Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,759 papers from all fields of science
Search
Sign In
Create Free Account
Utility functions on indivisible goods
Some branches of economics and game theory deal with indivisible goods – discrete items that can be traded only as a whole. For example, in…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Aggregate function
Game theory
Subadditive set function
Submodular set function
Expand
Broader (1)
Combinatorial optimization
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2007
Highly Cited
2007
Lattice Strategies for the Dirty Multiple Access Channel
T. Philosof
,
R. Zamir
,
U. Erez
,
A. Khisti
IEEE Transactions on Information Theory
2007
Corpus ID: 2847773
In Costa's dirty-paper channel, Gaussian random binning is able to eliminate the effect of interference which is known at the…
Expand
Highly Cited
2003
Highly Cited
2003
The contourlet transform for image denoising using cycle spinning
R. Eslami
,
H. Radha
The Thrity-Seventh Asilomar Conference on Signals…
2003
Corpus ID: 8347941
A new method for image denoising based on the contourlet transform, which has been recently introduced is presented in this paper…
Expand
Highly Cited
2000
Highly Cited
2000
Inheritance of resistance to Fusarium graminearum in wheat
G. Bai
,
G. Shaner
,
H. Ohm
Theoretical and Applied Genetics
2000
Corpus ID: 703012
Abstract To study the inheritance of resistance in wheat to Fusarium graminearum, six resistant cultivars from China were crossed…
Expand
Highly Cited
2000
Highly Cited
2000
MEASURING THE EFFECTS OF POLLINATORS AND HERBIVORES: EVIDENCE FOR NON-ADDITIVITY IN A PERENNIAL HERB
C. Herrera
2000
Corpus ID: 44149267
Using an experimental approach, this study addresses the following two questions for the perennial herb Paeonia broteroi…
Expand
Highly Cited
1989
Highly Cited
1989
Bandwidth efficient coding for fading channels: code construction and performance analysis
C. Schlegel
,
D. Costello
IEEE Journal on Selected Areas in Communications
1989
Corpus ID: 41563470
The authors apply a general method of bounding the event error probability of TCM (trellis-coded modulation) schemes to fading…
Expand
Highly Cited
1984
Highly Cited
1984
Differential detection of Gaussian MSK in a mobile radio environment
M. Simon
,
C. C. Wang
IEEE Transactions on Vehicular Technology
1984
Corpus ID: 15758394
Minimum shift keying with Gaussian shaped transmit pulses is a strong candidate for a modulation technique that satisfies the…
Expand
Highly Cited
1982
Highly Cited
1982
Metal-support and metal-additive effects in catalysis : proceedings of an international symposium
B. Imelik
1982
Corpus ID: 92882160
Highly Cited
1982
Highly Cited
1982
A Robust Ratio-Threshold Technique to Mitigate Tone and Partial Band Jamming in Coded MFSK Systems
A. Viterbi
IEEE Military Communications Conference
1982
Corpus ID: 22911431
It is well known [Refs 1, 2] that a tone or partial-band noise jammer can so choose his jamming strategy as to cause the bit…
Expand
Highly Cited
1974
Highly Cited
1974
Molecular dynamics study of liquid water under high compression
F. Stillinger
,
A. Rahman
1974
Corpus ID: 39735123
The technique of computer simulation by molecular dynamics has been used to investigate highly compressed water at mass density 1…
Expand
Highly Cited
1971
Highly Cited
1971
The Probability of Error Due to Intersymbol Interference and Gaussian Noise in Digital Communication Systems
O. Shimbo
,
M. Celebiler
1971
Corpus ID: 110365955
The error rate or the probability of error is an important parameter in the design of digital communication systems. In this…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE