• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 18,759
Next 10 →

Table 3: Independent Party Party Party Party

in Computational Political Economy
by Ken Kollman, John H. Miller 1997
"... In PAGE 17: ...Table3 shows the coefficients for a simple bivariate regression of separation on extremism. The coefficient is significant by standard measures and in the expected direction.... In PAGE 17: ... Moreover, to make sure only one component of the ex- tremism measure is not causing the correlation with separation, we regress separation on the two parts of the extremism measure. The second col- umn of Table3 shows OLS coefficients for perim and the ratio of zsub and ztot. These data indicate that both components are important in predict- ing values of separation.... In PAGE 17: ... A random effects model allows the intercept to vary by each subset of data, while a fixed effects model, otherwise known as a least squares dummy variable model (LSDV), sets an intercept for each subset of the data. In Table3 the third and fourth columns show coefficients for these two methods. As is commonly noted in the econometrics literature (Hsiao 1986, Ch.... ..."
Cited by 3

Table 1. Voting for right-wing parties.

in Why do the poor support right-wing parties? A cross-national analysis
by John D. Huber, Piero Stanig 2007
"... In PAGE 10: ...lass (e.g., Switzerland, Britain and Sweden). Summaries of these data are found in Table1 . The data in the table are averages of proportions across the 28 elections.... In PAGE 11: ...Table1 make clear several points. First, if one wishes to examine poor support for anti-redistributive parties, it is important to consider the relevant baseline.... ..."
Cited by 1

Table D1:Comparison of Failure Probability Results for Third Party Interference

in Customer Reference: Corrib Gas Pipeline Safety Review
by Dr. Michael Acton, Dr. Robert Andrews, Loughborough Leicestershire 2006

TABLE VII COVERAGE OF ASES AND PREFIXES BY CANDIDATE THIRD-PARTY ADDRESSES

in On Third-party Addresses in Traceroute Paths
by Young Hyun, Andre Broido, kc claffy

TABLE VII COVERAGE OF ASES AND PREFIXES BY CANDIDATE THIRD-PARTY ADDRESSES

in On Third-party Addresses in Traceroute Paths
by Young Hyun Andre, Young Hyun, Andre Broido, Kc Claffy

TABLE VII COVERAGE OF ASES AND PREFIXES BY CANDIDATE THIRD-PARTY ADDRESSES

in On Third-party Addresses in Traceroute Paths
by unknown authors

TABLE 4-2 SOME POTENTIAL THIRD PARTIES TO WATER TRANSFERS

in Doctoral Student
by Jay R. Lund, Richard Kanazawa, Masters Student 1992

Table II. With the exception of profits, which do not vary with W x , all of these have the sign of q . Highera workers care more about the third party and take a higher action if the action helps the third party, or a lower action, if it hurts the third party. Because in equilibrium firms must be indifferent

in People People: Social Capital and the Labor-Market Outcomes of Underrepresented Groups
by Lex Borghans , Bas ter Weel, Bruce A. Weinberg 2005

Table 1 Comparison of B2B solutions

in unknown title
by unknown authors

Table 2 Ownership of achitectural layers for representative computer platforms, 1990 Product Platform

in How open is open enough?
by unknown authors
"... In PAGE 4: ... Unix eventually evolved into a new form of open non-proprietary platform standard, often referred to as the open systems movement (Gabel, 1987). As with any other operating system, Unix was not a complete platform specification, because each hardware system might have different processor and peripheral interface standards ( Table2 ). However, Unix quickly evolved into a portable OS that tended to hide the differences between hardware from software applications, and so could present a set of common APIs across widely divergent hardware implementations.... ..."
Next 10 →
Results 1 - 10 of 18,759
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University