name
stringlengths
7
10
title
stringlengths
13
125
abstract
stringlengths
67
3.02k
fulltext
stringclasses
1 value
keywords
stringlengths
17
734
train_818
Clausal resolution in a logic of rational agency
A resolution based proof system for a Temporal Logic of Possible Belief is presented. This logic is the combination of the branching-time temporal logic CTL (representing change over time) with the modal logic KD45 (representing belief). Such combinations of temporal or dynamic logics and modal logics are useful for sp...
dynamic logics;kd45;modal logic;branching-time temporal logic;multi-agent systems;resolution based proof system;belief;rational agents;multi-modal logics;temporal logic;ctl
train_819
Local search with constraint propagation and conflict-based heuristics
Search algorithms for solving CSP (Constraint Satisfaction Problems) usually fall into one of two main families: local search algorithms and systematic algorithms. Both families have their advantages. Designing hybrid approaches seems promising since those advantages may be combined into a single approach. In this pape...
csp;filtering techniques;search algorithms;local search algorithms;constraint satisfaction problems;partial assignments;tabu decision-repair;systematic algorithms
train_82
Bit-serial AB/sup 2/ multiplier using modified inner product
This paper presents a new multiplication algorithm and, based on this algorithm, proposes a hardware architecture, called modified inner-product multiplier (MIPM), which computes AB/sup 2/ multiplication based on a linear feedback shift register (LFSR). The algorithm is based on the property of the irreducible all one ...
modified inner-product multiplier;bit-serial ab/sup 2/ multiplier;space complexity;multiplication algorithm;modified inner product;public-key cryptosystem;time complexity;irreducible all one polynomial;linear feedback shift register;hardware architecture
train_820
Yet some more complexity results for default logic
We identify several new tractable subsets and several new intractable simple cases for reasoning in the propositional version of Reiter's default logic. The majority of our findings are related to brave reasoning. By making some intuitive observations, most classes that we identify can be derived quite easily from some...
complexity results;tractable subsets;extended logic programs;default logic;reasoning;complexity classes;nonmonotonic reasoning
train_821
Digital rights (and wrongs)
Attempting to grasp the many conflicts and proposed safeguards for intellectual property is extremely difficult. Legal, political, economic, and cultural issues-both domestic and international-loom large, almost dwarfing the daunting technological challenges. Solutions devised by courts and legislatures and regulatory ...
legal issues;economic issues;political issues;intellectual property;cultural issues
train_822
Reinventing broadband
Many believe that broadband providers need to change their whole approach. The future, then, is in reinventing broadband. That means tiered pricing to make broadband more competitive with dial-up access and livelier, more distinct content: video on demand, MP3, and other features exclusive to the fat-pipe superhighway
tiered pricing;broadband;video on demand;mp3;business plans
train_823
Estimation of thermal coefficients of magneto-optical media
Previously we described a method for estimating the thermal conductivity of magneto-optic recording media. The method relies on identifying the laser power that brings the maximum temperature of the TbFeCo layer to as high as the Curie temperature. We extensively use a similar method to estimate the heat capacity of a ...
curie temperature;maximum temperature;laser power;multilayer structure;light focusing;magneto-optic recording media;thermal conductivity;thermal diffusion;tbfeco layer;aluminum alloy layer;static disks;magneto-optical media;dielectric layer;thermal coefficients;tbfeco;irradiation time;heat capacity
train_824
The Internet, knowledge and the academy
As knowledge is released from the bounds of libraries, as research becomes no longer confined to the academy, and education/certification is available, any time/any place, the university and the faculty must redefine themselves. Liberal studies, once the core, and currently eschewed in favor of science and technology, ...
academy;faculty;internet;university;certification;knowledge;liberal studies;education
train_825
Genetic algorithm-neural network estimation of Cobb angle from torso asymmetry
in scoliosis Scoliosis severity, measured by the Cobb angle, was estimated by artificial neural network from indices of torso surface asymmetry using a genetic algorithm to select the optimal set of input torso indices. Estimates of the Cobb angle were accurate within 5 degrees in two-thirds, and within 10 degrees in s...
scoliosis patients;scoliosis progression;input torso indices;genetic algorithm;torso surface asymmetry;artificial neural network;cobb angle
train_826
A round of cash, a pound of flesh [telecom]
Despite the upheaval across telecom, venture capital firms are still investing in start-ups. But while a promising idea and a catchy name were enough to guarantee millions in funding at the peak of the dotcom frenzy, now start-ups must prove-their long-term viability, and be willing to concede control of their business...
venture capital firms;telecom;viability
train_827
Williams nears end of Chapter 11 [telecom]
Leucadia National Corp. comes through with a $330 million boost for Williams Communications, which should keep the carrier afloat through the remainder of its bankruptcy
bankruptcy;leucadia national corp;williams communications
train_828
Verizon leapfrogs Sprint PCS with Q2 subscriber numbers
The wireless carrier industry's second-quarter results showed a surprising shift in market share as Sprint PCS fell from grace after a nearly four-year lead in subscriber additions and Verizon Wireless added considerably more customers than analysts expected
sprint pcs;verizon wireless;wireless carrier industry
train_829
Santera targets independents in major strategy overhaul [telecom]
With big carriers slashing capital expense budgets, Santera Systems is broadening the reach of its next-generation switching platform to include independent telcos. This week, the vendor will announce that it has signed a deal with Kerman, Calif-based Kerman Telephone Co. Furthermore, the company is angling for inclusi...
