• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 448,910
Next 10 →

Disconnected Operation in the Coda File System

by James J. Kistler, M. Satyanarayanan - ACM Transactions on Computer Systems , 1992
"... Disconnected operation is a mode of operation that enables a client to continue accessing critical data during temporary failures of a shared data repository. An important, though not exclusive, application of disconnected operation is in supporting portable computers. In this paper, we show that di ..."
Abstract - Cited by 1014 (36 self) - Add to MetaCart
Disconnected operation is a mode of operation that enables a client to continue accessing critical data during temporary failures of a shared data repository. An important, though not exclusive, application of disconnected operation is in supporting portable computers. In this paper, we show

Adolescence-limited and life-course-persistent antisocial behavior: Adevelopmental taxonomy

by Terrie E. Moffitt - Psychological Review , 1993
"... A dual taxonomy is presented to reconcile 2 incongruous facts about antisocial behavior: (a) It shows impressive continuity over age, but (b) its prevalence changes dramatically over age, increasing almost 10-fold temporarily during adolescence. This article suggests that delinquency conceals 2 dist ..."
Abstract - Cited by 549 (4 self) - Add to MetaCart
in ways that are normative and adjustive. There are marked individual differences in the stability of antisocial behavior. Many people behave antisocially, but their antisocial behavior is temporary and situational. In contrast, the antisocial behavior of some people is very stable and persistent

Some Evidence on the Importance of Sticky Prices

by Mark Bils, Peter J. Klenow - JOURNAL OF POLITICAL ECONOMY , 2004
"... We examine the frequency of price changes for 350 categories of goods and services covering about 70 % of consumer spending, based on unpublished data from the BLS for 1995 to 1997. Compared with previous studies we find much more frequent price changes, with half of goods' prices lasting less ..."
Abstract - Cited by 734 (15 self) - Add to MetaCart
than 4.3 months. Even excluding the role of temporary price cuts (sales), we find that half of goods' prices last 5.5 months or less. The frequency of price changes differs dramatically across categories. We exploit this variation to ask how inflation for "flexible-price goods" (goods

Dropout from higher education: A theoretical synthesis of recent research

by Vincent Tinto - Review of Educational Research , 1975
"... Despite the very extensive literature on dropout from higher education, much remains unknown about the nature of the dropout process. In large measure, the failure of past research to delineate more clearly the multiple characteristics of dropout can be traced to two major shortcomings; namely, inad ..."
Abstract - Cited by 755 (2 self) - Add to MetaCart
. Nor is it uncommon to find permanent dropouts placed together with persons whose leaving may be temporary in I am indebted to my research assistant, John B. Cullen, for having made an extensive literature search and compiling summaries of the literature for me. I am also indebted to Professors Peter

Controlled and automatic human information processing

by Walter Schneider, Richard M. Shiffrin - I. Detection, search, and attention. Psychological Review , 1977
"... A two-process theory of human information processing is proposed and applied to detection, search, and attention phenomena. Automatic processing is activa-tion of a learned sequence of elements in long-term memory that is initiated by appropriate inputs and then proceeds automatically—without subjec ..."
Abstract - Cited by 841 (15 self) - Add to MetaCart
—without subject control, without stressing the capacity limitations of the system, and without necessarily demanding attention. Controlled processing is a temporary activation of a se-quence of elements that can be set up quickly and easily but requires attention, is capacity-limited (usually serial in nature

End-to-End Routing Behavior in the Internet

by Vern Paxson , 1996
"... The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exception being Chinoy's analysis of the dynamics of Internet routing information [Ch93]. We report on an analysis of 40,000 end-to-end route measurements conducted using repeated “traceroutes” ..."
Abstract - Cited by 660 (13 self) - Add to MetaCart
” between 37 Internet sites. We analyze the routing behavior for pathological conditions, routing stability, and routing symmetry. For pathologies, we characterize the prevalence of routing loops, erroneous routing, infrastructure failures, and temporary outages. We find that the likelihood of encountering

A Note on the Confinement Problem

by Butler W. Lampson , 1973
"... This not explores the problem of confining a program during its execution so that it cannot transmit information to any other program except its caller. A set of examples attempts to stake out the boundaries of the problem. Necessary conditions for a solution are stated and informally justified. ..."
Abstract - Cited by 532 (0 self) - Add to MetaCart
This not explores the problem of confining a program during its execution so that it cannot transmit information to any other program except its caller. A set of examples attempts to stake out the boundaries of the problem. Necessary conditions for a solution are stated and informally justified.

Self-discrepancy: A theory relating self and affect

by E. Tory Higgins - Psychological Review , 1987
"... This article presents a theory of how different types of discrepancies between self-state representa-tions are related to different kinds of emotional vulnerabilities. One domain of the self (actual; ideal; ought) and one standpoint on the self (own; significant other) constitute each type of self-s ..."
Abstract - Cited by 567 (7 self) - Add to MetaCart
This article presents a theory of how different types of discrepancies between self-state representa-tions are related to different kinds of emotional vulnerabilities. One domain of the self (actual; ideal; ought) and one standpoint on the self (own; significant other) constitute each type of self-state

Knowledge and Common Knowledge in a Distributed Environment

by Joseph Y. Halpern, Yoram Moses - Journal of the ACM , 1984
"... : Reasoning about knowledge seems to play a fundamental role in distributed systems. Indeed, such reasoning is a central part of the informal intuitive arguments used in the design of distributed protocols. Communication in a distributed system can be viewed as the act of transforming the system&apo ..."
Abstract - Cited by 577 (55 self) - Add to MetaCart
's state of knowledge. This paper presents a general framework for formalizing and reasoning about knowledge in distributed systems. We argue that states of knowledge of groups of processors are useful concepts for the design and analysis of distributed protocols. In particular, distributed knowledge

Constrained model predictive control: Stability and optimality

by D. Q. Mayne, J. B. Rawlings, C. V. Rao, P. O. M. Scokaert - AUTOMATICA , 2000
"... Model predictive control is a form of control in which the current control action is obtained by solving, at each sampling instant, a finite horizon open-loop optimal control problem, using the current state of the plant as the initial state; the optimization yields an optimal control sequence and t ..."
Abstract - Cited by 696 (15 self) - Add to MetaCart
Model predictive control is a form of control in which the current control action is obtained by solving, at each sampling instant, a finite horizon open-loop optimal control problem, using the current state of the plant as the initial state; the optimization yields an optimal control sequence
Next 10 →
Results 1 - 10 of 448,910
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University