• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 7,677
Next 10 →

House Prices, Borrowing Constraints, and Monetary Policy in the Business Cycle

by Matteo Iacoviello , 2002
"... I develop a general equilibrium model with sticky prices, credit constraints, nominal loans and asset prices. Changes in asset prices modify agents ’ borrowing capacity through collateral value; changes in nominal prices affect real repayments through debt deflation. Monetary policy shocks move asse ..."
Abstract - Cited by 512 (10 self) - Add to MetaCart
I develop a general equilibrium model with sticky prices, credit constraints, nominal loans and asset prices. Changes in asset prices modify agents ’ borrowing capacity through collateral value; changes in nominal prices affect real repayments through debt deflation. Monetary policy shocks move

Reinforcement Learning with Policy Constraints

by Sebastian Thrun, Jamieson E. Schulte
"... This paper addresses the problem of knowledge transfer in lifelong reinforcement learning. It proposes an algorithm which learns policy constraints, i.e., rules that characterize action selection in entire families of reinforcement learning tasks. Once learned, policy constraints are used to bias ..."
Abstract - Add to MetaCart
This paper addresses the problem of knowledge transfer in lifelong reinforcement learning. It proposes an algorithm which learns policy constraints, i.e., rules that characterize action selection in entire families of reinforcement learning tasks. Once learned, policy constraints are used

Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks

by Ros Tassiulas, Anthony Ephremides - IEEE Transactions on Automatic Control , 1992
"... Abstruct-The stability of a queueing network with interdependent servers is considered. The dependency of servers is described by the definition of their subsets that can be activated simultaneously. Multihop packet radio networks (PRN’s) provide a motivation for the consideration of this system. We ..."
Abstract - Cited by 949 (19 self) - Add to MetaCart
. We study the problem of scheduling the server activation under the constraints imposed by the dependency among them. The performance criterion of a scheduling policy m is its throughput that is characterized by its stability region C,, that is, the set of vectors of arrival rates for which the system

Implications of rational inattention

by Christopher A. Sims - JOURNAL OF MONETARY ECONOMICS , 2002
"... A constraint that actions can depend on observations only through a communication channel with finite Shannon capacity is shown to be able to play a role very similar to that of a signal extraction problem or an adjustment cost in standard control problems. The resulting theory looks enough like fa ..."
Abstract - Cited by 525 (11 self) - Add to MetaCart
A constraint that actions can depend on observations only through a communication channel with finite Shannon capacity is shown to be able to play a role very similar to that of a signal extraction problem or an adjustment cost in standard control problems. The resulting theory looks enough like

RCV1: A new benchmark collection for text categorization research

by David D. Lewis, Yiming Yang, Tony G. Rose, Fan Li - JOURNAL OF MACHINE LEARNING RESEARCH , 2004
"... Reuters Corpus Volume I (RCV1) is an archive of over 800,000 manually categorized newswire stories recently made available by Reuters, Ltd. for research purposes. Use of this data for research on text categorization requires a detailed understanding of the real world constraints under which the data ..."
Abstract - Cited by 663 (11 self) - Add to MetaCart
Reuters Corpus Volume I (RCV1) is an archive of over 800,000 manually categorized newswire stories recently made available by Reuters, Ltd. for research purposes. Use of this data for research on text categorization requires a detailed understanding of the real world constraints under which

Learning policy constraints through dialogue

by Chukwuemeka David Emele, Timothy J. Norman, Frank Guerin, Simon Parsons - In Proc. of the AAAI Fall Symposium on The Uses of Computational Argumentation , 2009
"... An understanding of the policy and resource availability constraints under which others operate is important for effectively developing and resourcing plans in a multi-agent context. Such constraints (or norms) are not necessarily public knowledge, even within a team of collaborating agents. What is ..."
Abstract - Cited by 4 (4 self) - Add to MetaCart
An understanding of the policy and resource availability constraints under which others operate is important for effectively developing and resourcing plans in a multi-agent context. Such constraints (or norms) are not necessarily public knowledge, even within a team of collaborating agents. What

Agent Support for Mission Planning Under Policy Constraints

by Chris Burnett, Daniele Masato, Mairi Mccallum, Timothy J. Norman
"... Abstract—Mission-critical scenarios, such as military or disaster response missions, often call for the formation of coalitions, made up of people from different countries or organizations and required to adhere to certain policies. These policies define the explicit obligations, permissions and pro ..."
Abstract - Cited by 9 (7 self) - Add to MetaCart
and prohibitions governing members of the coalition. While planning for joint action in these scenarios is already a complex problem for human planners, it is made more difficult or even impossible under such policy constraints, especially if policy conflicts exist between them. In this paper we propose

PROBABILISTIC VOTING AND ACCOUNTABILITY IN ELECTIONS WITH UNCERTAIN POLICY CONSTRAINTS

by Adam Meirowitz
"... We consider accountability in repeated elections with two long-lived parties that have distinct policy preferences and different levels of valence. In each period the government faces a privately observed feasibility constraint and selects a publicly observed policy vector. While pure strategy equil ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
We consider accountability in repeated elections with two long-lived parties that have distinct policy preferences and different levels of valence. In each period the government faces a privately observed feasibility constraint and selects a publicly observed policy vector. While pure strategy

Checking Complex Compositions of Web Services Against Policy Constraints

by Andrew Dingwall-smith, Anthony Finkelstein
"... Abstract. Research in web services has allowed reusable, distributed, loosely coupled components which can easily be composed to build systems or to produce more complex services. Composition of these components is generally done in an ad-hoc manner. As compositions of services become more widely us ..."
Abstract - Cited by 4 (0 self) - Add to MetaCart
used and, inevitably, more complex, there is a need to ensure that compositions of services obey constraints. In this paper, we consider the need to provide policy constraints on service compositions, that define how services can be composed in a particular business setting. We describe compositions

Specification and Validation of Enterprise Access Control Data for Conformance to Model and Policy Constraints

by Ramaswamy Chandramouli
"... The effectiveness of an enterprise access control framework depends upon the integrity of the various components or the building blocks used in that framework. The essential components of that framework are: (a) an Enterprise Access Control Model (b) a Validation mechanism to verify the enterprise a ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
access control data developed based on that model, for conformance to the model as well as domain-specific policy constraints and (c) a mechanism to map the enterprise access control data into formats required by native access enforcement mechanisms in the heterogeneous application systems
Next 10 →
Results 1 - 10 of 7,677
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University