• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 10,461
Next 10 →

The protection of information in computer systems

by Jerome H. Saltzer, Michael D. Schroeder
"... This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sectio ..."
Abstract - Cited by 824 (2 self) - Add to MetaCart
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main

Insiders and Outsiders: The Choice between Informed and Arm's-Length Debt

by Raghuram G. Rajan , 1991
"... While the benefits of bank financing are relatively well understood, the costs are not. This paper argues that while informed banks make flexible financial decisions which prevent a firm's projects from going awry, the cost of this credit is that banks have bargaining power over the firm's ..."
Abstract - Cited by 868 (16 self) - Add to MetaCart
While the benefits of bank financing are relatively well understood, the costs are not. This paper argues that while informed banks make flexible financial decisions which prevent a firm's projects from going awry, the cost of this credit is that banks have bargaining power over the firm

Information integration using logical views

by Jeffrey D. Ullman , 1997
"... A number of ideas concerning information-integration tools can be thought of as constructing answers to queries using views that represent the capabilities of information sources. We review the formal basis of these techniques, which are closely related to containment algorithms for conjunctive quer ..."
Abstract - Cited by 485 (4 self) - Add to MetaCart
A number of ideas concerning information-integration tools can be thought of as constructing answers to queries using views that represent the capabilities of information sources. We review the formal basis of these techniques, which are closely related to containment algorithms for conjunctive

Perspectives on Program Analysis

by Flemming Nielson , 1996
"... eing analysed. On the negative side, the semantic correctness of the analysis is seldom established and therefore there is often no formal justification for the program transformations for which the information is used. The semantics based approach [1; 5] is often based on domain theory in the form ..."
Abstract - Cited by 685 (35 self) - Add to MetaCart
in the form of abstract domains modelling sets of values, projections, or partial equivalence relations. The approach tends to focus more directly on discovering the extensional properties of interest: for constant propagation it might operate on sets of values with constancy corresponding to singletons

The theory and practice of corporate finance: Evidence from the field

by John R. Graham, Campbell R. Harvey - Journal of Financial Economics , 2001
"... We survey 392 CFOs about the cost of capital, capital budgeting, and capital structure. Large firms rely heavily on present value techniques and the capital asset pricing model, while small firms are relatively likely to use the payback criterion. We find that a surprising number of firms use their ..."
Abstract - Cited by 725 (23 self) - Add to MetaCart
-order and trade-off capital structure hypotheses but little evidence that executives are concerned about asset substitution, asymmetric information, transactions costs, free cash flows, or personal taxes. Key words: capital structure, cost of capital, cost of equity, capital budgeting, discount rates, project

Ontology Development 101: A Guide to Creating Your First Ontology

by Natalya F. Noy, Deborah L. Mcguinness , 2001
"... In recent years the development of ontologies—explicit formal specifications of the terms in the domain and relations among them (Gruber 1993)—has been moving from the realm of Artificial-Intelligence laboratories to the desktops of domain experts. Ontologies have become common on the World-Wide Web ..."
Abstract - Cited by 830 (5 self) - Add to MetaCart
for encoding knowledge on Web pages to make it understandable to electronic agents searching for information. The Defense Advanced Research Projects Agency (DARPA), in conjunction with the W3C, is developing DARPA Agent Markup Language (DAML) by extending RDF with more expressive constructs aimed

Representing Action and Change by Logic Programs

by Michael Gelfond, Vladimir Lifschitz - Journal of Logic Programming , 1993
"... We represent properties of actions in a logic programming language that uses both classical negation and negation as failure. The method is applicable to temporal projection problems with incomplete information, as well as to reasoning about the past. It is proved to be sound relative to a semantics ..."
Abstract - Cited by 414 (25 self) - Add to MetaCart
We represent properties of actions in a logic programming language that uses both classical negation and negation as failure. The method is applicable to temporal projection problems with incomplete information, as well as to reasoning about the past. It is proved to be sound relative to a

Determining the Epipolar Geometry and its Uncertainty: A Review

by Zhengyou Zhang, T. Kanade - International Journal of Computer Vision , 1998
"... Two images of a single scene/object are related by the epipolar geometry, which can be described by a 3×3 singular matrix called the essential matrix if images' internal parameters are known, or the fundamental matrix otherwise. It captures all geometric information contained in two i ..."
Abstract - Cited by 401 (9 self) - Add to MetaCart
Two images of a single scene/object are related by the epipolar geometry, which can be described by a 3×3 singular matrix called the essential matrix if images' internal parameters are known, or the fundamental matrix otherwise. It captures all geometric information contained in two

The Economic Implications of Corporate Financial Reporting

by John R. Graham , Campbell R. Harvey , Shiva Rajgopal , 2004
"... We survey 401 financial executives, and conduct in-depth interviews with an additional 20, to determine the key factors that drive decisions related to reported earnings and voluntary disclosure. The majority of firms view earnings, especially EPS, as the key metric for outsiders, even more so than ..."
Abstract - Cited by 369 (17 self) - Add to MetaCart
We survey 401 financial executives, and conduct in-depth interviews with an additional 20, to determine the key factors that drive decisions related to reported earnings and voluntary disclosure. The majority of firms view earnings, especially EPS, as the key metric for outsiders, even more so than

The project fragmentation problem in personal information management

by Ofer Bergman - Proceedings of the SIGCHI Conference on Human Factors in Computing Systems , 2006
"... The project fragmentation problem in personal information management occurs when someone who is working on a single project stores and retrieves information items relating to that project from separate format-related collections (documents, emails and favorite Web sites). This study was aimed to tes ..."
Abstract - Cited by 36 (2 self) - Add to MetaCart
project-related information items based on different formats in one project folder when the interface design encourages it. However, they store and retrieve project-related information items in different folders (documents, emails and favorite Web sites) when the design encourages such fragmentation. Two
Next 10 →
Results 1 - 10 of 10,461
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University