Browsing
     by title


0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

or enter first few letters:   
OK
See detailM wie Mitte
Heimböckel, Dieter UL

Article for general public (2012)

Detailed reference viewed: 53 (0 UL)
Full Text
Peer Reviewed
See detailm-order integrals and generalized Itô's formula; the case of a fractional Brownian motion with any Hurst index
Gradinaru, Mihai; Nourdin, Ivan UL; Russo, Francesco et al

in Annales de l'Institut Henri Poincare (B) Probability & Statistics (2005), 41(4), 781-806

Detailed reference viewed: 93 (4 UL)
Full Text
Peer Reviewed
See detailM-QAM Modulation Symbol-Level Precoding for Power Minimization: Closed-Form Solution
Krivochiza, Jevgenij UL; Merlano Duncan, Juan Carlos UL; Chatzinotas, Symeon UL et al

Scientific Conference (2019, August)

In this paper, we derive a closed-form algorithm of the computationally efficient Symbol-Level Precoding (SLP) for power efficient communications when using M-QAM modulated waveforms. The channel state ... [more ▼]

In this paper, we derive a closed-form algorithm of the computationally efficient Symbol-Level Precoding (SLP) for power efficient communications when using M-QAM modulated waveforms. The channel state information (CSI) based and data-aided SLP technique optimizes power efficiency by solving a non-negative convex quadratic optimization problem per time frame of transmitted symbols. The optimization combines constructive inter-user interference to minimize the sum power of precoded symbols at the transmitter side under constraints for minimum SNR at the receiver side. The SLP implementation incurs extra computational complexity of the transmitter. We propose a convex quadratic optimization problem for M-QAM constellations and derive a closed-form algorithm with a fixed number of iterations to solve the problem. [less ▲]

Detailed reference viewed: 96 (17 UL)
See detailM. A. Larsen: The Making and Shaping of the Victorian Teacher.
Priem, Karin UL

in H-Soz-u-Kult (2013)

Detailed reference viewed: 76 (10 UL)
Peer Reviewed
See detailThe M2 muscarinic receptor antagonist methoctramine activates mast cells via pertussis toxin-sensitive G proteins
Chahdi, A.; Daeffler, L.; Bueb, Jean-Luc UL et al

in Naunyn-Schmiedeberg's Archives of Pharmacology (1998), 357(4), 357-62

Methoctramine, a selective M2 muscarinic cholinergic receptor antagonist, has been reported to activate phosphoinositide breakdown at high concentrations. Its polyamine structure suggests a putative ... [more ▼]

Methoctramine, a selective M2 muscarinic cholinergic receptor antagonist, has been reported to activate phosphoinositide breakdown at high concentrations. Its polyamine structure suggests a putative activation of guanine nucleotide-binding proteins (G proteins). Incubation of methoctramine with rat peritoneal mast cells resulted in a dose-dependent noncytotoxic histamine release, with an EC50 of 20 microM and a maximum effect at 1 mM. Atropine, pirenzepine and HHSiD neither inhibited methoctramine-induced histamine release nor stimulated histamine release. Histamine release and inositol phosphates generation induced by methoctramine were both inhibited by pertussis toxin pretreatment. Benzalkonium chloride, a selective inhibitor of histamine secretion induced by basic secretagogues, inhibited the secretory response to methoctramine. [p-Glu5, D-Trp7,9,l0]-SPs5-11 (GPAnt-2), a well-characterized antagonist of G proteins, blocked the methoctramine-induced histamine release when the antagonist was allowed to reach its intracellular target by streptolysin O-permeabilization. The response to methoctramine was prevented by the hydrolysis of sialic acid residues of the cell surface by neuraminidase. The response of mast cells was restored by permeabilization of the plasma membrane. These results demonstrate that methoctramine, following its entry into the cell and the involvement of pertussis toxin-sensitive G proteins, activates phosphoinositide hydrolysis leading to mast cell exocytosis. [less ▲]

Detailed reference viewed: 131 (0 UL)
Full Text
Peer Reviewed
See detailM2 World Ocean Tide from Tide Gauge Measurements
Francis, Olivier UL; Mazzega, P.

in Geophysical Research Letters (1991), 18(6), 1167-1170

Detailed reference viewed: 90 (4 UL)
Full Text
See detailM2 World Ocean Tides from Tide Gauge and Gravity Loading Measurements
Francis, Olivier UL; Mazzega, Pierre

in Paquet, Paul; Flick, Johnny; Ducarme, Bernard (Eds.) GPS for Geodesy and (1990)

Detailed reference viewed: 91 (7 UL)
Full Text
Peer Reviewed
See detailM3: A Hardware/Operating-System Co-Design to Tame Heterogeneous Manycores
Asmussen, Nils; Volp, Marcus UL; Nöthen, Benedikt et al

in Architectural Support for Programming Languages and Operating Systems (ASPLOS) (2016, April)

Detailed reference viewed: 287 (30 UL)
Full Text
Peer Reviewed
See detail“Ma misi me per l’alto mare aperto”
Roelens, Nathalie UL

Scientific Conference (2017)

Detailed reference viewed: 45 (0 UL)
Full Text
Peer Reviewed
See detailMabuchi and Aubin-Yau functionals over complex manifolds
Li, Yi UL

E-print/Working paper (2010)