switching;rural utilities service;santera systems;kerman telephone
train_83
A distributed mobile agent framework for maintaining persistent distance
education Mobile agent techniques involve distributed control if communication is required among different types of agents, especially when mobile agents can migrate from station to station. This technique can be implemented in a distributed distance learning environment, which allows students or instructors to login f...
central server;message transmission protocols;persistent distance education;distributed agent framework;distributed control;user-friendly personal agents;distributed mobile agent framework
train_830
The real story behind Calpoint [telecom]
A former Qwest executive sheds light on the carrier's controversial deal with Calpoint. Discusses why Calpoint gets a monthly check from Quest, regardless of whether it provides services
telecom carrier;qwest;calpoint
train_831
Software vendors' failure fuels consolidation theories [telecom interconnection
and billing] As independent software vendors like AP Engines fall by the wayside as independent entities, attrition could accelerate consolidation in the OSS space
operations supports systems;telecom billing;consolidation;telecom interconnection;quintessent;ap engines
train_832
Senate to Powell: regulate more [FCC]
FCC Chairman Michael Powell pitched a six-step market-based recovery plan to the Senate last week, but two members of the Commerce Committee told him telecom's revival requires more reliance on regulation
telecom industry;recovery plan;fcc;us senate commerce committee
train_833
Packet promises past & present [IP switching]
With the death of the competitive carrier market and the significant slashing of RBOC capex budgets, softswitch vendors have been forced to retrench. Now instead of focusing primarily on limited Internet off-load applications, packet-based softswitches are set to gel around real user needs for services such as voice ov...
voice over ip;softswitch vendors;ip centrex
train_834
Commerce Department plan eases 3G spectrum crunch
The federal government made its first move last week toward cleaning up a spectrum allocation system that was in shambles just a year ago and had some, spectrum-starved wireless carriers fearing they wouldn't be able to compete in third-generation services. The move, however, is far from complete and leaves numerous de...
spectrum allocation system;federal government;wireless carriers;3g spectrum
train_835
Pioneering women in computer science
Although their contributions are not well documented, women have played an important role in the development of computer science. A survey of women pioneers demonstrates their influence in designing and programming the first electronic computers and languages, while laying the groundwork for women's expanding involveme...
pioneering women;electronic computers;programming languages;computer science development;history
train_836
Recruitment and retention of women graduate students in computer science and
engineering: results of a workshop organized by the Computing Research Association This document is the report of a workshop that convened a group of experts to discuss the recruitment and retention of women in computer science and engineering (CSE) graduate programs. Participants included long-time members of the CSE ...
social scientists;academic communities;engineering;research communities;computer science;directors;recruitment;retention;computing research association;workshop participants;women graduate students
train_837
Ten suggestions for a gender-equitable CS classroom
Though considerable attention has been paid to the creation of a nurturing environment for women in the field of computer science, proposed solutions have primarily focused on activities outside of the classroom. This paper presents a list of suggestions for modifications to both the pedagogy and content of CS courses ...
nurturing environment;cs classroom environment;gender-equitable classroom;women students;computer science;pedagogy;cs course content
train_838
Pool halls, chips, and war games: women in the culture of computing
Computers are becoming ubiquitous in our society and they offer superb opportunities for people in jobs and everyday life. But there is a noticeable sex difference in use of computers among children. This article asks why computers are more attractive to boys than to girls and offers a cultural framework for explaining...
women;computer games;culture of computing;male adolescent culture;teachers;sex difference;educational software;children
train_839
Women in computing: what brings them to it, what keeps them in it?
Career stereotyping and misperceptions about the nature of computing are substantive reasons for the under representation of women in professional computing careers. In this study, 15 women who have work experience in several aspects of computing were asked about their reasons for entering computing, what they liked ab...
women;personal abilities;politics;career stereotyping;professional computing careers;misperceptions
train_84
Efficient cellular automata based versatile multiplier for GF(2/sup m/)
In this paper, a low-complexity programmable cellular automata (PCA) based versatile modular multiplier in GF(2/sup m/) is presented. The proposed versatile multiplier increases flexibility by using the same multiplier in different security environments, and it reduces the user's cost. Moreover, the multiplier can be e...
cellular automata based versatile multiplier;smart cards;security environments;low-complexity programmable cellular automata;wireless devices;restricted computing environments
train_840
Gender benders [women in computing profession]
As a minority in the upper levels of the computing profession, women are sometimes mistreated through ignorance or malice. Some women have learned to respond with wit and panache
women;computing profession
train_841
Becoming a computer scientist
The focus of this report is pipeline shrinkage for women in computer science. We describe the situation for women at all stages of training in computer science, from the precollege level through graduate school. Because many of the problems discussed are related to the lack of role models for women who are in the proce...
women;pipeline shrinkage;women faculty members;computer science;role models
train_842
The incredible shrinking pipeline
We look at the harsh facts concerning the percentage of degrees awarded in CS to women. We study the trend of degrees awarded in CS since 1980, and compare the trend in CS to other science and engineering disciplines. We consider the relationship between the percentage of degrees awarded to women by a CS department and...
