• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 37,554
Next 10 →

The performance of mutual funds in the period 1945-1964

by Michael C. Jensen - JOURNAL OF FINANCE , 1968
"... In this paper I derive a risk-adjusted measure of portfolio performance (now known as "Jensen's Alpha") that estimates how much a manager's forecasting ability contributes to the fund's returns. The measure is based on the theory of the pricing of capital assets by Sharpe (1 ..."
Abstract - Cited by 615 (1 self) - Add to MetaCart
In this paper I derive a risk-adjusted measure of portfolio performance (now known as "Jensen's Alpha") that estimates how much a manager's forecasting ability contributes to the fund's returns. The measure is based on the theory of the pricing of capital assets by Sharpe

Costly search and mutual fund flows

by Erik R. Sirri, Peter Tufano - Journal of Finance , 1998
"... This paper studies the flows of funds into and out of equity mutual funds. Consumers base their fund purchase decisions on prior performance information, but do so asymmetrically, investing disproportionately more in funds that performed very well the prior period. Search costs seem to be an importa ..."
Abstract - Cited by 523 (5 self) - Add to MetaCart
costs. ALTHOUGH MUCH ACADEMIC RESEARCH on mutual funds addresses issues of performance measurement and attribution, we can learn more from this industry than whether fund managers can consistently earn risk-adjusted excess returns. Researchers studying funds have shed light on how incentives affect fund

Xen and the art of virtualization

by Paul Barham, Boris Dragovic, Keir Fraser, Steven Hand, Tim Harris, Alex Ho, Rolf Neugebauer, Ian Pratt, Andrew Warfield - IN SOSP , 2003
"... Numerous systems have been designed which use virtualization to subdivide the ample resources of a modern computer. Some require specialized hardware, or cannot support commodity operating systems. Some target 100 % binary compatibility at the expense of performance. Others sacrifice security or fun ..."
Abstract - Cited by 2010 (35 self) - Add to MetaCart
or functionality for speed. Few offer resource isolation or performance guarantees; most provide only best-effort provisioning, risking denial of service. This paper presents Xen, an x86 virtual machine monitor which allows multiple commodity operating systems to share conventional hardware in a safe and resource

Risk Management

by Kalle Lyytinen, Lars Mathiassen, Janne Ropponen
"... We present a simple, but powerful framework for software risk management. The framework synthesizes, refines, and extends current approaches to managing software risks. We illustrate its usefulness through an empirical analysis of two software development episodes involving high risks. The fram ..."
Abstract - Add to MetaCart
We present a simple, but powerful framework for software risk management. The framework synthesizes, refines, and extends current approaches to managing software risks. We illustrate its usefulness through an empirical analysis of two software development episodes involving high risks

FOR DISASTER RISK MANAGEMENT

by Colombia Sede Manizales , 2005
"... INDICATORS OF DISASTER RISK AND RISK MANAGEMENT ..."
Abstract - Add to MetaCart
INDICATORS OF DISASTER RISK AND RISK MANAGEMENT

Risk Management – Principles and Guidelines

by unknown authors , 2010
"... previous Australian and New Zealand risk management ..."
Abstract - Add to MetaCart
previous Australian and New Zealand risk management

Conditional value-at-risk for general loss distributions

by R. Tyrrell Rockafellar, Stanislav Uryasev - Journal of Banking and Finance , 2002
"... Abstract. Fundamental properties of conditional value-at-risk, as a measure of risk with significant advantages over value-at-risk, are derived for loss distributions in finance that can involve discreetness. Such distributions are of particular importance in applications because of the prevalence o ..."
Abstract - Cited by 386 (28 self) - Add to MetaCart
, portfolio optimization, risk management

Risk Management

by Washington D. C. Foreword, Gregory L. Shaw, Lissa T. Westerman, Sergio De Cosmo , 2010
"... Terminology in this glossary was established for the purposes of emergency management education and practice, and therefore uses an emergency response and recovery context. Where appropriate, terminology definitions from the National Incident Management System (NIMS) and other Federal guidance docum ..."
Abstract - Add to MetaCart
of this document. This glossary was developed by The Institute for Crisis, Disaster and Risk Management (ICDRM) at The George Washington University (GWU) with

Power provisioning for a warehousesized computer,”

by Xiaobo Fan , Wolf-Dietrich Weber Luiz , André Barroso - ACM SIGARCH Computer Architecture News, , 2007
"... ABSTRACT Large-scale Internet services require a computing infrastructure that can be appropriately described as a warehouse-sized computing system. The cost of building datacenter facilities capable of delivering a given power capacity to such a computer can rival the recurring energy consumption ..."
Abstract - Cited by 450 (2 self) - Add to MetaCart
budget with minimal risk of exceeding it. We use our modeling framework to estimate the potential of power management schemes to reduce peak power and energy usage. We find that the opportunities for power and energy savings are significant, but greater at the cluster-level (thousands of servers) than

Risk Management

by unknown authors
"... The proactive management of risks throughout the software development lifecycle is important for project success. In this chapter, we will explain the following: • the risk management practice, which involves risk identification, analysis, prioritization, planning, mitigation, monitoring, and commun ..."
Abstract - Add to MetaCart
The proactive management of risks throughout the software development lifecycle is important for project success. In this chapter, we will explain the following: • the risk management practice, which involves risk identification, analysis, prioritization, planning, mitigation, monitoring
Next 10 →
Results 11 - 20 of 37,554
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University