• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 12,212
Next 10 →

Link-Sharing and Resource Management Models for Packet Networks

by Sally Floyd, Van Jacobson , 1995
"... This paper discusses the use of link-sharing mechanisms in packet networks and presents algorithms for hierarchical link-sharing. Hierarchical link-sharing allows multiple agencies, protocol families, or traflic types to share the bandwidth on a tink in a controlled fashion. Link-sharing and real-t ..."
Abstract - Cited by 618 (12 self) - Add to MetaCart
This paper discusses the use of link-sharing mechanisms in packet networks and presents algorithms for hierarchical link-sharing. Hierarchical link-sharing allows multiple agencies, protocol families, or traflic types to share the bandwidth on a tink in a controlled fashion. Link-sharing and real

Mobile Agents White Paper

by Jim White , 1996
"... this paper. Introduction New products New applications New networks About "Mobile Agents" Enabling mobile agents Mobile agent paradigm Mobile agent concepts Mobile agent technology Programming mobile agents Programming a place Programming an agent Using mobile agents Monitoring changing co ..."
Abstract - Cited by 48 (0 self) - Add to MetaCart
this paper. Introduction New products New applications New networks About "Mobile Agents" Enabling mobile agents Mobile agent paradigm Mobile agent concepts Mobile agent technology Programming mobile agents Programming a place Programming an agent Using mobile agents Monitoring changing

A review of image denoising algorithms, with a new one

by A. Buades, B. Coll, J. M. Morel - SIMUL , 2005
"... The search for efficient image denoising methods is still a valid challenge at the crossing of functional analysis and statistics. In spite of the sophistication of the recently proposed methods, most algorithms have not yet attained a desirable level of applicability. All show an outstanding perf ..."
Abstract - Cited by 508 (6 self) - Add to MetaCart
performance when the image model corresponds to the algorithm assumptions but fail in general and create artifacts or remove image fine structures. The main focus of this paper is, first, to define a general mathematical and experimental methodology to compare and classify classical image denoising algorithms

Research White Paper

by Lindsay Cornell, Lindsay Cornell, Lindsay Cornell , 2011
"... The DRM Consortium carried out a high-power field trial of the DRM system in the FM band in the central Scotland area, centred on the city of Edinburgh, in the United Kingdom during January to May 2011. The DRM Consortium members contributed their expertise and equipment to the trial to enable the s ..."
Abstract - Add to MetaCart
by the secretariat given the reference R07-WP6A-C-0532!!MSW-E.docx. Additional key words: DRM+White Papers are distributed freely on request. Authorisation of the Head of External Relations is required for publication. White Paper WHP 199

A white paper

by Jonathan D. Becker, Cherise A. Hodge, Mary W. Sepelyak, Jonathan D. Becker, Ph. D, Cherise A. Hodge, Mary W. Sepelyak , 2010
"... Creative Commons Attribution-NonCommercial-ShareAlike 3.0 United States This White Paper is brought to you for free and open access by the Dept. of Educational Leadership at VCU Scholars Compass. It has been accepted for inclusion in Educational Leadership Faculty Publications by an authorized admin ..."
Abstract - Add to MetaCart
Creative Commons Attribution-NonCommercial-ShareAlike 3.0 United States This White Paper is brought to you for free and open access by the Dept. of Educational Leadership at VCU Scholars Compass. It has been accepted for inclusion in Educational Leadership Faculty Publications by an authorized

White Paper October 2003

by Securing Web Services, Executive Summary
"... This paper is an effort to understand the basic concepts for securing Web services, the standards associated to solve this puzzle, and the requirements for implementing secure Web services. It is commonly said, "Security is as strong as the weakest link." Security in Web services cannot be ..."
Abstract - Add to MetaCart
be bolted into a existing architecture. The architecture design must be modular, so that specific security technologies can be plugged in at appropriate parts of the infrastructure. The set of requirements provided in this paper helps in incorporating security throughout. The second white paper planned

White paper Authors

by Amir Liba
"... The United States Pharmacopoeia (USP) is in the process of developing a new test for inorganic impurities in pharmaceutical products and their ingredients. The current USP<231> “heavy metals limit test ” is widely acknowledged to be inadequate in terms of scope, accuracy, sensitivity, and spec ..."
Abstract - Add to MetaCart
of closed vessel sample digestion and modern instrumental techniques for the accurate recovery and determination of individual analyte concentrations. This White Paper provides the background to the development of the new General Chapters and explains how Agilent’s 7700x ICP-MS can address the requirements

WHITE PAPER Media Cybernetics White Paper

by unknown authors
"... The narrow depth of field of the light microscope is either an asset or a liability depending on the needs of the microscopist. Occasionally, by limiting the image to a narrow plane in the vertical axis, it helps focus the observer’s attention by isolating structures in a thick sample, permitting th ..."
Abstract - Add to MetaCart
The narrow depth of field of the light microscope is either an asset or a liability depending on the needs of the microscopist. Occasionally, by limiting the image to a narrow plane in the vertical axis, it helps focus the observer’s attention by isolating structures in a thick sample, permitting the viewer to concentrate on the pertinent object while ignoring distracting elements above and below the plane of focus. However, in many if not most

A Planets White Paper

by Pauline Sinclair, Key Findings , 2010
"... Historically, information was recorded on paper, parchment and papyrus. Despite the apparent vulnerability of these materials, we can still read Egyptian scrolls, illuminated mediaeval manuscripts and early printed books today, hundreds or even thousands of years later. Nowadays, information is reco ..."
Abstract - Add to MetaCart
to be able to keep hold of it for. Given that within decades storage media decay and computer hardware and software become obsolete, a word-processed document written twenty years ago may turn out to be more ephemeral than a text created in ancient Egypt more than 5,000 years ago. This white paper is based

White Paper by:

by Larry Ozeran M. D
"... In the past 18 months, there has been an uptick in the number of malpractice claims filed against providers that are using established Electronic Health Record (EHR) products. In fact, the problem has led a few Medical Liability Carriers to consider raising the cost of medical malpractice insurance ..."
Abstract - Add to MetaCart
for physicians using an EHR. Just a few years ago, these same Medical Liability Carriers were offering physicians a discount for implementing an EHR. So why have EHR products transformed from being the beloved darlings of Medical Liability Carriers to scary stepchildren? This white paper explores some
Next 10 →
Results 11 - 20 of 12,212
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University