women;science;engineering;pipeline shrinkage problem;computer science degrees
train_843
An ACM-W literature review on women in computing
The pipeline shrinkage problem for women in computer science is a well-known and documented phenomenon where the ratio of women to men involved in computing shrinks dramatically from early student years to working years. During the last decade, considerable research ensued to understand the reasons behind the existence...
acm-w literature review;pipeline shrinkage problem;acm committee on women in computing
train_844
Women in computing history
Exciting inventions, innovative technology, human interaction, and intriguing politics fill computing history. However, the recorded history is mainly composed of male achievements and involvements, even though women have played substantial roles. This situation is not unusual. Most science fields are notorious for exc...
women;computing history
train_845
Gender, software design, and occupational equity
After reviewing the work on gender bias in software design, a model of gender-role influenced achievement choice taken from Eccles (1994) is presented. The paper concludes that (1) though laudable, reduction of gender bias in software design is not the most straightforward way to reduce gender inequity in the choice of...
gender bias;software design;gender-role influenced achievement choice model;occupational equity;ethical issues;computing career
train_846
Female computer science doctorates: what does the survey of earned doctorates
reveal? Based on the National Center for Education Statistics (2000), in the 1997-1998 academic year 26.7% of earned bachelors' degrees, 29.0% of earned masters' degrees and 16.3% of earned doctorates' degrees in computer science were awarded to women. As these percentages suggest, women are underrepresented at all aca...
survey of earned doctorates;female computer science doctorates;information science
train_847
A gendered view of computer professionals: preliminary results of a survey
The under-representation of women in the computing profession in many parts the western world has received our attention through numerous publications, the noticeable low representation of women at computer science conferences and in the lecture halls. Over the past two decades, the situation had become worse. This pap...
computing profession;employment;female students;women under-representation;computing courses;mate students;future computer professional perceptions
train_848
Women in computing around the world
This paper describes the participation of women in computing in more than 30 countries, by focussing on participation at undergraduate level. A brief discussion covers how societal and cultural factors may affect women's participation. Statistics from many different sources are presented for comparison. Generally, part...
women;societal factors;undergraduate computing;statistics;cultural factors
train_849
Ten years of strategies to increase participation of women in computing
programs. The Central Queensland University experience: 1999-2001 In the late eighties, the participation rate of women in information technology courses in most Australian Universities was around 25%. This low level of women's participation in computing courses occurs not only in Australia but also overseas. More stud...
demographics;women;central queensland university;computing programs;australian higher education
train_85
Strategic implementation of IT/IS projects in construction: a case study
The need for improved implementation of Information Technology (IT) and Information Systems (IS) has been emphasised in both empirical and prescriptive research studies. This problem is magnified in the construction industry, which has been slow to embrace and utilise new technologies with negative consequences on prod...
swot analysis;information technology;construction industry;analytical hierarchy process;project management information system;strategic implementation;mobile phone telecommunications network;large multi-national construction organisation;predictors;strategic implementation framework;information systems
train_850
Encouraging women in computer science
At a cost to both their own opportunities and society's ability to produce people with much-needed technical skills, women continue to be underrepresented in computer science degree programs at both the undergraduate and graduate level. Although some of the barriers that women face have their foundations in cultural ex...
graduate level;women student retention;technical skills;women student recruitment;undergraduate level;computer science degree programs;cultural expectations
train_851
Unlocking the clubhouse: the Carnegie Mellon experience
In the fall of 1995, just seven of 95 students entering the undergraduate program in computer science at Carnegie Mellon University were women. In 2000, 54 of 130, or 42%, were women. What happened? This article presents a brief history of the transformation at Carnegie Mellon's School of Computer Science, and the rese...
women;research project;carnegie mellon university;gender issues;history;undergraduate program;students;computer science education
train_852
Building an effective computer science student organization: the Carnegie
Mellon Women@SCS action plan This paper aims to provide a practical guide for building a student organization and designing activities and events that can encourage and support a community of women in computer science. This guide is based on our experience in building Women@SCS, a community of women in the School of Co...
women;carnegie mellon university;gender issues;computer science student organization;women@scs action plan;student leadership;computer science education
train_853
Virtual Development Center
The Virtual Development Center of the Institute for Women and Technology seeks to significantly enhance the impact of women on technology. It addresses this goal by increasing the number of women who have input on created technology, enhancing the ways people teach and develop technology, and developing need-based tech...
women;information technology;gender issues;community groups;virtual development center;computer science education;teaching
train_854
A conference's impact on undergraduate female students
In September of 2000, the 3rd Grace Hopper Celebration of Women in Computing was held in Cape Cod, Massachusetts. Along with a colleague from a nearby university, we accompanied seven of our female undergraduate students to this conference. This paper reports on how the conference experience immediately affected these ...
undergraduate female students;conference;gender issues;computer science education;engineering education
train_855
Support communities for women in computing
This article highlights the many activities provided by the support communities available for women in computing. Thousands of women actively participate in these programs and they receive many benefits including networking and professional support. In addition, the organizations and associations help promote the accom...
