Results 1 - 10
of
6,705
Africa´s Growth Tragedy: Policies and Ethnic Divisions
- JOURNAL OF ECONOMICS
, 1997
"... Explaining cross-country differences in growth rates requires not only an understanding of the link between growth and public policies, but also an understanding of why countries choose different public policies. This paper shows that ethnic diversity helps explain cross-country differences in publi ..."
Abstract
-
Cited by 1388 (72 self)
- Add to MetaCart
Explaining cross-country differences in growth rates requires not only an understanding of the link between growth and public policies, but also an understanding of why countries choose different public policies. This paper shows that ethnic diversity helps explain cross-country differences
Risk-management: coordinating corporate investment and financing policies
, 1993
"... This paper develops a general framework for analyzing corporate risk management policies. We begin by observing that if external sources of finance are more costly to corporations than internally generated funds, there will typically be a benefit to hedging: hedging adds value to the extent that it ..."
Abstract
-
Cited by 554 (16 self)
- Add to MetaCart
that it helps ensure that a corporation has sufficient internal funds available to take advantage of attractive investment opportunities. We then argue that this simple observation has wide ranging impli-cations for the design of risk management strategies. We delineate how these strategies should depend
The x-Kernel: An Architecture for Implementing Network Protocols
- IEEE Transactions on Software Engineering
, 1991
"... This paper describes a new operating system kernel, called the x-kernel, that provides an explicit architecture for constructing and composing network protocols. Our experience implementing and evaluating several protocols in the x-kernel shows that this architecture is both general enough to acc ..."
Abstract
-
Cited by 662 (21 self)
- Add to MetaCart
abstractions through which processes running on those processors exchange messages. Network software is extremely complex: it must hide the details of the underlying hardware, recover from transmission failures, ensure that messages are delivered to the application processes in the appropriate order
Power and centrality: A family of measures.
- 13656 |www.pnas.org/cgi/doi/10.1073/pnas.1401211111 Contractor and DeChurch
, 1987
"... JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about J ..."
Abstract
-
Cited by 595 (3 self)
- Add to MetaCart
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about
An introduction to Kolmogorov Complexity and its Applications: Preface to the First Edition
, 1997
"... This document has been prepared using the L a T E X system. We thank Donald Knuth for T E X, Leslie Lamport for L a T E X, and Jan van der Steen at CWI for online help. Some figures were prepared by John Tromp using the xpic program. The London Mathematical Society kindly gave permission to reproduc ..."
Abstract
-
Cited by 2138 (120 self)
- Add to MetaCart
This document has been prepared using the L a T E X system. We thank Donald Knuth for T E X, Leslie Lamport for L a T E X, and Jan van der Steen at CWI for online help. Some figures were prepared by John Tromp using the xpic program. The London Mathematical Society kindly gave permission
Semantic matching of web services capabilities
, 2002
"... Abstract. The Web is moving from being a collection of pages toward a collection of services that interoperate through the Internet. The first step toward this interoperation is the location of other services that can help toward the solution of a problem. In this paper we claim that location of web ..."
Abstract
-
Cited by 581 (24 self)
- Add to MetaCart
of the Web in which sites exchange dynamic information on demand. This change is especially important for the e-business community, because it provides an opportunity to conduct business faster and more efficiently. Indeed, the opportunity to manage supply chains dynamically to achieve the greatest advantage
The Determinants of Credit Spread Changes.
- Journal of Finance
, 2001
"... ABSTRACT Using dealer's quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression are ..."
Abstract
-
Cited by 422 (2 self)
- Add to MetaCart
, Karen Wruck, and an anonymous referee for helpful comments. We thank Ahsan Aijaz, John Puleo, and Laura Tuttle for research assistance. We are also grateful to seminar participants at Arizona State University, University of Maryland, McGill University, The Ohio State University, University of Rochester
How to make a decision: the analytic hierarchy process
- European Journal of Operational Research
, 1990
"... Policy makers at all levels of decision making in organizations use multiple criteria to analyze their complex problems. Multicriteria thinking is used formally to facilitate their decision making. Through trade-offs it clarifies the advantages and disadvantages of policy options under circumstances ..."
Abstract
-
Cited by 411 (0 self)
- Add to MetaCart
thinking leads to sequences of ideas that are so tangled that their interconnections are not readily discerned. The lack of a coherent procedure to make decisions is especially troublesome when our intuition alone cannot help us to determine which of several options is the most desirable, or the least
Unsolicited E-mails to Forensic Psychiatrists
, 2016
"... communication is pervasive. Since many forensic psychiatrists have their e-mail addresses available online (either on personal websites, university websites, or articles they have authored), they are likely to receive unsolicited e-mails. Although there is an emerging body of literature about excha ..."
Abstract
- Add to MetaCart
exchanging e-mail with patients, there is little guidance about how to respond to e-mails from nonpatients. Therefore, we used a Delphi technique to develop a consensus about salient points for the forensic psychiatrist to consider regarding responding to e-mails from nonpatients and the risks entailed. Four
A Comprehensive Look at the Empirical Performance of Equity Premium Prediction,”
, 2004
"... Abstract Economists have suggested a whole range of variables that predict the equity premium: dividend price ratios, dividend yields, earnings-price ratios, dividend payout ratios, corporate or net issuing ratios, book-market ratios, beta premia, interest rates (in various guises), and consumption ..."
Abstract
-
Cited by 279 (6 self)
- Add to MetaCart
, in that their out-of-sample predictions have performed unexpectedly poorly; [c] the models would not have helped an investor with access only to information available at the time to time the market. JEL Classification: G12, G14. * Thanks to Malcolm Baker, Ray Ball, John Campbell, John Cochrane, Francis Diebold
Results 1 - 10
of
6,705