Detailed reference viewed: 36 (3 UL)
Full Text
Peer Reviewed
See detailMabuchi and Aubin-Yau functionals over complex surfaces
Li, Yi UL

in Journal of Mathematical Analysis and Applications (2014), 416(1), 81-98

Detailed reference viewed: 86 (1 UL)
Full Text
Peer Reviewed
See detailMabuchi and Aubin-Yau functionals over complex three-folds
Li, Yi UL

E-print/Working paper (2010)

Detailed reference viewed: 38 (1 UL)
Full Text
Peer Reviewed
See detailMacbeth and the joystick: Evidence for moral cleansing after playing a violent video game
Gollwitzer, Mario; Melzer, André UL

in Journal of Experimental Social Psychology (2012), 48

Detailed reference viewed: 259 (5 UL)
Full Text
See detailMachbarkeitsstudie "Betreuungsatlas Schweiz": Die Geographie betreuter Kindheit
Neumann, Sascha UL; Tinguely, Luzia; Hekel, Nicole UL et al

Report (2015)

Detailed reference viewed: 52 (3 UL)
Full Text
Peer Reviewed
See detailMachine Argumentation. Can We Replace Taxi Drivers by Robots?
Gabbay, Dov M. UL; Cramer, Marcos; Dauphin, Jérémie UL et al

in Natural Argument, A tribute to John Woods (2019)

We need ethical non-monotonic action logics to control machines which interact heavily with humans. Such logics face special problems and require features which we need to recognise and to address. We ... [more ▼]

We need ethical non-monotonic action logics to control machines which interact heavily with humans. Such logics face special problems and require features which we need to recognise and to address. We believe that injecting argumentation methods into action pre-conditions is possibly the way to proceed to model what is needed. To get an idea of what is needed we must investigate a typical problem of replacing a human with a robot operating in a highly interactive environment. This paper focuses on replacing a human taxi driver by a robot. Robot driven cars are already under production and so there is an urgent need for modelling the kind of Artificial Intelligence/Logic/Norms/Ethics which is to be involved and installed in the mind of the Robot. This is research in progress. [less ▲]

Detailed reference viewed: 96 (3 UL)
Full Text
Peer Reviewed
See detailMachine learning and natural language processing on the patent corpus: data, tools, and new measures
Balsmeier, Benjamin UL; Li, Guan-Cheng; Assaf, Mohamad et al

in Journal of Economics & Management Strategy (2018), 27

Detailed reference viewed: 382 (19 UL)
Full Text
Peer Reviewed
See detailMachine Learning based Antenna Selection and Power Allocation in Multi-user MISO Systems
Vu, Thang Xuan UL; Lei, Lei UL; Chatzinotas, Symeon UL et al

in 2019 IEEE International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt) (2019, June)

Detailed reference viewed: 45 (14 UL)
Full Text
Peer Reviewed
See detailMachine Learning for Data-Driven Smart Grid Applications
Glauner, Patrick UL; Meira, Jorge Augusto UL; State, Radu UL

Scientific Conference (2018)

The field of Machine Learning grew out of the quest for artificial intelligence. It gives computers the ability to learn statistical patterns from data without being explicitly programmed. These patterns ... [more ▼]

The field of Machine Learning grew out of the quest for artificial intelligence. It gives computers the ability to learn statistical patterns from data without being explicitly programmed. These patterns can then be applied to new data in order to make predictions. Machine Learning also allows to automatically adapt to changes in the data without amending the underlying model. We deal every day dozens of times with Machine Learning applications such as when doing a Google search, using spam filters, face detection, speaking to voice recognition software or when sitting in a self-driving car. In recent years, machine learning methods have evolved in the smart grid community. This change towards analyzing data rather than modeling specific problems has lead to adaptable, more generic methods, that require less expert knowledge and that are easier to deploy in a number of use cases. This is an introductory level course to discuss what machine learning is and how to apply it to data-driven smart grid applications. Practical case studies on real data sets, such as load forecasting, detection of irregular power usage and visualization of customer data, will be included. Therefore, attendees will not only understand, but rather experience, how to apply machine learning methods to smart grid data. [less ▲]

Detailed reference viewed: 462 (10 UL)
Full Text
Peer Reviewed
See detailMachine learning for physical-layer security: Attacks and SLP Countermeasures for Multiantenna Downlink Systems
Mayouche, Abderrahmane UL; Spano, Danilo; Tsinos, Christos UL et al

in 2019 IEEE Global Communications Conference (2019)

Most physical-layer security (PLS) work employ information theoretic metrics for performance analysis. In this paper, however, we investigate PLS from a signal processing point of view, where we rely on ... [more ▼]

Most physical-layer security (PLS) work employ information theoretic metrics for performance analysis. In this paper, however, we investigate PLS from a signal processing point of view, where we rely on bit-error rate (BER) at the eavesdropper (Eve) as a metric for information leakage. Meanwhile, recently, symbol-level precoding (SLP) has been shown to provide PLS gains as a new way for security. However, in this work, we introduce a machine learning (ML) based attack, where we show that even SLP schemes can be vulnerable to such attacks. Namely, this attack manifests when an eavesdropper (Eve) utilizes ML in order to learn the precoding pattern when precoded pilots are sent. With this ability, an Eve can decode data with favorable accuracy. As a countermeasure to this attack, we propose a novel precoding design. The proposed countermeasure yields high BER at the Eve, which makes symbol detection practically infeasible for the latter, thus providing physical-layer security between the base station (BS) and the users. In the numerical results, we validate both the attack and the countermeasure, and show that this gain in security can be achieved at the expense of only a small additional power consumption at the transmitter. [less ▲]

Detailed reference viewed: 68 (9 UL)