women;support communities;professional support;faculty members;networking;computing;information dissemination
train_856
People who make a difference: mentors and role models
The literature of gender issues in computing steadfastly and uniformly has advocated the use of mentors and role models (M&RM) for recruiting and retaining women in computer science. This paper, therefore, accepts the results of research studies and avoids reiterating details of the projects but offers instead a practi...
women retention;women recruitment;gender issues;computer science;computing;role models;mentors
train_857
Leveraging an alternative source of computer scientists: reentry programs
Much has been written about the leaky pipeline of women in computer science (CS), with the percentage of women decreasing as one moves from lower levels, such as college, to higher levels, culminating in full professorship. While significant attention focused on keeping women from leaving the pipeline, there is also an...
minorities;women;reentry programs;uc berkeley;professional employment;computer science;graduate degrees;students;mills college
train_858
Recruiting and retaining women in undergraduate computing majors
This paper recommends methods for increasing female participation in undergraduate computer science. The recommendations are based on recent and on-going research into the gender gap in computer science and related disciplines. They are intended to work in tandem with the Computing Research Association's recommendation...
women recruitment;computer science;female participation;undergraduate computing majors;women retention;gender gap
train_859
Developing a hardware and programming curriculum for middle school girls
Techbridge provides experiences and resources that would teach girls technology skills as well as excite their curiosity and build their confidence. Funded by the National Science Foundation and sponsored by Chabot Space and Science Center in Oakland, California, Techbridge is a three-year program that serves approxima...
hardware and programming curriculum;techbridge;technology skills teaching;middle school girls
train_86
Laser-based internal profile measurement system
An automatic laser-based system to measure the internal profiles of various structures has been developed. The system uses a point laser source through a rotating optical device fixed on to a laser measurement meter. A notebook computer with custom software is used to control the laser meter and rotating device to esti...
point laser source;cost estimation;internal profiles;carpet venders;laser meter;laser-based internal profile measurement system;floor tile manufacturers;building contractors;rotating optical device;rotating device;window frames;production control;customized windowpanes
train_860
'Virtual Family': an approach to introducing Java programming
This paper introduces and discusses Virtual Family (VF): a gender-neutral game-based software that introduces Java programming. VF provides a completely functioning game that students extend and enhance via programming. We discuss the background and context within which Virtual Family was developed and other available ...
virtual family;supporting women in information technology;high-school teaching units;teaching workshops;java programming teaching;gender-neutral game-based software;multimedia resources
train_861
The decision procedure for profitability of investment projects using the
internal rate of return of single-period projects The internal rate of return (IRR) criterion is often used to evaluate profitability of investment projects. In this paper, we focus on a single-period project which consists of two types of cash flows; an investment at one period and a return at a succeeding period, and...
decision procedure;project investment rate;irr criterion;investment project profitability;single-period projects;pir;cash flows;profitability;internal rate of return;investment project decomposition
train_862
Two efficient algorithms for the generalized maximum balanced flow problem
Minoux (1976) considered the maximum balanced flow problem, i.e. the problem of finding a maximum flow in a two-terminal network N = (V,A) with source s and sink t satisfying the constraint that any arc-flow of N is bounded by a fixed proportion of the total flow value from s to t, where V is vertex set and A is arc se...
polynomial algorithms;two-terminal network;generalized maximum balanced flow problem;parameterized technique
train_863
A scanline-based algorithm for the 2D free-form bin packing problem
This paper describes a heuristic algorithm for the 2D free-form bin packing (2D-FBP) problem. Given a set of 2D free-form bins and a set of 2D free-form items, the 2D-FBP problem is to lay out items inside one or more bins in such a way that the number of bins used is minimized, and for each bin, the yield is maximized...
heuristic algorithm;group placement algorithm;shipbuilding company;2d-fbp problem;irregular packing;scanline-based algorithm;yield maximization;2d free-form bin packing problem;minimization;first-fit decreasing algorithm;irregular cutting;nesting problem
train_864
Valuing corporate debt: the effect of cross-holdings of stock and debt
We have developed a simple approach to valuing risky corporate debt when corporations own securities issued by other corporations. We assume that corporate debt can be valued as an option on corporate business asset value, and derive payoff functions when there exist cross-holdings of stock or debt between two firms. N...
cross-shareholdings;credit risks;risky corporate debt valuation;option;payoff functions;stock holdings;multiple cross-holdings;debt holdings;monte carlo simulation;corporate business asset value;securities;correlation;bond holder;modigliani-miller theorem
train_865
Setup cost and lead time reductions on stochastic inventory models with a
service level constraint The stochastic inventory models analyzed in this paper explore the problem of lead time associated with setup cost reductions for the continuous review and periodic review inventory models. For these two models with a mixture of backorders and lost sales, we respectively assume that their mean ...
minimax distribution free procedure;lead time demand;lead time reductions;continuous review inventory models;service level constraint;probability distributions;lost sales;backorders;periodic review inventory models;stochastic inventory models;setup cost reductions;protection interval
train_866
Adjoint-based optimization of steady suction for disturbance control in
incompressible flows The optimal distribution of steady suction needed to control the growth of single or multiple disturbances in quasi-three-dimensional incompressible boundary layers on a flat plate is investigated. The evolution of disturbances is analysed in the framework of the parabolized stability equations (PS...
