• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 28,488
Next 10 →

The protection of information in computer systems

by Jerome H. Saltzer, Michael D. Schroeder
"... This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sectio ..."
Abstract - Cited by 824 (2 self) - Add to MetaCart
sections. Section I describes desired functions, design principles, and examples of elementary protection and authentication mechanisms. Any reader familiar with computers should find the first section to be reasonably accessible. Section II requires some familiarity with descriptor-based computer

Analysis of TCP Performance over Mobile Ad Hoc Networks Part I: Problem Discussion and Analysis of Results

by Gavin Holland, Nitin Vaidya , 1999
"... Mobile ad hoc networks have gained a lot of attention lately as a means of providing continuous network connectivity to mobile computing devices regardless of physical location. Recently, a large amount of research has focused on the routing protocols needed in such an environment. In this two-part ..."
Abstract - Cited by 521 (5 self) - Add to MetaCart
Mobile ad hoc networks have gained a lot of attention lately as a means of providing continuous network connectivity to mobile computing devices regardless of physical location. Recently, a large amount of research has focused on the routing protocols needed in such an environment. In this two

The performance of mutual funds in the period 1945-1964

by Michael C. Jensen - JOURNAL OF FINANCE , 1968
"... In this paper I derive a risk-adjusted measure of portfolio performance (now known as "Jensen's Alpha") that estimates how much a manager's forecasting ability contributes to the fund's returns. The measure is based on the theory of the pricing of capital assets by Sharpe (1 ..."
Abstract - Cited by 615 (1 self) - Add to MetaCart
of the model and the properties of the performance measure suggested here are discussed in Section II. The evidence on mutual fund performance indicates not only that these 115 mutual funds were on average not able to predict security prices well enough to outperform a buy-the-marketand-hold policy, but also

Brain magnetic resonance imaging with contrast dependent on blood oxygenation.

by S Ogawa , T M Lee , A R Kay , D W Tank - Proc. Natl. Acad. Sci. USA , 1990
"... ABSTRACT Paramagnetic deoxyhemoglobin in venous blood is a naturally occurring contrast agent for magnetic resonance imaging (MRI). By accentuating the effects of this agent through the use of gradient-echo techniques in high fields, we demonstrate in vivo images of brain microvasculature with imag ..."
Abstract - Cited by 648 (1 self) - Add to MetaCart
to regional neural activity. Magnetic resonance imaging (MRI) is a widely accepted modality for providing anatomical information. Current research (1) involves extending MRI methods to provide information about biological function, in addition to the concomitant anatomical information. In addition

The HEARSAY-II speech understanding system: Integrating knowledge to resolve uncertainty

by Lee D. Erman, Victor R. Lesser - Computing Surveys , 1980
"... The Hearsay-II system, developed during the DARPA-sponsored five-year speech-understanding research program, represents both a specific solution to the speech-understanding problem and a general framework for coordinating independent processes to achieve cooperative problem-solving behavior. As a co ..."
Abstract - Cited by 392 (23 self) - Add to MetaCart
The Hearsay-II system, developed during the DARPA-sponsored five-year speech-understanding research program, represents both a specific solution to the speech-understanding problem and a general framework for coordinating independent processes to achieve cooperative problem-solving behavior. As a

European Unemployment Dilemma

by Lars Ljungqvist, Thomas J. Sargent - Journal of Political Economy , 1998
"... Post World War II European welfare states experienced several decades of relatively low unemployment, followed by a plague of persistently high unemployment since the 1980's. We impute the higher unemployment towelfare states ' diminished ability to cope with more turbulent economic times, ..."
Abstract - Cited by 414 (18 self) - Add to MetaCart
Post World War II European welfare states experienced several decades of relatively low unemployment, followed by a plague of persistently high unemployment since the 1980's. We impute the higher unemployment towelfare states ' diminished ability to cope with more turbulent economic times

The Determinants of Credit Spread Changes.

by Pierre Collin-Dufresne , Robert S Goldstein , J Spencer Martin , Gurdip Bakshi , Greg Bauer , Dave Brown , Francesca Carrieri , Peter Christoffersen , Susan Christoffersen , Greg Duffee , Darrell Duffie , Vihang Errunza , Gifford Fong , Mike Gallmeyer , Laurent Gauthier , Rick Green , John Griffin , Jean Helwege , Kris Jacobs , Chris Jones , Andrew Karolyi , Dilip Madan , David Mauer , Erwan Morellec , Federico Nardari , N R Prabhala , Tony Sanders , Sergei Sarkissian , Bill Schwert , Ken Singleton , Chester Spatt , René Stulz - Journal of Finance , 2001
"... ABSTRACT Using dealer's quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression are ..."
Abstract - Cited by 422 (2 self) - Add to MetaCart
, Karen Wruck, and an anonymous referee for helpful comments. We thank Ahsan Aijaz, John Puleo, and Laura Tuttle for research assistance. We are also grateful to seminar participants at Arizona State University, University of Maryland, McGill University, The Ohio State University, University of Rochester

Efficient Capital Market: II” ,

by Eugene F Fama , Fischer Black , David Booth , Michael Bradley , Michael Brennan , Stephen Buser , John Campbell , Nai-Fu Chen , John Cochrane , George Constantinides , Wayne Ferson , Kenneth French , Campbell Harvey , Richard Ippolito , Michael Jensen , Gautam Kaul , Josef Lakonishok , Bill Mcdonald , Robert Merton , Mark Mitchell , Sam Peltzman , Marc Reinganum , Jay Ritter , Harry Roberts , Richard Roll , G William Schwert , H Nejat Seyhun , Jay Shanken , Robert Shiller , Andrei Shleifer , Rex Sinquefield , Rene Stulz , Richard Thaler , Robert Vishny , Jerold Warner - Journal of Finance, No , 1991
"... SEQUELS ARE RARELY AS good as the originals, so I approach this review of the market efflciency literature with trepidation. The task is thornier than it was 20 years ago, when work on efficiency was rather new. The literature is now so large that a full review is impossible, and is not attempted h ..."
Abstract - Cited by 337 (0 self) - Add to MetaCart
here. Instead, I discuss the work that I find most interesting, and I offer my views on what we have learned from the research on market efficiency. I. The Theme I take the market efficiency hypothesis to be the simple statement that security prices fully reflect all available information. A

Knowledge Engineering: Principles and Methods

by Rudi Studer, V. Richard Benjamins, Dieter Fensel
"... This paper gives an overview about the development of the field of Knowledge Engineering over the last 15 years. We discuss the paradigm shift from a transfer view to a modeling view and describe two approaches which considerably shaped research in Knowledge Engineering: Role-limiting Methods and Ge ..."
Abstract - Cited by 367 (6 self) - Add to MetaCart
This paper gives an overview about the development of the field of Knowledge Engineering over the last 15 years. We discuss the paradigm shift from a transfer view to a modeling view and describe two approaches which considerably shaped research in Knowledge Engineering: Role-limiting Methods

Logit models and logistic regressions for social networks. II . . .

by Philippa Pattison, Stanley Wasserman , 1999
"... The research described here builds on our previous work by generalizing the univariate models described there to models for multivariate relations. This family, labelled p*, generalizes the Markov random graphs of Frank and Strauss, which were further developed by them and others, building on Besag’ ..."
Abstract - Cited by 321 (7 self) - Add to MetaCart
The research described here builds on our previous work by generalizing the univariate models described there to models for multivariate relations. This family, labelled p*, generalizes the Markov random graphs of Frank and Strauss, which were further developed by them and others, building on Besag
Next 10 →
Results 1 - 10 of 28,488
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University