Results 1  10
of
4,189,738
Social force model for pedestrian dynamics
 Physical Review E
, 1995
"... It is suggested that the motion of pedestrians can be described as if they would be subject to ‘social forces’. These ‘forces ’ are not directly exerted by the pedestrians ’ personal environment, but they are a measure for the internal motivations of the individuals to perform certain actions (movem ..."
Abstract

Cited by 491 (25 self)
 Add to MetaCart
model is capable of describing the selforganization of several observed collective effects of pedestrian behavior very realistically. Typeset using REVTEX 1 I.
Several Observations On The Use
"... The conjugate gradient algorithm for symmetric positive definite systems should be viewed as an iterative algorithm (independent of its theoretical finite convergence). Its effectiveness for a particular problem depends upon the number of iterations required to achieve a certain accuracy. In this ..."
Abstract
 Add to MetaCart
The conjugate gradient algorithm for symmetric positive definite systems should be viewed as an iterative algorithm (independent of its theoretical finite convergence). Its effectiveness for a particular problem depends upon the number of iterations required to achieve a certain accuracy. In this paper we discuss the theoretical bounds on convergence as well as experimental results for parti cular problem classes. We also compare the standard conjugate gradient algorithm with the minimum residual variant and consider the use of such algorithms for dense and banded systems.
Surface deformation due to shear and tensile faults in a halfspace
, 1985
"... A complete set of closed analytical expressions is presented in a unified manner for the internal displacements and strains due to shear and tensile faults in a halfspace for both point and finite rectangular sources. These expressions are particularly compact and systematically composed of terms r ..."
Abstract

Cited by 698 (1 self)
 Add to MetaCart
representing deformations in an infinite medium, a term related to surface deformation and that is multiplied by the depth of observation point. Several practical suggestions to avoid mathematical singularities and computational instabilities are also presented. The expressions derived here represent powerful
A unified theory of underreaction, momentum trading and overreaction in asset markets
, 1999
"... We model a market populated by two groups of boundedly rational agents: “newswatchers” and “momentum traders.” Each newswatcher observes some private information, but fails to extract other newswatchers’ information from prices. If information diffuses gradually across the population, prices underre ..."
Abstract

Cited by 577 (31 self)
 Add to MetaCart
We model a market populated by two groups of boundedly rational agents: “newswatchers” and “momentum traders.” Each newswatcher observes some private information, but fails to extract other newswatchers’ information from prices. If information diffuses gradually across the population, prices
Eraser: a dynamic data race detector for multithreaded programs
 ACM Transaction of Computer System
, 1997
"... Multithreaded programming is difficult and error prone. It is easy to make a mistake in synchronization that produces a data race, yet it can be extremely hard to locate this mistake during debugging. This paper describes a new tool, called Eraser, for dynamically detecting data races in lockbased ..."
Abstract

Cited by 687 (2 self)
 Add to MetaCart
based multithreaded programs. Eraser uses binary rewriting techniques to monitor every shared memory reference and verify that consistent locking behavior is observed. We present several case studies, including undergraduate coursework and a multithreaded Web search engine, that demonstrate
Maximum entropy markov models for information extraction and segmentation
, 2000
"... Hidden Markov models (HMMs) are a powerful probabilistic tool for modeling sequential data, and have been applied with success to many textrelated tasks, such as partofspeech tagging, text segmentation and information extraction. In these cases, the observations are usually modeled as multinomial ..."
Abstract

Cited by 554 (18 self)
 Add to MetaCart
Hidden Markov models (HMMs) are a powerful probabilistic tool for modeling sequential data, and have been applied with success to many textrelated tasks, such as partofspeech tagging, text segmentation and information extraction. In these cases, the observations are usually modeled
Coordination of Groups of Mobile Autonomous Agents Using Nearest Neighbor Rules
, 2002
"... In a recent Physical Review Letters paper, Vicsek et. al. propose a simple but compelling discretetime model of n autonomous agents fi.e., points or particlesg all moving in the plane with the same speed but with dierent headings. Each agent's heading is updated using a local rule based on ..."
Abstract

Cited by 1245 (60 self)
 Add to MetaCart
coordination and despite the fact that each agent's set of nearest neighbors change with time as the system evolves. This paper provides a theoretical explanation for this observed behavior. In addition, convergence results are derived for several other similarly inspired models.
Premotor cortex and the recognition of motor actions
 Cognitive Brain Research
, 1996
"... In area F5 of the monkey premotor cortex there are neurons that discharge both when the monkey performs an action and when he observes a similar action made by another monkey or by the experimenter. We report here some of the properties of these 'mirror' neurons and we propose that their a ..."
Abstract

Cited by 702 (44 self)
 Add to MetaCart
In area F5 of the monkey premotor cortex there are neurons that discharge both when the monkey performs an action and when he observes a similar action made by another monkey or by the experimenter. We report here some of the properties of these 'mirror' neurons and we propose
Differential privacy . . .
, 2009
"... We show by means of several examples that robust statistical estimators present an excellent starting point for differentially private estimators. Our algorithms use a new paradigm for differentially private mechanisms, which we call ProposeTestRelease (PTR), and for which we give a formal definit ..."
Abstract

Cited by 629 (10 self)
 Add to MetaCart
We show by means of several examples that robust statistical estimators present an excellent starting point for differentially private estimators. Our algorithms use a new paradigm for differentially private mechanisms, which we call ProposeTestRelease (PTR), and for which we give a formal
Bid, ask and transaction prices in a specialist market with heterogeneously informed traders
 Journal of Financial Economics
, 1985
"... The presence of traders with superior information leads to a positive bidask spread even when the specialist is riskneutral and makes zero expected profits. The resulting transaction prices convey information, and the expectation of the average spread squared times volume is bounded by a number th ..."
Abstract

Cited by 1217 (5 self)
 Add to MetaCart
that is independent of insider activity. The serial correlation of transaction price differences is a function of the proportion of the spread due to adverse selection. A bidask spread implies a divergence between observed returns and realizable returns. Observed returns are approximately realizable returns plus
Results 1  10
of
4,189,738