incompressible flows;adjoint-based optimization;gradient-based optimization procedure;laminar-turbulent transition;tollmien-schlichting waves;parabolized stability equations;stabilization procedure;mean flow;oblique waves;steady cross-flow mode;quasithree-dimensional incompressible boundary layers;steady streamwise str...
train_867
Tracking control of the flexible slider-crank mechanism system under impact
The variable structure control (VSC) and the stabilizer design by using the pole placement technique are applied to the tracking control of the flexible slider-crank mechanism under impact. The VSC strategy is employed to track the crank angular position and speed, while the stabilizer design is involved to suppress th...
conservation laws;continuous force model;flexible vibrations;generalized momentum balance;tracking trajectory;impact;tracking control;effective mass compensation;crank angular position;pole placement technique;flexible connecting rod;multibody dynamics;variable structure control;stabilizer design;flexible slider-crank ...
train_868
Two quantum analogues of Fisher information from a large deviation viewpoint of
quantum estimation We discuss two quantum analogues of the Fisher information, the symmetric logarithmic derivative Fisher information and Kubo-Mori-Bogoljubov Fisher information from a large deviation viewpoint of quantum estimation and prove that the former gives the true bound and the latter gives the bound of consi...
kubo-mori-bogoljubov fisher information;consistent superefficient estimators;symmetric logarithmic derivative fisher information;quantum analogues;quantum estimation;statistical inference;large deviation viewpoint
train_869
An exactly solvable random satisfiability problem
We introduce a new model for the generation of random satisfiability problems. It is an extension of the hyper-SAT model of Ricci-Tersenghi, Weigt and Zecchina (2001), which is a variant of the famous K-SAT model: it is extended to q-state variables and relates to a different choice of the statistical ensemble. The mod...
statistical ensemble;exact duality;thermodynamic properties;hyper-sat model;q-state variables;error correcting codes;exactly solvable random satisfiability problem;exact finite-size corrections;random energy model;disordered spin system theory
train_87
Positional control of pneumatic manipulators for construction tasks
This paper describes solutions that can be applied to pneumatic manipulator problems in positioning, both for angle trajectories and for long linear trajectories, used in construction tasks. Optimal positioning of a pneumatic manipulator along angle trajectories with minimum control energy consumption is given. The imp...
three-phase motion modes;angle trajectories;gantry type machines;fuzzy logic controls;positioning;construction tasks;positional control;long linear trajectory manipulator;two-phase motion modes;pneumatic manipulators
train_870
Speaker identification from voice using neural networks
The paper provides three different schemes for speaker identification of personnel from their voice using artificial neural networks. The first scheme recognizes speakers by employing the classical backpropagation algorithm pre-trained with known voice samples of the persons. The second scheme provides a framework for ...
classification;hierarchical architecture;personnel;radial basis function neural net;self-organizing feature map;known voice samples;pre-training;artificial neural networks;speaker identification;2d arrays;feedforward layers;backpropagation algorithm
train_871
Priming the pipeline [women in computer science careers]
In 1997 The Backyard Project, a pilot program of the Garnett Foundation, was instituted to encourage high school girls to explore careers in the computer industry. At that time, the Garnett Foundation commissioned the Global Strategy Group to execute a survey of 652 college-bound high school students (grades 9 through ...
college-bound high school students;computer industry careers;high school girls;the backyard project
train_872
Shortchanging the future of information technology: the untapped resource
Building on ideas from a virtual workshop and additional input from the scientific community, the CISE Directorate at the National Science Foundation established the Information Technology Workforce Program (ITWF) in March 2000 to support a broad set of scientific research studies focused on the under-representation of...
itwf;information technology workforce program;women under-representation;scientific research studies;untapped resources;cise directorate;information technology future;virtual workshop;history;national science foundation
train_873
Programmatic efforts encouraging women to enter the information technology
workforce For over a decade the National Science Foundation (NSF) has been supporting projects designed to improve opportunities for women in computing. From an initial emphasis on increasing the number of women in graduate school studying computer science and engineering, NSF's current emphasis has broadened to includ...
it workforce;graduate school;women;engineering;computing;history;national science foundation
train_874
The curious ways of professional cultures and the "two-body opportunity"
When two professionals are a couple, we sometimes refer to them as having a "two-body problem." However, when each partner of a couple exists in the same cultures, they also have an opportunity for deeply shared understanding and empathy, simply because each understands at a deep level the culture in which the other wo...
computer science;academics;professional cultures;two-body opportunity
train_875
Women of color in computing
It is well known that there is a need to increase the number of women in the area of computing, that is in computer science and computer engineering. If we consider women of color, that is women of under-represented ethnicities, we find the numbers are very dismal. The goal of this article is to bring to light the uniq...
computer engineering;gender issues;women of color;higher education;computer science;society;ethnic minority
train_876
Perspectives on academic vs. industry environments for women in computer
science The authors were tenure track faculty members at the Colorado School of Mines and later moved into senior positions at software companies. Both are part of two-career couples as well, and both have two children. In this article, they discuss their impressions and share anecdotes regarding the differing experien...
women;career;industry environment;faculty members;academic environments;computer science;software companies;children;gender gap
train_877
What do you say? Open letters to women considering a computer science major
In the last decade we have both monitored with great interest the ratio of female to male computer science majors at our respective institutions. With each entering class, we think: "Surely, now is the time when the numbers will become more balanced." Logic tells us that this must eventually happen, because the opportu...
women;gender issues;computer science majors;female;computer science education;male
train_878
Girls, boys, and computers
Today North American girls, boys, teachers, and parents frequently regard computer science and programming as something boys are better at. The author considers how many of the factors that contribute to the low participation of women in computing occur first, and perhaps most forcefully, in childhood. She presents fou...
women;girls;gender issues;computer science;teachers;childhood;programming;boys
train_879
Well behaved women rarely make history!
The author considers women in the history of computer science. Prior to the ENIAC, women were extremely important to the computing business as "computers". Just as women had taken over the tasks as secretaries in the late 1800s with the advent of the typewriter, and in the early 1900s staffing telephone exchanges, so c...
women;gender issues;business;eniac;computer science;history
train_88
Planning linear construction projects: automated method for the generation of
earthwork activities Earthworks planning for road construction projects is a complex operation and the planning rules used are usually intuitive and not well defined. An approach to automate the earthworks planning process is described and the basic techniques that are used are outlined. A computer-based system has bee...
knowledge base;earthworks planning process;road construction projects;planning rules;earthwork activities;computer-based system;linear construction projects
train_880
Computing 2002: democracy, education, and the future
Computer scientists, computer engineers, information technologists, and their collective products have grown and changed in quantity, quality, and nature. In the first decade of this new century, it should become apparent to everyone that the computing and information fields, broadly defined, will have a profound impac...
women;girls;future;gender issues;democracy;society;computer science education
train_881
Is diversity in computing a moral matter?
We have presented an ethical argument that takes into consideration the subtleties of the issue surrounding under-representation in computing. We should emphasize that there is nothing subtle about overt, unfair discrimination. Where such injustice occurs, we condemn it. Our concern is that discrimination need not be e...
women;unfair discrimination;ethical argument;social institutions;computing under-representation;social practices
train_882
On M/D/1 queue with deterministic server vacations
We study a single server vacation queue with Poisson arrivals, deterministic service of constant duration b (> 0) and deterministic vacations of constant duration d (> 0) and designate this model as M/D/D/1. After completion of each service, the server may take a vacation with probability p or may continue working in t...
m/d/1 queue;mean waiting time;deterministic vacations;steady state probability generation functions;mean number;deterministic server vacations;poisson arrivals;m/d/d/1 model;time-dependent probability generation functions;deterministic service
train_883
On conflict-free executions of elementary nets
Deals with analysis of elementary Petri nets with respect to possibilities of avoiding conflicts during their executions. There are two main aims of the paper. The first is to find a method of checking if a net is conflict-avoidable (i.e., if it possesses a conflict-free fair run). The second is to find a method of reb...
elementary petri nets;conflict-free executions;decidability;conflict-free fair run;reduced case graph;totally conflict-avoidable net
train_884
A hybrid-neural network and population learning algorithm approach to solving
reliability optimization problem Proposes a hybrid approach integrating a dedicated artificial neural network and population learning algorithm applied to maximising system reliability under cost and technical feasibility constraints. The paper includes a formulation of the system reliability optimisation (SRO) problem...
cost constraints;reliability optimization problem;technical feasibility constraints;population learning algorithm;system reliability;dedicated artificial neural network;hybrid approach
train_885
Assignment of periods and priorities of messages and tasks in distributed
control systems Presents a task and message-based scheduling method to guarantee the given end-to-end constraints including precedence constraints, time constraints, and period and priority of task and message. The method is an integrated one considering both tasks executed in each node and messages transmitted via the...
end-to-end constraints;task-based scheduling method;time constraints;message-based scheduling method;precedence constraints;distributed control systems;periods assignment;priorities assignment
train_886
A fractional-flow model of serial manufacturing systems with rework and its
reachability and controllability properties A dynamic fractional-flow model of a serial manufacturing system incorporating rework is considered. Using some results on reachability and controllability of positive linear systems the ability of serial manufacturing systems with rework to "move in space", that is their rea...
rework;controllability;serial manufacturing systems;performance optimisation;positive linear systems;reachability;feedback control;dynamic fractional-flow model
train_887
Towards strong stability of concurrent repetitive processes sharing resources
The paper presents a method for design of stability conditions of concurrent, repetitive processes sharing common resources. Steady-state behaviour of the system with m cyclic processes utilising a resource with the mutual exclusion is considered. Based on a recurrent equations framework necessary and sufficient condit...
necessary and sufficient conditions;strong stability;maximal performance steady-state;concurrent repetitive processes;mutual exclusion;steady-state behaviour;cyclic processes;3-process system;waiting-free steady-states;constraint logic programming;oz language;recurrent equations framework;common resources
train_888
Storage functionals and Lyapunov functions for passive dynamical systems
For nonlinear time-invariant input-output dynamical systems the passivity conditions are obtained under some restrictions. The conditions imply storage functions satisfying a dissipation inequality. A class of storage functions allowing unique reconstruction of a passive dynamical system is defined. These results are i...
