• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,210
Next 10 →

Subject Pool Effects in a Corruption Experiment: A

by Vivi Alatas, Lisa Cameron, Ananish Chaudhuri, Nisvan Erkal, Lata Gangadharan, Vivi Alatasa, Lisa Cameronb, Ananish Chaudhuric, Nisvan Erkalb - Comparison of Indonesian Public Servants and Indonesian Students.” Experimental Economics
"... by ..."
Abstract - Cited by 8 (0 self) - Add to MetaCart
Abstract not found

Decoding by Linear Programming

by Emmanuel J. Candès, Terence Tao , 2004
"... This paper considers the classical error correcting problem which is frequently discussed in coding theory. We wish to recover an input vector f ∈ Rn from corrupted measurements y = Af + e. Here, A is an m by n (coding) matrix and e is an arbitrary and unknown vector of errors. Is it possible to rec ..."
Abstract - Cited by 1399 (16 self) - Add to MetaCart
This paper considers the classical error correcting problem which is frequently discussed in coding theory. We wish to recover an input vector f ∈ Rn from corrupted measurements y = Af + e. Here, A is an m by n (coding) matrix and e is an arbitrary and unknown vector of errors. Is it possible

Robust face recognition via sparse representation

by John Wright, Allen Y. Yang, Arvind Ganesh, S. Shankar Sastry, Yi Ma - IEEE TRANS. PATTERN ANALYSIS AND MACHINE INTELLIGENCE , 2008
"... We consider the problem of automatically recognizing human faces from frontal views with varying expression and illumination, as well as occlusion and disguise. We cast the recognition problem as one of classifying among multiple linear regression models, and argue that new theory from sparse signa ..."
Abstract - Cited by 936 (40 self) - Add to MetaCart
. This framework can handle errors due to occlusion and corruption uniformly, by exploiting the fact that these errors are often sparse w.r.t. to the standard (pixel) basis. The theory of sparse representation helps predict how much occlusion the recognition algorithm can handle and how to choose the training

Institutions, Norms and Accountability: A Corruption Experiment with Northern and Southern Italians

by Max Weber Programme, Nan Zhang, Max Weber Programme, Nan Zhang , 2015
"... Experiment with Northern and Southern Italians ..."
Abstract - Add to MetaCart
Experiment with Northern and Southern Italians

Monitoring Corruption: Evidence from a Field Experiment in Indonesia

by Benjamin A. Olken - Journal of Political Economy , 2007
"... This paper uses a randomized field experiment to examine several approaches to reducing corruption. I measure missing expenditures in over 600 village road projects in Indonesia by having engineers independently estimate the prices and quantities of all inputs used in each road, and then comparing t ..."
Abstract - Cited by 261 (16 self) - Add to MetaCart
This paper uses a randomized field experiment to examine several approaches to reducing corruption. I measure missing expenditures in over 600 village road projects in Indonesia by having engineers independently estimate the prices and quantities of all inputs used in each road, and then comparing

of LaborThe Impact of Risk Perception and Risk Attitudes on Corrupt Behavior: Evidence from a Petty Corruption Experiment

by Behnud M. Djawadi, René Fahr, Behnud M. Djawadi, René Fahr , 2013
"... Any opinions expressed here are those of the author(s) and not those of IZA. Research published in this series may include views on policy, but the institute itself takes no institutional policy positions. The IZA research network is committed to the IZA Guiding Principles of Research Integrity. The ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Any opinions expressed here are those of the author(s) and not those of IZA. Research published in this series may include views on policy, but the institute itself takes no institutional policy positions. The IZA research network is committed to the IZA Guiding Principles of Research Integrity. The Institute for the Study of Labor (IZA) in Bonn is a local and virtual international research center and a place of communication between science, politics and business. IZA is an independent nonprofit organization supported by Deutsche Post Foundation. The center is associated with the University of Bonn and offers a stimulating research environment through its international network, workshops and conferences, data service, project support, research visits and doctoral program. IZA engages in (i) original and internationally competitive research in all fields of labor economics, (ii) development of policy concepts, and (iii) dissemination of research results and concepts to the interested public. IZA Discussion Papers often represent preliminary work and are circulated to encourage discussion. Citation of such a paper should account for its provisional character. A revised version may be

Intrusion Detection via Static Analysis

by David Wagner, Drew Dean , 2001
"... One of the primary challenges in intrusion detection is modelling typical application behavior, so that we can recognize attacks by their atypical effects without raising too many false alarms. We show how static analysis may be used to automatically derive a model of application behavior. The resul ..."
Abstract - Cited by 352 (1 self) - Add to MetaCart
. The result is a host-based intrusion detection system with three advantages: a high degree of automation, protection against a broad class of attacks based on corrupted code, and the elimination of false alarms. We report on our experience with a prototype implementation of this technique. 1. Introduction

Eight Questions about Corruption

by Jakob Svensson - JOURNAL OF ECONOMIC PERSPECTIVES—VOLUME 19, NUMBER 3—SUMMER 2005—PAGES 19–42 , 2005
"... Some years ago I interviewed the chief executive officer of a successful Thai manufacturing firm as part of a pilot survey project. While trying to figure out a good way to quantify the firm’s experience with government regulations and corruption in the foreign trade sector, the CEO exclaimed: “I ho ..."
Abstract - Cited by 171 (3 self) - Add to MetaCart
Some years ago I interviewed the chief executive officer of a successful Thai manufacturing firm as part of a pilot survey project. While trying to figure out a good way to quantify the firm’s experience with government regulations and corruption in the foreign trade sector, the CEO exclaimed: “I

Understanding Corruption and Corruptibility through Experiments

by Libor Dušek, Andreas Ortmann, Lubomír Lízal - A Primer”, Prague Economic Papers , 2004
"... Corruption and corruptibility – due to their illegal and therefore secretive nature – are difficult to be assessed either with traditional tools, such as hard data on criminal convictions or soft data elicited through opinion polls, questionnaires, or case studies. While there seems to be agreement ..."
Abstract - Cited by 13 (4 self) - Add to MetaCart
nowadays that corruption does have a negative impact on (foreign) private investment and growth, government revenue and infrastructure, and social equality, and while there seems to be evidence that low economic development, federal structure and short histories of experience with democracy and free trade

The Moral Foundations of Trust

by Eric M. Uslaner, Eric M. Uslaner , 1999
"... Trust is a multifacted concept. Mostly it is conceived as a "rational " response to trustworthy behavior by others. I offer an argument and evidence that there is another and more important variant of trust, moralistic (generalized) trust. I show that moralistic trust is faith in people we ..."
Abstract - Cited by 280 (22 self) - Add to MetaCart
we don't know and that it does not depend upon our life experiences. It is this type of trust that binds us to others. Trusting people are more likely to volunteer their time, to give to charity, to be tolerant of others, and to support policies that both promote economic growth (open markets
Next 10 →
Results 1 - 10 of 1,210
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University