Results 1 - 10
of
4,029,445
Board Efficiency and Internal Control Mechanism
, 2003
"... We analyze the interactions between internal and external control mechanisms in a framework in which the board selects the CEO and then decides whether to retain or dismiss him after observing a signal regarding his ability. The novel aspect of our paper is that we consider both the hiring and the f ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
We analyze the interactions between internal and external control mechanisms in a framework in which the board selects the CEO and then decides whether to retain or dismiss him after observing a signal regarding his ability. The novel aspect of our paper is that we consider both the hiring
The modern industrial revolution, exit, and the failure of internal control systems
- JOURNAL OF FINANCE
, 1993
"... Since 1973 technological, political, regulatory, and economic forces have been changing the worldwide economy in a fashion comparable to the changes experienced during the nineteenth century Industrial Revolution. As in the nineteenth century, we are experiencing declining costs, increaing average ( ..."
Abstract
-
Cited by 932 (7 self)
- Add to MetaCart
(but decreasing marginal) productivity of labor, reduced growth rates of labor income, excess capacity, and the requirement for downsizing and exit. The last two decades indicate corporate internal control systems have failed to deal effectively with these changes, especially slow growth
Statistical mechanics of complex networks
- Rev. Mod. Phys
"... Complex networks describe a wide range of systems in nature and society, much quoted examples including the cell, a network of chemicals linked by chemical reactions, or the Internet, a network of routers and computers connected by physical links. While traditionally these systems were modeled as ra ..."
Abstract
-
Cited by 2083 (10 self)
- Add to MetaCart
Complex networks describe a wide range of systems in nature and society, much quoted examples including the cell, a network of chemicals linked by chemical reactions, or the Internet, a network of routers and computers connected by physical links. While traditionally these systems were modeled as random graphs, it is increasingly recognized that the topology and evolution of real
Separation of ownership and control
- JOURNAL OF LAW AND ECONOMICS
, 1983
"... This paper analyzes the survival of organizations in which decision agents do not bear a major share of the wealth effects of their decisions. This is what the literature on large corporations calls separation of âownershipâ and âcontrol.â Such separation of decision and risk bearing functio ..."
Abstract
-
Cited by 1564 (7 self)
- Add to MetaCart
This paper analyzes the survival of organizations in which decision agents do not bear a major share of the wealth effects of their decisions. This is what the literature on large corporations calls separation of âownershipâ and âcontrol.â Such separation of decision and risk bearing
Multivariable Feedback Control: Analysis
- span (B∗) und Basis B∗ = { ω1
, 2005
"... multi-input, multi-output feed-back control design for linear systems using the paradigms, theory, and tools of robust con-trol that have arisen during the past two decades. The book is aimed at graduate students and practicing engineers who have a basic knowledge of classical con-trol design and st ..."
Abstract
-
Cited by 529 (24 self)
- Add to MetaCart
multi-input, multi-output feed-back control design for linear systems using the paradigms, theory, and tools of robust con-trol that have arisen during the past two decades. The book is aimed at graduate students and practicing engineers who have a basic knowledge of classical con-trol design
Controlled and automatic human information processing
- I. Detection, search, and attention. Psychological Review
, 1977
"... A two-process theory of human information processing is proposed and applied to detection, search, and attention phenomena. Automatic processing is activa-tion of a learned sequence of elements in long-term memory that is initiated by appropriate inputs and then proceeds automatically—without subjec ..."
Abstract
-
Cited by 841 (15 self)
- Add to MetaCart
mechanisms. Automatic detection is shown to develop following consistent mapping of stimuli to responses over trials. Controlled search is utilized in varied-mapping paradigms, and in our studies, it takes the form of serial, terminating search. The approach resolves a number of apparent conflicts
Large shareholders and corporate control
- Journal of Political Economy
, 1986
"... Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of ..."
Abstract
-
Cited by 977 (15 self)
- Add to MetaCart
Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your personal, non-commercial use. Please contact the publisher regarding any further use of this work. Publisher contact information may be obtained at
Congestion Avoidance and Control
- Proc. of ACM SIGCOMM
, 1988
"... Social movements and human rights rhetoric in tobacco ..."
Abstract
-
Cited by 2721 (10 self)
- Add to MetaCart
Social movements and human rights rhetoric in tobacco
Stream Control Transmission Protocol
, 2007
"... This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC 2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Interne ..."
Abstract
-
Cited by 570 (22 self)
- Add to MetaCart
This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC 2026. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet- Drafts as reference material or to cite them other than as ‘‘work in progress.’’ The list of current Internet-Drafts can be accessed at
Equation-based congestion control for unicast applications
- SIGCOMM '00
, 2000
"... This paper proposes a mechanism for equation-based congestion control for unicast traffic. Most best-effort traffic in the current Internet is well-served by the dominant transport protocol, TCP. However, traffic such as best-effort unicast streaming multimedia could find use for a TCP-friendly cong ..."
Abstract
-
Cited by 832 (29 self)
- Add to MetaCart
This paper proposes a mechanism for equation-based congestion control for unicast traffic. Most best-effort traffic in the current Internet is well-served by the dominant transport protocol, TCP. However, traffic such as best-effort unicast streaming multimedia could find use for a TCP
Results 1 - 10
of
4,029,445