Results 1 - 10
of
6,741
Systems Competition and Network Effects
- JOURNAL OF ECONOMIC PERSPECTIVES—VOLUME 8, NUMBER 2—SPRING 1994—PAGES 93–115
, 1994
"... Many products have little or no value in isolation, but generate value when combined with others. Examples include: nuts and bolts, which together provide fastening services; home audio or video components and programming, which together provide entertainment services; automobiles, repair parts and ..."
Abstract
-
Cited by 544 (6 self)
- Add to MetaCart
Many products have little or no value in isolation, but generate value when combined with others. Examples include: nuts and bolts, which together provide fastening services; home audio or video components and programming, which together provide entertainment services; automobiles, repair parts
Composable memory transactions
- In Symposium on Principles and Practice of Parallel Programming (PPoPP
, 2005
"... Atomic blocks allow programmers to delimit sections of code as ‘atomic’, leaving the language’s implementation to enforce atomicity. Existing work has shown how to implement atomic blocks over word-based transactional memory that provides scalable multiprocessor performance without requiring changes ..."
Abstract
-
Cited by 509 (43 self)
- Add to MetaCart
changes to the basic structure of objects in the heap. However, these implementations perform poorly because they interpose on all accesses to shared memory in the atomic block, redirecting updates to a thread-private log which must be searched by reads in the block and later reconciled with the heap when
How Social Security and Medicare Affect Retirement Behavior in a World of Incomplete Markets
- ECONOMETRICA
, 1997
"... This paper provides an empirical analysis of how the U.S. Social Security and Medicare insurance system affect the labor supply of older males in the presence of incomplete markets for loans, annuities, and health insurance. We estimate a detailed dynamic programming (DP) model of the joint labor ..."
Abstract
-
Cited by 371 (11 self)
- Add to MetaCart
This paper provides an empirical analysis of how the U.S. Social Security and Medicare insurance system affect the labor supply of older males in the presence of incomplete markets for loans, annuities, and health insurance. We estimate a detailed dynamic programming (DP) model of the joint labor
Open Source Software and the "Private-Collective" Innovation Model: Issues for Organization Science
, 2003
"... Currently, two modelsof innovation are prevalent in organization science. The "private investment" model assumes returns to the innovator resultfsu private goods andef ficient regimesof intellectual property protection. The "collective action" model assumes that under con ..."
Abstract
-
Cited by 257 (5 self)
- Add to MetaCart
conditionsof market f ailure, innovators collaborate in order to produce a public good. The phenomenonof open sourcesofc are development shows that users program to solve their own as well as shared technical problems, andfd./( reveal their innovations without appropriating private returnsftu selling
The LRPD Test: Speculative Run-Time Parallelization of Loops with Privatization and Reduction Parallelization
, 1995
"... Current parallelizing compilers cannot identify a significant fraction of parallelizable loops because they have complex or statically insufficiently defined access patterns. As parallelizable loops arise frequently in practice, we advocate a novel framework for their identification: speculatively e ..."
Abstract
-
Cited by 261 (44 self)
- Add to MetaCart
execute the loop as a doall, and apply a fully parallel data dependence test to determine if it had any cross--iteration dependences; if the test fails, then the loop is re--executed serially. Since, from our experience, a significant amount of the available parallelism in Fortran programs can
Private School Vouchers and Student Achievement: An Evaluation of the Milwaukee Parental Choice Program,” Quarterly
- Journal of Economics
, 1998
"... In 1990 Wisconsin began providing vouchers to a small number of low-income students to attend nonsectarian private schools. Controlling for individual xed-effects, I compare the test scores of students selected to attend a participating private school with those of unsuccessful applicants and other ..."
Abstract
-
Cited by 196 (6 self)
- Add to MetaCart
In 1990 Wisconsin began providing vouchers to a small number of low-income students to attend nonsectarian private schools. Controlling for individual xed-effects, I compare the test scores of students selected to attend a participating private school with those of unsuccessful applicants and other
Speculative Versioning Cache
- In Proceedings of the Fourth International Symposium on High-Performance Computer Architecture
, 1998
"... Dependences among loads and stores whose addresses are unknown hinder the extraction of instruction level parallelism during the execution of a sequential program. Such ambiguous memory dependences can be overcome by memory dependence speculation which enables a load or store to be speculatively exe ..."
Abstract
-
Cited by 207 (8 self)
- Add to MetaCart
Dependences among loads and stores whose addresses are unknown hinder the extraction of instruction level parallelism during the execution of a sequential program. Such ambiguous memory dependences can be overcome by memory dependence speculation which enables a load or store to be speculatively
Transforming out Timing Leaks
- IN PROC. 27TH ACM SYMP. ON PRINCIPLES OF PROGRAMMING LANGUAGES (POPL
, 2000
"... One aspect of security in mobile code is privacy: private (or secret) data should not be leaked to unauthorised agents. Most of the work on secure information flow has until recently only been concerned with detecting direct and indirect flows. Secret information can however be leaked to the att ..."
Abstract
-
Cited by 203 (2 self)
- Add to MetaCart
One aspect of security in mobile code is privacy: private (or secret) data should not be leaked to unauthorised agents. Most of the work on secure information flow has until recently only been concerned with detecting direct and indirect flows. Secret information can however be leaked
Private Bag X6001, Potchefstroom 2520,
, 2008
"... ���We consider an azimuthally symmetric solution to Poison’s equation, ∇ 2ϕ=4πGρ, for empty space and so doing, a gravitational potential dependent on both r and θ is obtained, that isϕ=ϕ(r,θ). From this potential it is possible to explain qualitatively why Pioneer 10/11 detected an anomalous accele ..."
Abstract
- Add to MetaCart
���We consider an azimuthally symmetric solution to Poison’s equation, ∇ 2ϕ=4πGρ, for empty space and so doing, a gravitational potential dependent on both r and θ is obtained, that isϕ=ϕ(r,θ). From this potential it is possible to explain qualitatively why Pioneer 10/11 detected an anomalous acceleration of (8.74±1.33)×10 −10 ms−2 directed radially toward the Sun. The derived potential has implications for planetary motions in the solar system such as the advance of the perihelion of planetary orbits and also the tilt of some of the planetary orbits. The equation for the planetary orbits are derived but not explored here.
Object Structure in the Emerald System
- OOPSLA'S6 Conference Proceedings, 29 September
, 1986
"... Emerald is an object.based language for the construction of distributed applications. The principal features of Emerald lnehtde a uniform object model appropriate for programming both private local objects and shared remote objects, and a type system that permits multiple user.defined and compiler-d ..."
Abstract
-
Cited by 167 (12 self)
- Add to MetaCart
Emerald is an object.based language for the construction of distributed applications. The principal features of Emerald lnehtde a uniform object model appropriate for programming both private local objects and shared remote objects, and a type system that permits multiple user.defined and compiler
Results 1 - 10
of
6,741