Branding/Logomark minus arrow-point-to-down Citation Combined Shape Icon/Bookmark-empty Icon/Copy Icon/Collection Icon/Close Copy 7 Icon/List
Loading Scinapse...
Did you mean long computer science ?
1 page of 2,285 pages (22.8k results)
Sort by : Relevance
2011 in IEEE Sensors Journal [IF: 2.51]
Sergi Foix8
Estimated H-index: 8
,
Guillem Alenyà5
Estimated H-index: 5
,
Carme Torras25
Estimated H-index: 25
This paper reviews the state-of-the art in the field of lock-in time-of-flight (ToF) cameras, their advantages, their limitations, the existing calibration methods, and the way they are being used, sometimes in combination with other sensors. Even though lock-in ToF cameras provide neither higher resolution nor larger ambiguity-free range compared to other range map estimation systems, advantages such as registered depth and intensity data at a high frame rate, compact design, low ...
Ref 58Cited 251
Download PDF
Cite this paper
Robert A. Burgelman19
Estimated H-index: 19
To examine the consequences of a period of extraordinary success for the long-term adaptive capability of a firm's strategy-making process, this comparative longitudinal study of Andy Grove's tenure as Intel Corporation's chief executive officer (CEO) documents how he moved Intel's strategy-making process from an internal-ecology model to the classical rational-actor model during 1987-1998. His creation of a highly successful strategy vector pursued through an extremely focused induced-strategy ...
Ref 38Cited 475
Source
Cite this paper
Stan J. Liebowitz24
Estimated H-index: 24
,
Stephen E. Margolis9
Estimated H-index: 9
Do economies and markets make remediable errors in the choice of products? Does the economy "lock-in" to these incorrect choices even when the knowledge that these choices are incorrect is readily available? The literature of path dependence may be understood to argue that these lock-ins and errors occur, even in a world characterized by voluntary decisions and individually maximizing behavior. In this paper we examine path dependence and illustrate three different forms of the ter...
Ref 24Cited 734
Source
Cite this paper
The author examines the questions of whether there are efficient algorithms for software spin-waiting given hardware support for atomic instructions, or whether more complex kinds of hardware support are needed for performance. He considers the performance of a number of software spin-waiting algorithms. Arbitration for control of a lock is in many ways similar to arbitration for control of a network connecting a distributed system. He applies several of the static and dynamic arbitration...
Ref 27Cited 496
Download PDF
Cite this paper
Guang-Huei Chiou1
Estimated H-index: 1
,
Wen-Tsuen Chen28
Estimated H-index: 28
The authors discuss secure broadcasting, effected by means of a secure lock, on broadcast channels, such as satellite, radio, etc. This lock is implemented by using the Chinese Remainder theorem (CRT). The secure lock offers the following advantages: only one copy of the ciphertext is sent; the deciphering operation is efficient; and the number of secret keys held by each user is minimized. Protocols for secure broadcasting using the secure lock, based on the public-k...
Ref 3Cited 245
Source
Cite this paper
2009 in Economic Geography [IF: 5.34]
Ron Martin47
Estimated H-index: 47
This article argues that in its "canonical" form, the path dependence model, with its core concept of lock-in, affords a restrictive and narrowly applicable account of regional and local industrial evolution, an account moreover that is tied to problematic underpinnings based on equilibrist thinking. As such, the canonical path dependence model actually stresses continuity rather than change. The article explores recent developments in political science, in which there have been ac...
Ref 77Cited 354
Source
Cite this paper
Danny Hendler19
Estimated H-index: 19
,
Nir Shavit49
Estimated H-index: 49
,
Lena Yerushalmi2
Estimated H-index: 2
The literature describes two high performance concurrent stack algorithms based on combining funnels and elimination trees. Unfortunately, the funnels are linearizable but blocking, and the elimination trees are non-blocking but not linearizable. Neither is used in practice since they perform well only at exceptionally high loads. The literature also describes a simple lock-free linearizable stack algorithm that works at low loads but does not scale as the load increases. The question of ...
Ref 30Cited 108
Source
Cite this paper
Michiel Plooij5
Estimated H-index: 5
,
Glenn Mathijssen9
Estimated H-index: 9
,
Pierre Cherelle7
Estimated H-index: 7
... more
Locking devices are widely used in robotics, for instance to lock springs and joints or to reconfigure robots. This review article classifies the locking devices currently described in the literature and performs a comparative study. Designers can therefore better determine which locking device best matches the needs of their application. The locking devices are divided into three main categories based on different locking principles: 1) mechanical lo...
Ref 83Cited 31
Source
Cite this paper
2015 in Chemical Communications [IF: 6.32]
Cátia Parente Carvalho6
Estimated H-index: 6
,
Zoe Domínguez1
Estimated H-index: 1
,
José P. Da Silva18
Estimated H-index: 18
... more
The reversible photoswitching between an anthracene derivative and its [4+4] dimer, using the template effect of the CB8 macrocycle, was demonstrated. This example of supramolecular chemistry in water was harnessed to demonstrate the operation of a keypad lock device that is driven by means of light and chemicals as inputs.
Ref 43Cited 28
Source
Cite this paper
Robin Cowan24
Estimated H-index: 24
,
Staffan Hultén9
Estimated H-index: 9
The study addresses the issue of technological “lock-in” and the possibilities of escape from it. Earlier literature on technological lock-in has tended to focus on intraindustry sources of positive feedbacks that are at the core of the technological lock-in phenomena. This study draws attention to the importance of interindustry sources in contributing to technological lock-in. Several possible avenues of escape from lock-in are discussed: crisis in existing t...
Ref 34Cited 211
Source
Cite this paper