nonequilibrium thermodynamics;viscoelastic materials;necessary condition;passive dynamical systems;dissipation inequality;automatic control;fading memory;mechanics;storage functionals;thermodynamic potential;linear system;passivity conditions;nonlinear time-invariant input-output dynamical systems;complete monotonicity...
train_889
Synthesis of the control systems via reflection onto auxiliary surfaces
An approach to robust control systems synthesis, both linear and nonlinear, and nonstationary is offered. The control is carried out, providing the given phase constraints varied in acceptable limits, in view of constraints on its value and incompleteness of the information about functioning disturbances. The approach ...
auxiliary surfaces;linear equivalent moving;robust control systems;control systems synthesis;integral inequalities;linear systems;nonlinear systems;algebraic inequalities
train_89
A framework for rapid local area modeling for construction automation
Rapid 3D positioning and modeling in construction can be used to more effectively plan, visualize, and communicate operations before execution. It can also help to optimize equipment operations, significantly improve safety, and enhance a remote operator's spatial perception of the workspace. A new framework for rapid ...
pre-stored computer-aided design models;equipment operations;rapid local area modeling;single-axis laser rangefinders;remote video cameras;3d modeling;construction automation;spatial perception;rapid local area sensing;human-assisted graphical workspace modeling;rapid 3d positioning
train_890
Multiple criteria decision making without optimization
We present a development intended to make interactive decision making schemes accessible for a wider spectrum of decision makers. To this aim we propose to eliminate the need to solve optimization problems at successive iterations of interactive decision processes. We show that the need for optimization can be eliminat...
multiple criteria decision making;criteria values bounds;efficient decisions;decision makers;interactive decision making schemes
train_891
Establishing the discipline of physics-based CMP modeling
For the past decade, a physically based comprehensive process model for chemical mechanical polishing has eluded the semiconductor industry. However, a long-term collaborative effort has now resulted in a workable version of that approach. The highly fundamental model is based on advanced finite element analysis and is...
cmp;chemical mechanical polishing;finite element analysis;cmp process development;physically based process model
train_892
Dementing disorders: volumetric measurement of cerebrospinal fluid to
distinguish normal from pathologic finding - feasibility study We have demonstrated that automated methods to describe the severity and distribution of cerebral atrophy are capable of providing diagnostic information in the classification of neurodegenerative diseases
dementing disorders;neurodegenerative diseases classification;cerebral atrophy distribution;diagnostic information;cerebral atrophy severity;normal-pathologic findings distinguishing;automated methods;healthy subjects;medical diagnostic imaging;cerebrospinal fluid volumetric measurement;magnetic resonance imaging techn...
train_893
Use of natural language processing to translate clinical information from a
database of 889,921 chest radiographic reports The aim was to evaluate translation of chest radiographic reports using natural language processing and to compare the findings with those in the literature. A natural language processor coded 10 years of narrative chest radiographic reports from an urban academic medical ...
stab wounds;clinical condition cooccurrence;pleural effusion;pneumothorax coding;bullet wounds;chest radiographic report database;urban academic medical center;natural language processing;clinical information translation;right to left lung mass ratio;clinical condition frequency
train_894
Improved detection of lung nodules by using a temporal subtraction technique
The authors evaluated the effect of a temporal subtraction technique for digital chest radiography with regard to the accuracy of detection of lung nodules. Twenty solitary lung nodules smaller than 30 mm in diameter, including 10 lung cancers and 10 benign nodules, were used. The nodules were grouped subjectively acco...
temporal subtraction technique;subtle cases;radiology residents;improved lung nodules detection;digital chest radiography;30 mm;observer performance;certified radiologists;computed radiographic system;peripheral lung nodules;medical diagnostic imaging;university of chicago;perceptible interval changes
train_895
Algorithms for improving the quality of R-trees
A novel approach to operation with a structure for spatial indexing of extended objects shaped as R-trees is considered. It consists of the initial global construction of an efficient R-tree structure and the subsequent operation with it using conventional dynamic algorithms. A global strategy for constructing an R-tre...
rectangular objects;computational geometry;graphical search;extended objects;minimum mutual overlay;r-trees;spatial indexing;dynamic algorithms
train_896
Calculation of the probability of survival of an insurance company with
allowance for the rate of return for a Poisson stream of premiums The probability of survival of an insurance company with the working capital is calculated for a Poisson stream of premiums
poisson premium stream;survival probability;insurance company;probability density function;return rate
train_897
Optimization of advertising expenses in the functioning of an insurance company
With the use of Pontryagin's maximum principle, a problem of optimal time distribution of advertising expenses in the functioning of an insurance company is solved
insurance company;optimal time distribution;optimization;pontryagin maximum principle;advertising expenses;differential equations
train_898
Influence of advertising expenses on the characteristics of functioning of an
insurance company The basic characteristics of the functioning of an insurance company, including the average capital, ruin and survival probabilities, and the conditional time before ruin, are examined with allowance for advertising expenses
survival probabilities;conditional time;ruin probabilities;insurance company functioning characteristics;average capital;advertising expenses influence
train_899
Mathematical model of functioning of an insurance company with allowance for
advertising expenses A mathematical model of the functioning of an insurance company with allowance for advertising expenses is suggested. The basic characteristics of the capital of the company and the advertising efficiency are examined in the case in which the advertising expenses are proportional to the capital
advertising expenses allowance;capital;mathematical model;insurance company functioning
train_9
Achieving competitive capabilities in e-services
What implications does the Internet have for service operations strategy? How can business performance of e-service companies be improved in today's knowledge-based economy? These research questions are the subject of the paper. We propose a model that links the e-service company's knowledge-based competencies with the...
