Results 1 - 10
of
28,380
Table 7. Comparison of imputation procedures for three large-scale databases
2002
"... In PAGE 37: ... Procedures are in development for properly estimating the accuracy of such estimates. Table7 compares the hot-deck imputation procedures used in the three large-scale databases described in this chapter. Table 7.... ..."
Cited by 1
Table 3. Large-Scale Distributed Real-Time Database Settings
2004
Cited by 7
Table 2: Returns (Ri;t) On Winning Contingent Claims, Caltech Large-Scale Aggregation Experiment, May 25, 1999.
"... In PAGE 17: ... With the restriction in (1), however, one can test whether the dynamics of the transaction prices of winner contracts is consistent with the null that the market read the information (in the book) correctly, as explained above. Table2 lists, across all periods and for each period separately, (i) the average inverse return on winning contingent claims, (ii) the corresponding z-statistic. Returns were computed from one transaction to the next.... In PAGE 17: ...65, which is just signiflcant at the 10% level (two-sided test). For comparison, Table2 also displays the average of the returns themselves (not the inverse returns) and the corresponding z-statistics. Because only the returns on winning securities are measured, one expects the average to be above one.... In PAGE 17: ...1%, conflrming the overall image. Hence, the results in Table2 support the hypothesis that the market read correctly whatever information was revealed through trading activity and entries in the book. The market did make mistakes (it often failed to completely aggregate the available information), but these are to be expected even from a rational Bayesian learner who knows how to interpret signals from the book.... In PAGE 18: ... This is an awkward situation: subjects are invited to trade, but the experiment is designed such that there would be no trade. Why do subjects trade? Are they confused? The second column of Table2 indicates that there was a fair amount of trade. Per period, up to 882 transactions took place in the winning security only.... In PAGE 18: ...nvestors. An exception is [4]. (In game theory, this common prior assumption is referred to as the Harsanyi doctrine; in dynamic asset pricing theory, an even more extreme position is taken, namely that the prior belief is correct { see [36].) Absent a well-developed theory of asset pricing with disagreeing investors (\beauty contests quot;), it is hard to interpret the experimental results in Figure 5 and Table2 , just like it was not possible to fully understand the failure of information aggregation in older experiments such as those reported in [41], where payouts depended on the identity of the holder, a situation that has not been thoroughly investigated in asset pricing theory. To give subjects a reason to trade, one could have allocated a difierent number of contingent claims to difierent subjects.... ..."
Table 2. Comparison of pass rates of multipath fading distributions using full band
"... In PAGE 3: ... Tables below show, how different CDFs fit to the data. Table2 depicts all of the measurement environments from LOS to NLOS2 (c.f.... ..."
Table 2 Large-scale scenarios
2005
"... In PAGE 5: ...3. Large-scale scenarios The setup for each scenario is displayed in Table2 . They have been designed so that we could investigate the effectiveness and characteristics of the implemented QoS mechanisms in order to provide a measurable improvement to various types of traffic that has been marked as premium traffic.... ..."
Table 2 Large-scale scenarios
2005
"... In PAGE 5: ...3. Large-scale scenarios The setup for each scenario is displayed in Table2 . They have been designed so that we could investigate the effectiveness and characteristics of the implemented QoS mechanisms in order to provide a measurable improvement to various types of traffic that has been marked as premium traffic.... ..."
Table 2 Large-scale scenarios
2005
"... In PAGE 5: ...3. Large-scale scenarios The setup for each scenario is displayed in Table2 . They have been designed so that we could investigate the effectiveness and characteristics of the implemented QoS mechanisms in order to provide a measurable improvement to various types of traffic that has been marked as premium traffic.... ..."
TABLE 4. Results with large-scale data.
1999
Cited by 4
Table 1: Large-scale network models
"... In PAGE 7: ... Figure 6: Throughput comparison of different algorithms Figure 7: Average packet delay comparison Performance of the framework on increased scalability and connectivity In our experiments, one of the key independent variables was the degree of connectivity and scalability. In order to examine the scalability aspect of our approach, we developed various networks ranging from 29 to 3520 components (see Table1 ). These models were executed with acceptable performance in the DEVSJAVA environment.... ..."
Results 1 - 10
of
28,380