• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 65,881
Next 10 →

Table 2. Strategic Behavior of Each Model

in A MODELING METHODOLOGY FOR DYNAMIC
by unknown authors 2004
"... In PAGE 50: ... The result of cluster analysis shows that 4 models (model 1, 2, 3, amp; 4) take multiple core strategies, while model 5 takes single core strategy, product improvement. Table2 describes strategic behaviors of each model (cluster) in details. Each model... ..."

Table 1: Previous Strategic Alignment Models and Its Constructs

in unknown title
by unknown authors 2006
"... In PAGE 2: ... 2.3 Measurement model and constructs of Strategic Alignment Table1 shows the models of Strategic Alignment and its constructs that have been developed and used in previous research. ... ..."

Table 4: The Goodness-of-Fit Indices for the Strategic Alignment Model

in unknown title
by unknown authors 2006

Table 1. Plants recommended by the best strategic solution of the petrochemical model.

in Decision-making for petrochemical planning using multiobjective and strategic tools
by G. K. Al-sharrah, G. Hankinson, A. Elkamel 2006
"... In PAGE 9: ... The best solution is chosen to be the highest leftmost circle in the matrix. This is considered as the best strategic solution and it is a network of 14 plants listed with their production in Table1 and forming a network plotted in Figure 6. The net- work has the following features: .... ..."
Cited by 1

Table 1. The Five Relationship Dimensions generated from the Strategic Network Model Relationship Dimensions Key Factors

in APPLICATION SERVICE PROVISIONING AS A STRATEGIC NETWORK- Evaluation of a Failed ASP Project
by Henry Nordström, Markku Sääksjärvi
"... In PAGE 4: ... Dynamic network constraints and benefits. These five issues are called relationship dimensions in Table1 . For each dimension, we collected from Gulati et al.... In PAGE 4: ... (2000) a typical set of a few concrete key factors characterising each dimension and being hopefully concrete enough to be applied in an empirical study. These factors, which are mentioned in Table1 , will be applied in our ex-post analysis of the case. After the analyses, we will reduce this theoretical list into a more compact checklist of important issues to be considered when developing a partnership-based ASP service integration.... In PAGE 5: ... First, the causes of failure were determined on the basis of interviews of representatives of both companies involved. Then, the sets of key factors presented in Table1 were considered and a new list of potential causes was developed. Comparing these two outcomes, conclusions were made regarding the important new issues proposed by the network model applied.... ..."

Table 3: The relevant data for destructive factors and for calculating Energy Technology Environmental Strategic Index required to be used in the model.

in Energy Technology and Strategic Assessment of Environmental Impact for Developing Countries
by Goel Kahen, B. Mca Sayers 1996
Cited by 1

Table 2: When does strategic deliberation occur? The answer depends on the model of limited computation being used.

in ABSTRACT Bidders with Hard Valuation Problems
by Kate Larson
"... In PAGE 2: ... In particular, they showed that if agents incur a cost from computing then in English and Vickrey auctions strong strategic computing can occur in Nash equilibrium. Table2 shows whether strong strategic computation occurs in equilibrium for both mod- els of bounded rationality in the situation where the performance... ..."

Table 1: When does strategic computation occur? The answer to this question depends on the model of limited computation being used.

in Costly Valuation Computation in Auctions
by Kate Larson, Tuomas Sandholm 2001
"... In PAGE 11: ... Interestingly, the equilibrium behavior of the agents are different in the two models. Table1... ..."
Cited by 42

Table 2: When does strategic computation occur? The answer to this question depends on the model of limited computation being used.

in Bidders with hard valuation problems
by Kate Larson, Tuomas Sandholm 2002
Cited by 2

Table 1: Published estimates of strategic voting

in A New Approach for Modeling Strategic Voting in Multiparty Elections
by R. Michael Alvarez, Jonathan Nagler, R. Michael, R. Michael, Alvarez Jonathan Nagler, Alvarez Jonathan Nagler 2000
"... In PAGE 4: ... In these twotypes of political settings | multiparty elections in Britain and presiden- tial primaries in the United States | many scholars have tried to estimate the amount of strategic behavior byvoters. As we report in Table1 , there is a great deal of variation in the estimates of strategic behavior reported in the literature, ranging from a low of 5.1#25 reported by Johnston and Pattie #281991#29 for the 1983 British elections to a high of 17#25 reported by Niemi et al.... In PAGE 4: ...iterature for the 1988 U.S. presidential primary are in the vicinity of 14#25. Table1 goes here In this paper we develop a new approach for modeling strategic voting: we incorporate the variance in the likelihood of strategic voting across constituencies in a model of voter choice. This builds upon recent empirical work on modeling voter choice in multiparty democratic systems #28Alvarez and Nagler 1998, 1995#29.... In PAGE 12: ...Empirical Evidence for Strategic Voting in the 1987 British Election In Table1 we present the full multinomial probit results from the estimation of this model. The results we obtain here are very similar to those presented in previous work on this same election, so we will refer interested readers to that research #28Alvarez, Bowler and Nagler 1997#29.... In PAGE 12: ... All we wish to note here is that most of the variables are signed in theoretically#7Bexpected manners, many are statistically signi#0Ccant, and this model correctly classi#0Ces 71#25 of the reported votes cast by the 2080 voters in our sample. #5B Table1 Goes Here#5D The important coe#0Ecients to focus on for our purposes are those on the three strategic voting variables. In the previous section we had argued that we expected each of these three coe#0Ecients to be negatively signed.... In PAGE 13: ... The #0Crst classi#0Ccation scheme is given by the rows of the table. To compute the rowentries we used the model reported in Table1 , but hypothesized that all voters were in constituencies where the three parties had equal chances of winning #28i.e.... In PAGE 13: ...here the three parties had equal chances of winning #28i.e., each party had a vote share of 33 1#2F3 #25 in the 1983 election in the constituency#29. We set variables M1 and M2 to zero, and used the estimated coe#0Ecients from Table1 to compute the utility of each party for each voter. We then assign the voter apos;s choice to the party they have the highest utility; this gives us each voter apos;s sincere vote.... ..."
Cited by 1
Next 10 →
Results 1 - 10 of 65,881
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University