• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,700
Next 10 →

The moderator–mediator variable distinction in social psychological research: Conceptual, strategic, and statistical considerations

by Reuben M. Baron, David A. Kenny - Journal of Personality and Social Psychology , 1986
"... In this article, we attempt to distinguish between the properties of moderator and mediator variables at a number of levels. First, we seek to make theorists and researchers aware of the importance of not using the terms moderator and mediator interchangeably by carefully elaborating, both conceptua ..."
Abstract - Cited by 5736 (8 self) - Add to MetaCart
conceptually and strategically, the many ways in which moderators and mediators differ. We then go beyond this largely pedagogical function and delineate the conceptual and strategic implications of making use of such distinctions with regard to a wide range of phenomena, including control and stress

Potential games

by Dov Monderer, Lloyd S. Shapley , 1996
"... We define and discuss several notions of potential functions for games in strategic form. We characterize games that have a potential function, and we present a variety of applications. ..."
Abstract - Cited by 589 (4 self) - Add to MetaCart
We define and discuss several notions of potential functions for games in strategic form. We characterize games that have a potential function, and we present a variety of applications.

Transformation of structure-shy programs: applied to XPath queries and strategic functions, in

by Alcino Cunha, Joost Visser - PEPM’07: Proceedings of the 2007 ACM SIGPLAN Workshop on Partial Evaluation and Semantics-based Program Manipulation, ACM
"... Various programming languages allow the construction of structureshy programs. Such programs are defined generically for many different datatypes and only specify specific behavior for a few relevant subtypes. Typical examples are XML query languages that allow selection of subdocuments without exha ..."
Abstract - Cited by 17 (4 self) - Add to MetaCart
exhaustively specifying intermediate element tags. Other examples are languages and libraries for polytypic or strategic functional programming and for adaptive object-oriented programming. In this paper, we present an algebraic approach to transformation of declarative structure-shy programs, in particular

Securing the Strategic Value of Information Systems: Constructing Strategic Function Chains

by Gwo-guang Lee, Tom Gough , 1994
"... Organisational success is increasingly dependent on the use of information systems. However, given the tendency to oversimplify the difficulties of achieving the strategic value of information systems, failure to secure that value is inevitable. To develop strategic information systems successfull ..."
Abstract - Add to MetaCart
information systems as only one ingredient of the solution, not the solution itself. To support managers (and organisations) in achieving this purpose, a structured and effective approach is called for. This paper outlines an approach that aims to construct strategic function chains and secure

Abstract Transformation of Structure-Shy Programs Applied to XPath Queries and Strategic Functions

by unknown authors
"... Various programming languages allow the construction of structureshy programs. Such programs are defined generically for many different datatypes and only specify specific behavior for a few relevant subtypes. Typical examples are XML query languages that allow selection of subdocuments without exha ..."
Abstract - Add to MetaCart
exhaustively specifying intermediate element tags. Other examples are languages and libraries for polytypic or strategic functional programming and for adaptive object-oriented programming. In this paper, we present an algebraic approach to transformation of declarative structure-shy programs, in particular

LOSS OF SYNCHRONISM DETECTION, A STRATEGIC FUNCTION FOR POWER SYSTEM PROTECTION

by R. Grondin, A. Heniche, M. Dobrescu, G. Trudel, M. Rousseau, B. Kirby, Simon Richards, A. Apostolov, Areva T, D Areva T
"... Maintaining power system reliability in a deregulated market environment is a day-by-day challenge for electrical utilities throughout the world. Stability and thermal limits, voltage collapse and loop flows are usual constraints that system planners and operators have to deal with. Recent cascading ..."
Abstract - Add to MetaCart
-of-synchronism detection is considered a strategic function to protect a power system against severe contingencies and cascading failures. A major North-American power utility, Hydro-Québec operates a modern, extensive and complex power system that requires efficient and innovative automatic protection schemes. Its

Strategic interaction among governments: An overview of empirical studies

by Jan K. Brueckner - International Regional Sience Review , 2003
"... This article provides an overview of empirical models of strategic interaction among governments. To clarify the theoretical roots of such studies, the discussion shows how the empirical frameworks fit into two broad categories: spillover models and resource-flow models. Both types of models generat ..."
Abstract - Cited by 221 (0 self) - Add to MetaCart
generate jurisdictional reaction functions, and the empirical task is to estimate such functions. When the estimated reaction-function slope is nonzero, the presence of strategic interaction is confirmed. The second part of the article reviews three econometric issues relevant to this estimation problem.

FAST TOPOLOGY DETECTION BASED ON OPEN LINE DETECTION RELAYS, A STRATEGIC FUNCTION IN POWER SYSTEM PROTECTION

by R. Grondin, M. Rousseau, B. Kirby, J. Attas, I. Kamwa, D. P. Bui, C. Lafond, Y. Michaud, J. Béland, D Alstom T
"... In the present deregulated and market driven energy industry, modern power systems need to be operated closer to their design limits. Moreover, their topology is becoming more complex due to additional interconnection links. Efficient defense plans are therefore more important than ever to provide f ..."
Abstract - Add to MetaCart
fast, secure and reliable means of protecting these systems against their own contingencies or those experienced by their neighbours. System topology monitoring is a strategic function to consider in the design of defense plans. Hydro-Québec transmission system is making extensive use of open line

Robust Incentive Techniques for Peer-to-Peer Networks

by Michal Feldman, Kevin Lai, Ion Stoica, John Chuang , 2004
"... Lack of cooperation (free riding) is one of the key problems that confronts today's P2P systems. What makes this problem particularly difficult is the unique set of challenges that P2P systems pose: large populations, high turnover, asymmetry of interest, collusion, zero-cost identities, and tr ..."
Abstract - Cited by 256 (3 self) - Add to MetaCart
, and traitors. To tackle these challenges we model the P2P system using the Generalized Prisoner's Dilemma (GPD), and propose the Reciprocative decision function as the basis of a family of incentives techniques. These techniques are fully distributed and include: discriminating server selection

A Functional Basis for Engineering Design: Reconciling and Evolving Previous Efforts

by Julie Hirtz, Robert B. Stone, Simon Szykman, Daniel A. McAdams, Kristin L. Wood
"... In engineering design, all products and artifacts have some intended reason behind their existence: the product or artifact function. Functional modeling provides an abstract, yet direct, method for understanding and representing an overall product or artifact function. Functional modeling also stra ..."
Abstract - Cited by 197 (47 self) - Add to MetaCart
strategically guides design activities such as problem decomposition, physical modeling, product architecting, concept generation, and team organization. A formal function representation is needed to support functional modeling, and a standardized set of functionrelated terminology leads to repeatable
Next 10 →
Results 1 - 10 of 3,700
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University