• Documents
  • Authors
  • Tables

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,741
Next 10 →

Systems Competition and Network Effects

by Michael L. Katz, Carl Shapiro - JOURNAL OF ECONOMIC PERSPECTIVES—VOLUME 8, NUMBER 2—SPRING 1994—PAGES 93–115 , 1994
"... Many products have little or no value in isolation, but generate value when combined with others. Examples include: nuts and bolts, which together provide fastening services; home audio or video components and programming, which together provide entertainment services; automobiles, repair parts and ..."
Abstract - Cited by 544 (6 self) - Add to MetaCart
Many products have little or no value in isolation, but generate value when combined with others. Examples include: nuts and bolts, which together provide fastening services; home audio or video components and programming, which together provide entertainment services; automobiles, repair parts

Composable memory transactions

by Tim Harris, Mark Plesko, Avraham Shinnar, David Tarditi - In Symposium on Principles and Practice of Parallel Programming (PPoPP , 2005
"... Atomic blocks allow programmers to delimit sections of code as ‘atomic’, leaving the language’s implementation to enforce atomicity. Existing work has shown how to implement atomic blocks over word-based transactional memory that provides scalable multiprocessor performance without requiring changes ..."
Abstract - Cited by 509 (43 self) - Add to MetaCart
changes to the basic structure of objects in the heap. However, these implementations perform poorly because they interpose on all accesses to shared memory in the atomic block, redirecting updates to a thread-private log which must be searched by reads in the block and later reconciled with the heap when

How Social Security and Medicare Affect Retirement Behavior in a World of Incomplete Markets

by John Rust, Christopher Phelan - ECONOMETRICA , 1997
"... This paper provides an empirical analysis of how the U.S. Social Security and Medicare insurance system affect the labor supply of older males in the presence of incomplete markets for loans, annuities, and health insurance. We estimate a detailed dynamic programming (DP) model of the joint labor ..."
Abstract - Cited by 371 (11 self) - Add to MetaCart
This paper provides an empirical analysis of how the U.S. Social Security and Medicare insurance system affect the labor supply of older males in the presence of incomplete markets for loans, annuities, and health insurance. We estimate a detailed dynamic programming (DP) model of the joint labor

Open Source Software and the "Private-Collective" Innovation Model: Issues for Organization Science

by Eric von Hippel, Georg von Krogh , 2003
"... Currently, two modelsof innovation are prevalent in organization science. The "private investment" model assumes returns to the innovator resultfsu private goods andef ficient regimesof intellectual property protection. The "collective action" model assumes that under con ..."
Abstract - Cited by 257 (5 self) - Add to MetaCart
conditionsof market f ailure, innovators collaborate in order to produce a public good. The phenomenonof open sourcesofc are development shows that users program to solve their own as well as shared technical problems, andfd./( reveal their innovations without appropriating private returnsftu selling

The LRPD Test: Speculative Run-Time Parallelization of Loops with Privatization and Reduction Parallelization

by Lawrence Rauchwerger, David Padua , 1995
"... Current parallelizing compilers cannot identify a significant fraction of parallelizable loops because they have complex or statically insufficiently defined access patterns. As parallelizable loops arise frequently in practice, we advocate a novel framework for their identification: speculatively e ..."
Abstract - Cited by 261 (44 self) - Add to MetaCart
execute the loop as a doall, and apply a fully parallel data dependence test to determine if it had any cross--iteration dependences; if the test fails, then the loop is re--executed serially. Since, from our experience, a significant amount of the available parallelism in Fortran programs can

Private School Vouchers and Student Achievement: An Evaluation of the Milwaukee Parental Choice Program,” Quarterly

by Cecilia Elena Rouse - Journal of Economics , 1998
"... In 1990 Wisconsin began providing vouchers to a small number of low-income students to attend nonsectarian private schools. Controlling for individual xed-effects, I compare the test scores of students selected to attend a participating private school with those of unsuccessful applicants and other ..."
Abstract - Cited by 196 (6 self) - Add to MetaCart
In 1990 Wisconsin began providing vouchers to a small number of low-income students to attend nonsectarian private schools. Controlling for individual xed-effects, I compare the test scores of students selected to attend a participating private school with those of unsuccessful applicants and other

Speculative Versioning Cache

by Sridhar Gopal, T. N. Vijaykumar James, E. Smith, Gurindar S. Sohi - In Proceedings of the Fourth International Symposium on High-Performance Computer Architecture , 1998
"... Dependences among loads and stores whose addresses are unknown hinder the extraction of instruction level parallelism during the execution of a sequential program. Such ambiguous memory dependences can be overcome by memory dependence speculation which enables a load or store to be speculatively exe ..."
Abstract - Cited by 207 (8 self) - Add to MetaCart
Dependences among loads and stores whose addresses are unknown hinder the extraction of instruction level parallelism during the execution of a sequential program. Such ambiguous memory dependences can be overcome by memory dependence speculation which enables a load or store to be speculatively

Transforming out Timing Leaks

by Johan Agat - IN PROC. 27TH ACM SYMP. ON PRINCIPLES OF PROGRAMMING LANGUAGES (POPL , 2000
"... One aspect of security in mobile code is privacy: private (or secret) data should not be leaked to unauthorised agents. Most of the work on secure information flow has until recently only been concerned with detecting direct and indirect flows. Secret information can however be leaked to the att ..."
Abstract - Cited by 203 (2 self) - Add to MetaCart
One aspect of security in mobile code is privacy: private (or secret) data should not be leaked to unauthorised agents. Most of the work on secure information flow has until recently only been concerned with detecting direct and indirect flows. Secret information can however be leaked

Private Bag X6001, Potchefstroom 2520,

by G. G. Nyambuya, Republic Of South Africa , 2008
"... ���We consider an azimuthally symmetric solution to Poison’s equation, ∇ 2ϕ=4πGρ, for empty space and so doing, a gravitational potential dependent on both r and θ is obtained, that isϕ=ϕ(r,θ). From this potential it is possible to explain qualitatively why Pioneer 10/11 detected an anomalous accele ..."
Abstract - Add to MetaCart
���We consider an azimuthally symmetric solution to Poison’s equation, ∇ 2ϕ=4πGρ, for empty space and so doing, a gravitational potential dependent on both r and θ is obtained, that isϕ=ϕ(r,θ). From this potential it is possible to explain qualitatively why Pioneer 10/11 detected an anomalous acceleration of (8.74±1.33)×10 −10 ms−2 directed radially toward the Sun. The derived potential has implications for planetary motions in the solar system such as the advance of the perihelion of planetary orbits and also the tilt of some of the planetary orbits. The equation for the planetary orbits are derived but not explored here.

Object Structure in the Emerald System

by Andrew Black, Norman Hutchinson, Eric Jul, Henry Levy - OOPSLA'S6 Conference Proceedings, 29 September , 1986
"... Emerald is an object.based language for the construction of distributed applications. The principal features of Emerald lnehtde a uniform object model appropriate for programming both private local objects and shared remote objects, and a type system that permits multiple user.defined and compiler-d ..."
Abstract - Cited by 167 (12 self) - Add to MetaCart
Emerald is an object.based language for the construction of distributed applications. The principal features of Emerald lnehtde a uniform object model appropriate for programming both private local objects and shared remote objects, and a type system that permits multiple user.defined and compiler
Next 10 →
Results 1 - 10 of 6,741
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University