Results 1  10
of
22,347
Theoretical improvements in algorithmic efficiency for network flow problems

, 1972
"... This paper presents new algorithms for the maximum flow problem, the Hitchcock transportation problem, and the general minimumcost flow problem. Upper bounds on ... the numbers of steps in these algorithms are derived, and are shown to compale favorably with upper bounds on the numbers of steps req ..."
Abstract

Cited by 560 (0 self)
 Add to MetaCart
in the flow value then, provided the capacities are integral, a maximum flow will be determined within at most 1 + logM/(M1) if(t, S) augmentations, wheref*(t, s) is the value of the maximum flow and M is the maximum number of arcs across a cut. Next a new algorithm is given for the minimumcost flow
Liquidity Risk and Expected Stock Returns
, 2002
"... This study investigates whether marketwide liquidity is a state variable important for asset pricing. We find that expected stock returns are related crosssectionally to the sensitivities of returns to fluctuations in aggregate liquidity. Our monthly liquidity measure, an average of individualsto ..."
Abstract

Cited by 629 (6 self)
 Add to MetaCart
stock measures estimated with daily data, relies on the principle that order flow induces greater return reversals when liquidity is lower. Over a 34year period, the average return on stocks with high sensitivities to liquidity exceeds that for stocks with low sensitivities by 7.5 % annually, adjusted
Numerical Solutions of the Euler Equations by Finite Volume Methods Using RungeKutta TimeStepping Schemes
, 1981
"... A new combination of a finite volume discretization in conjunction with carefully designed dissipative terms of third order, and a Runge Kutta time stepping scheme, is shown to yield an effective method for solving the Euler equations in arbitrary geometric domains. The method has been used to deter ..."
Abstract

Cited by 517 (78 self)
 Add to MetaCart
to determine the steady transonic flow past an airfoil using an O mesh. Convergence to a steady state is accelerated by the use of a variable time step determined by the local Courant member, and the introduction of a forcing term proportional to the difference between the local total enthalpy and its free
A Survey of Program Slicing Techniques
 JOURNAL OF PROGRAMMING LANGUAGES
, 1995
"... A program slice consists of the parts of a program that (potentially) affect the values computed at some point of interest, referred to as a slicing criterion. The task of computing program slices is called program slicing. The original definition of a program slice was presented by Weiser in 197 ..."
Abstract

Cited by 790 (10 self)
 Add to MetaCart
A program slice consists of the parts of a program that (potentially) affect the values computed at some point of interest, referred to as a slicing criterion. The task of computing program slices is called program slicing. The original definition of a program slice was presented by Weiser
The theory and practice of corporate finance: Evidence from the field
 Journal of Financial Economics
, 2001
"... We survey 392 CFOs about the cost of capital, capital budgeting, and capital structure. Large firms rely heavily on present value techniques and the capital asset pricing model, while small firms are relatively likely to use the payback criterion. We find that a surprising number of firms use their ..."
Abstract

Cited by 725 (23 self)
 Add to MetaCart
We survey 392 CFOs about the cost of capital, capital budgeting, and capital structure. Large firms rely heavily on present value techniques and the capital asset pricing model, while small firms are relatively likely to use the payback criterion. We find that a surprising number of firms use
Data Security
, 1979
"... The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and ..."
Abstract

Cited by 615 (3 self)
 Add to MetaCart
and subsequently whmh data sets an active user may read or wrote. Flow controls regulate the dissemination of values among the data sets accessible to a user. Inference controls protect statistical databases by preventing questioners from deducing confidential information by posing carefully designed sequences
Managerial Discretion and Optimal Financing Policies
 J. Finan. Econ
, 1990
"... I analyze financing policies in a firm owned by atomistic shareholders who observe neither cash flows nor management’s investment decisions. Management derives perquisites from investment and invests as much as possible. Since it always claims that cash flow is too low to fund all positive net prese ..."
Abstract

Cited by 453 (18 self)
 Add to MetaCart
present value projects. its claim is not credible when cash flow is truly low. Consequently, management is forced to invest too little when cash flow is low and chooses to invest too much when it is high. Financing policies, by influencing the resources under management’s control, can reduce the costs
The Determinants of Credit Spread Changes.
 Journal of Finance
, 2001
"... ABSTRACT Using dealer's quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression are ..."
Abstract

Cited by 422 (2 self)
 Add to MetaCart
demonstrate that equity and debt can be valued using contingentclaims analysis. Introduced by Merton (1974) and further investigated by, among others, Black and Cox (1976), Leland (1994), Longstaff and Schwartz (1995), Bryis and de Varenne (1997), and CollinDufresne and Goldstein Mathematically
Efficient Implementation of Weighted ENO Schemes
, 1995
"... In this paper, we further analyze, test, modify and improve the high order WENO (weighted essentially nonoscillatory) finite difference schemes of Liu, Osher and Chan [9]. It was shown by Liu et al. that WENO schemes constructed from the r th order (in L¹ norm) ENO schemes are (r +1) th order accur ..."
Abstract

Cited by 412 (38 self)
 Add to MetaCart
and entropy instead of the characteristic values to simplify the costly characteristic procedure. The resulting WENO schemes are about twice as fast as the WENO schemes using the characteristic decompositions to compute weights, and work well for problems which donot contain strong shocks or strong reflected
A unified statistical approach for determining significant signals in images of cerebral activation
, 1996
"... Abstract: We present a unified statistical theory for assessing the significance of apparent signal observed in noisy difference images. The results are usable in a wide range of applications, including astrophysics, but are discussed with particular reference to images which represent changes in ce ..."
Abstract

Cited by 400 (39 self)
 Add to MetaCart
in cerebral blood flow elicited by a specific cognitive or sensorimotor task. Our main result is an estimate of the pvalue for local maxima of Gaussian, t, χ 2 and F fields over search regions of any shape or size in any number of dimensions. This unifies the pvalues for large search areas in 2D (Friston
Results 1  10
of
22,347