نتایج جستجو برای: 03 and 2003
تعداد نتایج: 16850406 فیلتر نتایج به سال:
Dietary patterns, which represent a broader picture of food and nutrient consumption, have gained increasing interest over the last decades. In a cohort design, we followed 27 544 women aged 29-49 years from baseline in 1991-1992. We collected data from an FFQ at baseline and body weight (BW) and waist circumference (WC) data both at baseline and at follow-up in 2003. We calculated the Mediterr...
Discrimination of buried unexploded ordinance (UXO) from innocuous buried items remains a challenging, top priority problem for the electromagnetic induction (EMI) sensing community. In general, classification is an inverse problem, requiring very fast and accurate representation of the target response. To address this critical issue, this paper presents a very fast, rigorous way to compute EMI...
Orthogonal Frequency Division Multiplexing (OFDM) is robust against Inter-Symbol-Interference (ISI) due to the increase of the symbol duration. However, for mobile applications, channel variations during one OFDM symbol introduce Inter-Carrier-Interference (ICI), which degrades the performance. This gets more severe as mobile speed, carrier frequency or OFDM symbol duration increases. We introd...
Despite the remarkable success of open source software, there are a number of challenges to collaboration in open source software development, in particular, with respect to supporting collaboration among developers, supporting potential contributors, and in bringing users and developers together. In this paper, we examine some of the possible enhancements of open source development environment...
∗ This work was partially supported by Michigan State University IRGP Grant 41114 and by Hong Kong RGC Grant HKUST6161/03E. AbstractPeer-to-Peer (P2P) systems are self-organized and decentralized. However, the mechanism of a peer randomly joining and leaving a P2P network causes topology mismatching between the P2P logical overlay network and the physical underlying network. The topology mismat...
At the Dolev-Yao level of abstraction, security protocols can be specified using multisets rewriting. Such rewriting can be modeled naturally using proof search in linear logic. The linear logic setting also provides a simple mechanism for generating nonces and session and encryption keys via eigenvariables. We illustrate several additional aspects of this direct encoding of protocols into logi...
We complete the construction of the Moyal star formulation of bosonic open string field theory (MSFT) by providing a detailed study of the fermionic ghost sector. In particular, as in the case of the matter sector, (1) we construct a map from Witten's star product to the Moyal product, (2) we propose a regularization scheme which is consistent with the matter sector and (3) as a check of the fo...
We present a method for 3D face acquisition using a set or sequence of 2D binary silhouettes. Since silhouette images depend only on the shape and pose of an object, they are immune to lighting and/or texture variations (unlike feature or texturebased shape-from-correspondence). Our prior 3D face model is a linear combination of ”eigenheads” obtained by applying PCA to a training set of laser-s...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید