• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,142
Next 10 →

Employment Fluctuations with Equilibrium Wage Stickiness,” American Economic Review,

by Robert E Hall , George Akerlof , Anthony Fai Chung , Kenneth Judd , Narayana Kocherlakota , John Muellbauer , Garey Ramey , Felix Reichling , Robert Shimer , Robert Solow , 2005
"... Modern economies experience substantial fluctuations in aggregate output and employment. In recessions, employment falls and unemployment rises. In the years immediately after a recession, the labor market is slackunemployment remains high and the vacancy rate and other measures of employer recruit ..."
Abstract - Cited by 542 (6 self) - Add to MetaCart
to driving forces. My characterization of wage stickiness is rather different from earlier ideas of wage rigidity and more closely integrated with the matching process. The model describes an economic equilibrium and overcomes the arbitrary disequilibrium character of earlier sticky-wage models. A line

Where do interorganizational networks come from?

by Ranjay Gulati, Martin Gargiulo , 1998
"... Organizations enter alliances with each other to access critical resources, but they rely on information from the network of prior alliances to determine with whom to cooperate. These new alliances modify the existing network, prompting an endogenous dynamic between organizational action and network ..."
Abstract - Cited by 388 (10 self) - Add to MetaCart
and network structure that drives the emergence of interorganizational networks. Testing these ideas on alliances formed in three industries over nine years, the authors show that the probability of a new alliance between specific organizations increases with their interdependence, but also with their prior

The Gamma database machine project

by David J. Dewitt, Shahram Ghandeharizadeh, Donovan Schneider, Allan Bricker, Hui-i Hsiao, Rick Rasmussen - IEEE Transactions on Knowledge and Data Engineering , 1990
"... This paper describes the design of the Gamma database machine and the techniques employed in its implementation. Gamma is a relational database machine currently operating on an Intel iPSC/2 hypercube with 32 processors and 32 disk drives. Gamma employs three key technical ideas which enable the arc ..."
Abstract - Cited by 272 (29 self) - Add to MetaCart
This paper describes the design of the Gamma database machine and the techniques employed in its implementation. Gamma is a relational database machine currently operating on an Intel iPSC/2 hypercube with 32 processors and 32 disk drives. Gamma employs three key technical ideas which enable

Image segmentation in video sequences: A probabilistic approach

by Nir Friedman, Stuart Russell , 1997
"... "Background subtraction" is an old technique for finding moving objects in a video sequence---for example, cars driving on a freeway. The idea is that subtracting the current image from a time-averaged background image will leave only nonstationary objects. It is, however, a crude approxim ..."
Abstract - Cited by 256 (0 self) - Add to MetaCart
"Background subtraction" is an old technique for finding moving objects in a video sequence---for example, cars driving on a freeway. The idea is that subtracting the current image from a time-averaged background image will leave only nonstationary objects. It is, however, a crude

Active Disks: Programming Model, Algorithms and Evaluation

by Anurag Acharya , Mustafa Uysal, Joel Saltz , 1998
"... Several application and technology trends indicate that it might be both profitable and feasible to move computation closer to the data that it processes. In this paper, we evaluate Active Disk architectures which integrate significant processing power and memory into a disk drive and allow applicat ..."
Abstract - Cited by 202 (10 self) - Add to MetaCart
Several application and technology trends indicate that it might be both profitable and feasible to move computation closer to the data that it processes. In this paper, we evaluate Active Disk architectures which integrate significant processing power and memory into a disk drive and allow

Linear Controller Design: Limits of Performance Via Convex Optimization

by Stephen Boyd, Craig Barratt, Stephen Norman , 1990
"... this paper, we first give a very brief overview of control engineering. The goal of control engineering is to improve, or in some cases ena- ble, the performance of a system by the addition of sensors, which measure various signals in the system and external command signals, control processors, whic ..."
Abstract - Cited by 202 (25 self) - Add to MetaCart
, which process the measu red signals to drive actuators, which affect the behav- ior of the system. A schematic diagram of a general control system is shown in Fig. 1. The use of the sensed response of the system (and not just the command signals) in the computation of the actuator signals is called

On the Unification Power of Models

by Jean Bézivin
"... In November 2000, the OMG made public the MDA ™ initiative, a particular variant of a new global trend called MDE (Model Driven Engineering). The basic ideas of MDA are germane to many other approaches such as generative programming, domain specific languages, model-integrated computing, generic mo ..."
Abstract - Cited by 189 (7 self) - Add to MetaCart
In November 2000, the OMG made public the MDA ™ initiative, a particular variant of a new global trend called MDE (Model Driven Engineering). The basic ideas of MDA are germane to many other approaches such as generative programming, domain specific languages, model-integrated computing, generic

The Eternity Service

by Ross Anderson , 1996
"... The Internet was designed to provide a communications channel that is as resistant to denial of service attacks as human ingenuity can make it. In this note, we propose the construction of a storage medium with similar properties. The basic idea is to use redundancy and scattering techniques to repl ..."
Abstract - Cited by 173 (8 self) - Add to MetaCart
The Internet was designed to provide a communications channel that is as resistant to denial of service attacks as human ingenuity can make it. In this note, we propose the construction of a storage medium with similar properties. The basic idea is to use redundancy and scattering techniques

Instruction level power analysis and optimization of software

by Vivek Tiwari, Sharad Malik, Andrew Wolfe, Mike Tien-chien Lee - Journal of VLSI Signal Processing , 1996
"... Abstract. The increasing popularity of power constrained mobile computers and embedded computing applications drives the need for analyzing and optimizing power in all the components of a system. Software constitutes a major component of today's systems, and its role is projected togrow even fu ..."
Abstract - Cited by 179 (1 self) - Add to MetaCart
Abstract. The increasing popularity of power constrained mobile computers and embedded computing applications drives the need for analyzing and optimizing power in all the components of a system. Software constitutes a major component of today's systems, and its role is projected togrow even

Ten Ideas for Policymakers to Drive Digital Progress

by Daniel Castro, Rob Atkinson , 2009
"... © 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other w ..."
Abstract - Add to MetaCart
© 2009 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE. For more information, please see www.ieee.org/web/publications/rights/index.html.
Next 10 →
Results 1 - 10 of 2,142
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University