• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 11,448
Next 10 →

Decentralized Trust Management

by Matt Blaze, Joan Feigenbaum, Jack Lacy - In Proceedings of the 1996 IEEE Symposium on Security and Privacy , 1996
"... We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies, an ..."
Abstract - Cited by 1025 (24 self) - Add to MetaCart
We identify the trust management problem as a distinct and important component of security in network services. Aspects of the trust management problem include formulating security policies and security credentials, determining whether particular sets of credentials satisfy the relevant policies

Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,

by ] Richard Hackman , Grec R Oldham , 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract - Cited by 622 (2 self) - Add to MetaCart
under government sponsorship are encouraged to express their own judgment freely, this report does not necessarily represent the official opinion or policy of the government. redesign are not fully adequate to meet the problems encountered in their application. Especially troublesome is the paucity

Toward a Conceptual Framework for Mixed-Method Evaluation Designs. Educational Evaluation and Policy Analysis

by Jennifer C. Greene, Valerie J. Caracelli, Wendy F. Graham , 1989
"... In recent years evaluators of educational and social programs have expanded their method-ological repertoire with designs that include the use of both qualitative and quantitative methods. Such practice, however, needs to be grounded in a theory that can meaningfully guide the design and implementat ..."
Abstract - Cited by 404 (3 self) - Add to MetaCart
: triangulation, complemen-tarity, development, initiation, and expansion. For each of the five purposes, a recommended design is also presented in terms of seven relevant design characteristics. These design elements encompass issues about methods, the phenomena under investigation, paradigmatic framework

WHO DRIVES CLIMATE-RELEVANT POLICY IMPLEMENTATION IN CHINA?

by Yixin Dai, Yixin Dai , 2015
"... This is an Open Access publication distributed under the terms of the Creative Commons Attribution License, which permits unrestricted ..."
Abstract - Add to MetaCart
This is an Open Access publication distributed under the terms of the Creative Commons Attribution License, which permits unrestricted

Isolating Relevant Policy Issues: Exploration of Small Business Bankruptcies in Georgia

by Gwen F Hanks , Suzanne Barnett , Lori Durden , Wendy Woodrum
"... Bankruptcies in Georgia have been ranked near the top in the country ..."
Abstract - Add to MetaCart
Bankruptcies in Georgia have been ranked near the top in the country

The stages of economic growth.

by W W Rostow - Economic History Review , 2nd series 12, , 1959
"... JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about J ..."
Abstract - Cited by 297 (0 self) - Add to MetaCart
-or permit only onceover change-in the variables most relevant to the process of economic growth. As modern economists have sought to merge classical production theory with Keynesian income analysis they have introduced the dynamic variables: population, technology, entrepreneurship, etc

Balance Sheets, The Transfer Problem, and Financial Crisis

by Paul Krugman - International Finance and Financial Crises, Essays in Honor of Robert P , 1999
"... In a world of high capital mobility, the threat of speculative attack becomes a central issue of macroeconomic policy. While “first-generation ” and “second-generation ” models of speculative attacks both have considerable relevance to particular financial crises of the 1990s, a “third-generation ” ..."
Abstract - Cited by 259 (1 self) - Add to MetaCart
In a world of high capital mobility, the threat of speculative attack becomes a central issue of macroeconomic policy. While “first-generation ” and “second-generation ” models of speculative attacks both have considerable relevance to particular financial crises of the 1990s, a “third

Dynamic storage allocation: A survey and critical review

by Paul R. Wilson, Mark S. Johnstone, Michael Neely, David Boles , 1995
"... Dynamic memory allocation has been a fundamental part of most computer systems since roughly 1960, and memory allocation is widely considered to be either a solved problem or an insoluble one. In this survey, we describe a variety of memory allocator designs and point out issues relevant to their de ..."
Abstract - Cited by 241 (6 self) - Add to MetaCart
Dynamic memory allocation has been a fundamental part of most computer systems since roughly 1960, and memory allocation is widely considered to be either a solved problem or an insoluble one. In this survey, we describe a variety of memory allocator designs and point out issues relevant

Pricing in Computer Networks: Reshaping the Research Agenda

by S. Shenker, D. Clark, D. Estrin, S. Herzog - ACM Computer Communication Review , 1996
"... As the Internet makes the transition from research testbed to commercial enterprise, the topic of pricing in computer networks has suddenly attracted great attention. Much of the discussion in the network design community and the popular press centers on the usage-based vs. fiat pricing debate. The ..."
Abstract - Cited by 236 (2 self) - Add to MetaCart
. The more academic literature has largely focused on devising optimal pricing policies; achieving optimal welfare requires charging marginal congestion costs for usage. In this paper we critique this optimality paradigm on three grounds: (1) marginal cost prices may not produce sufficient revenue to fully

Tree-based batch mode reinforcement learning

by Damien Ernst, Pierre Geurts, Louis Wehenkel - JOURNAL OF MACHINE LEARNING RESEARCH , 2005
"... Reinforcement learning aims to determine an optimal control policy from interaction with a system or from observations gathered from a system. In batch mode, it can be achieved by approximating the so-called Q-function based on a set of four-tuples (xt,ut,rt,xt+1) where xt denotes the system state a ..."
Abstract - Cited by 224 (42 self) - Add to MetaCart
based on regression trees perform well in extracting relevant information about the optimal control policy from sets of four-tuples. In particular, the totally randomized trees give good results while ensuring the convergence of the sequence, whereas by relaxing the convergence constraint even better
Next 10 →
Results 1 - 10 of 11,448
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University