is regarded as the most reliable and accurate biometric identification system available. Most commercial iris recognition systems use

Realistic Animation of Rigid Bodies

by James K. Hahn - Computer Graphics Proc. SIGGRAPH , 1988
"... The theoretical background and implementation for a computer animation system to model a general class of three dimensional dynamic processes for arbitrary rigid bodies is presented. The simulation of the dynamic interaction among rigid bodies takes into account various physical characteris-tics suc ..."
Abstract - Cited by 201 (8 self) - Add to MetaCart
The theoretical background and implementation for a computer animation system to model a general class of three dimensional dynamic processes for arbitrary rigid bodies is presented. The simulation of the dynamic interaction among rigid bodies takes into account various physical characteris-tics

Graph Indexing: A Frequent Structure-based Approach

by Xifeng Yan , Philip S. Yu, Jiawei Han , 2004
"... Graph has become increasingly important in modelling complicated structures and schemaless data such as proteins, chemical compounds, and XML documents. Given a graph query, it is desirable to retrieve graphs quickly from a large database via graph-based indices. In this paper, we investigate the is ..."
Abstract - Cited by 201 (25 self) - Add to MetaCart
the intrinsic characteristics of the data and are relatively stable to database updates. To reduce the size of index structure, two techniques, size-increasing support constraint and discriminative fragments, are introduced. Our performance study shows that gIndex has 10 times smaller index size, but achieves
Next 10 →
Results 1 - 10 of 7,501
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University