business performance;delivery;structural capital;bricks-and-mortar;clicks-and-mortar;knowledge-based competencies;investment;intellectual capital;flexibility;combinative capabilities;absorptive capacity;knowledge-based economy;service operations strategy;service quality;internet;human capital;strategic imperatives;cost...
train_90
LAN-based building maintenance and surveillance robot
The building and construction industry is the major industry of Hong Kong as in many developed countries around the world. After the commissioning of a high-rise building or a large estate, substantial manpower, both inside the management centre under a standby manner, as well as surveillance for security purposes arou...
pan/tilt/zoom functions;hardware structure;high-rise building;local area network;lan-based building maintenance and surveillance robot;building management system;first-line fault attendance;landmark recognition method;teleoperation;security purposes
train_900
Mathematical models of functioning of an insurance company with allowance for
the rate of return Models of the functioning of insurance companies are suggested, when the free capital increases from interest at a certain rate. The basic characteristics of the capital of a company are studied in the stationary regime
free capital increase;return rate allowance;stationary regime;interest;insurance company functioning;mathematical models
train_901
Estimation of the Poisson stream intensity in a multilinear queue with an
exponential job queue decay Times the busy queue periods start are found for a multilinear queue with an exponential job queue decay and uniform resource allocation to individual servers. The stream intensity and the average job are estimated from observations of the times the queue busy periods start
individual servers;stream intensity;uniform resource allocation;poisson stream intensity;multilinear queue;exponential job queue decay;busy queue periods start
train_902
TCP explicit congestion notification over ATM-UBR: a simulation study
The enhancement of transmission control protocol's (TCP's) congestion control mechanisms using explicit congestion notification (ECN) over asynchronous transfer mode (ATM) networks is overviewed. TCP's congestion control is enhanced so that congestion is indicated by not only packet losses as is currently the case but ...
tcp explicit congestion notification;packet losses;cell loss;atm networks;agent;simulation;throughput;packet retransmissions;congestion control mechanisms;unspecified bit rate service;credit-based window size;buffer utilization;explicit forward congestion indication bits;atm-ubr
train_903
Modeling and simulation of an ABR flow control algorithm using a virtual
source/virtual destination switch The available bit rate (ABR) service class of asynchronous transfer mode networks uses a feedback control mechanism to adapt to varying link capacities. The virtual source/virtual destination (VS/VD) technique offers the possibility of segmenting the otherwise end-to-end ABR control lo...
closed segments;control model;link capacities;transient behavior;virtual source/virtual destination switch;feedback delay;fair bandwidth distribution;atm networks;available bit rate service class;performance issues;high link utilization;classical linear control theory;feedback control mechanism;robust operation;traffic...
train_904
Modeling and simulation of adaptive available bit rate voice over asynchronous
transfer mode networks This article presents a modeling and simulation methodology to analyze the performance of voice quality when sent over the available bit rate service in asynchronous transfer mode networks. Sources can modify the rate at which they send traffic to the network based on the feedback carried in the ...
feedback;queue size;performance analysis;averaging interval length;voice quality;traffic;bandwidth contention;scheduling/drop policies;atm networks;performance metrics;simulation;resource management cells;encoding level;adaptive available bit rate voice;link capacity;modeling
train_905
Ultra-high speed positioning control of a gravure engraving unit using a
discrete-time two-degree-of-freedom H/sub infinity / control The piezoelectric actuator has high-speed response in comparison with the electro-magnetic actuator. However, it is not easy to achieve both high-speed and high-precision response by feedforward control only because the piezoelectric element has nonlinear pro...
discrete-time two-degree-of-freedom h/sub infinity / control;high-precision response;digital control system;hysteresis;control design method;ultra-high speed positioning control;piezoelectric actuator;feedback control;feedforward;gravure engraving unit;nonlinear properties
train_906
High-performance servo systems based on multirate sampling control
In this paper, novel multirate two-degree-of-freedom controllers are proposed for digital control systems, in which the sampling period of plant output is restricted to be relatively longer than the control period of plant input. The proposed feedforward controller assures perfect tracking at M inter-sampling points. O...
feedback;hard disk drive;disturbance rejection;position control;tracking;digital control systems;feedforward;multirate sampling control;servo system
train_907
Development of an integrated and open-architecture precision motion control
system In this paper, the development of an integrated and open-architecture precision motion control system is presented. The control system is generally applicable, but it is developed with a particular focus on direct drive servo systems based on linear motors. The overall control system is comprehensive, comprising...
feedback;geometrical error compensation;adaptive notch filter;dspace ds1004 processor;open-architecture;precision;direct drive servo systems;composite controller;motion control;feedforward;linear motors