• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,970
Next 10 →

Optimal control of execution costs

by Dimitris Bertsimas, Andrew W. Lo - JOURNAL OF FINANCIAL MARKETS 1 (1998) 1—50 , 1998
"... We derive dynamic optimal trading strategies that minimize the expected cost of trading a large block of equity over a fixed time horizon. Specifically, given a fixed block SM of shares to be executed within a fixed finite number of periods , and given a price-impact function that yields the executi ..."
Abstract - Cited by 193 (3 self) - Add to MetaCart
We derive dynamic optimal trading strategies that minimize the expected cost of trading a large block of equity over a fixed time horizon. Specifically, given a fixed block SM of shares to be executed within a fixed finite number of periods , and given a price-impact function that yields

Nephele/PACTs: A Programming Model and Execution Framework for Web-Scale Analytical Processing

by Dominic Battré, Stephan Ewen, Fabian Hueske, Odej Kao, Volker Markl, Daniel Warneke - In SOCC’10
"... We present a parallel data processor centered around a programming model of so called Parallelization Contracts (PACTs) and the scalable parallel execution engine Nephele [18]. The PACT programming model is a generalization of the well-known map/reduce programming model, extending it with further se ..."
Abstract - Cited by 91 (14 self) - Add to MetaCart
are not sufficient to express many data processing tasks both naturally and efficiently. 2) Map/reduce ties a program to a single fixed execution strategy, which is robust but highly suboptimal for many tasks. 3) Map/reduce makes no assumptions about the behavior of the functions. Hence, it offers only very limited

Execution Strategies in Fixed Income Markets

by Robert Almgren , 2013
"... Reducing trading costs and slippage is a universal concern of asset managers. Although the decision of what assets to hold is stil the most important aspect of investing, poor execution of trade decisions can subtract many basis points from overall return. Conversely, having an effective strategy to ..."
Abstract - Add to MetaCart
Reducing trading costs and slippage is a universal concern of asset managers. Although the decision of what assets to hold is stil the most important aspect of investing, poor execution of trade decisions can subtract many basis points from overall return. Conversely, having an effective strategy

MANAGING WITH STYLE: THE EFFECT OF MANAGERS ON FIRM POLICIES

by Marianne Bertrand, Antoinette Schoar , 2003
"... This paper investigates whether and how individual managers affect corporate behavior and performance. We construct a manager-firm matched panel data set which enables us to track the top managers across different firms over time. We find that manager fixed effects matter for a wide range of corpora ..."
Abstract - Cited by 251 (7 self) - Add to MetaCart
to observable managerial characteristics. We find that executives from earlier birth cohorts appear on average to be more conservative; on the other hand, managers who hold an MBA degree seem to follow on average more aggressive strategies.

Secure Transmission with Multiple Antennas: The MISOME Wiretap Channel

by Ashish Khisti, Gregory W. Wornell , 2007
"... The role of multiple antennas for secure communication is investigated within the framework of Wyner’s wiretap channel. We characterize the secrecy capacity in terms of generalized eigenvalues when the sender and eavesdropper have multiple antennas, the intended receiver has a single antenna, and t ..."
Abstract - Cited by 240 (19 self) - Add to MetaCart
, and the channel matrices are fixed and known to all the terminals, and show that a beamforming strategy is capacity-achieving. In addition, we show that in the high signal-to-noise (SNR) ratio regime the penalty for not knowing eavesdropper’s channel is small—a simple “secure space-time code ” that can be thought

Truthful Mechanisms for One-Parameter Agents

by Aron Archer, Eva Tardos
"... In this paper, we show how to design truthful (dominant strategy) mechanisms for several combinatorial problems where each agent’s secret data is naturally expressed by a single positive real number. The goal of the mechanisms we consider is to allocate loads placed on the agents, and an agent’s sec ..."
Abstract - Cited by 232 (3 self) - Add to MetaCart
In this paper, we show how to design truthful (dominant strategy) mechanisms for several combinatorial problems where each agent’s secret data is naturally expressed by a single positive real number. The goal of the mechanisms we consider is to allocate loads placed on the agents, and an agent’s

Mechanism design via differential privacy

by Frank Mcsherry - Proceedings of the 48th Annual Symposium on Foundations of Computer Science , 2007
"... We study the role that privacy-preserving algorithms, which prevent the leakage of specific information about participants, can play in the design of mechanisms for strategic agents, which must encourage players to honestly report information. Specifically, we show that the recent notion of differen ..."
Abstract - Cited by 212 (3 self) - Add to MetaCart
on the prices. As an important prelude to developing a privacy-preserving auction mechanism, we introduce and study a generalization of previous privacy work that accommodates the high sensitivity of the auction setting, where a single participant may dramatically alter the optimal fixed price, and a slight

Summarizing Scientific Articles - Experiments with Relevance and Rhetorical Status

by Simone Teufel, Marc Moens - Computational Linguistics , 2002
"... this paper we argue that scientific articles require a different summarization strategy than, for instance, news articles. We propose a strategy which concentrates on the rhetorical status of statements in the article: Material for summaries is selected in such a way that summaries can highlight the ..."
Abstract - Cited by 199 (3 self) - Add to MetaCart
this paper we argue that scientific articles require a different summarization strategy than, for instance, news articles. We propose a strategy which concentrates on the rhetorical status of statements in the article: Material for summaries is selected in such a way that summaries can highlight

The Executive

by Robert D. Wilson, Robert D. Wilson - In Congressional Government: A Study in American Politics , 1956
"... Evacuation planning has for decades relied on the results derived from mathematical modeling and scenario development. While there exist many mathematical and simulation models dealing with evacuation planning most lack one or more critical components needed by the individuals or agencies responsibl ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
responsible for removing people from harm’s way. Those critical components are real-time access to and representation of data to establish appropriate evacuation strategies. All the pieces for a real-time centralized evacuation system exist but have yet to be integrated as a single point system. The focus

Programmable stream processors

by Ujval J. Kapasi, William J. Dally, Scott Rixner, John D. Owens, Brucek Khailany - IEEE Computer , 2003
"... The Imagine Stream Processor is a single-chip programmable media processor with 48 parallel ALUs. At 400 MHz, this translates to a peak arithmetic rate of 16 GFLOPS on single-precision data and 32 GOPS on 16bit fixed-point data. The scalability of Imagine’s programming model and architecture enable ..."
Abstract - Cited by 159 (12 self) - Add to MetaCart
The Imagine Stream Processor is a single-chip programmable media processor with 48 parallel ALUs. At 400 MHz, this translates to a peak arithmetic rate of 16 GFLOPS on single-precision data and 32 GOPS on 16bit fixed-point data. The scalability of Imagine’s programming model and architecture enable
Next 10 →
Results 1 - 10 of 1,970
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University