Results 1 - 10
of
3,023
The influence of functional diversity and composition on ecosystem processes
- Science
, 1997
"... Humans are modifying both the identities and numbers of species in ecosystems, but the impacts of such changes on ecosystem processes are controversial. Plant species diversity, functional diversity, and functional composition were experimentally varied in grassland plots. Each factor by itself had ..."
Abstract
-
Cited by 231 (13 self)
- Add to MetaCart
significant effects on many ecosystem pro-cesses, but functional composition and functional diversity were the principal factors explaining plant productivity, plant percent nitrogen, plant total nitrogen, and light pen-etration. Thus, habitat modifications and management practices that change functional
Scalable, Graph-based Network Vulnerability Analysis,”
- Proceedings of the 9th ACM Conference on Computer and Communications Security,
, 2002
"... ABSTRACT Even well administered networks are vulnerable to attack. Recent work in network security has focused on the fact that combinations of exploits are the typical means by which an attacker breaks into a network. Researchers have proposed a variety of graph-based algorithms to generate attack ..."
Abstract
-
Cited by 152 (0 self)
- Add to MetaCart
attack trees (or graphs). Either structure represents all possible sequences of exploits, where any given exploit can take advantage of the penetration achieved by prior exploits in its chain, and the final exploit in the chain achieves the attacker's goal. The most recent approach in this line
Trade Policy, Trade Volumes and Plant-Level Productivity in Colombian Manufacturing Industries
, 2003
"... This paper explores Colombian trade policy during 1977-1991, a period of substantial variation in protection across industries, to examine whether increased exposure to foreign competition generates plant-level productivity gains. Using a large panel of manufacturing plants, we find a strong positiv ..."
Abstract
-
Cited by 130 (0 self)
- Add to MetaCart
This paper explores Colombian trade policy during 1977-1991, a period of substantial variation in protection across industries, to examine whether increased exposure to foreign competition generates plant-level productivity gains. Using a large panel of manufacturing plants, we find a strong
On the Efficiency of Estimating Penetrating Rank on Large Graphs
"... Abstract. P-Rank (Penetrating Rank) has been suggested as a useful measure of structural similarity that takes account of both incoming and outgoing edges in ubiquitous networks. Existing work often utilizes memoization to compute PRank similarity in an iterative fashion, which requires cubic time ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
Abstract. P-Rank (Penetrating Rank) has been suggested as a useful measure of structural similarity that takes account of both incoming and outgoing edges in ubiquitous networks. Existing work often utilizes memoization to compute PRank similarity in an iterative fashion, which requires cubic time
Authentic Third-party Data Publication
- CONFERENCE ON DATABASE SECURITY: DATA AND APPLICATION SECURITY, DEVELOPMENT AND DIRECTIONS
, 2000
"... Integrity critical databases, such as financial information, which are used in high-value decisions, are frequently published over the internet. Publishers of such data must satisfy the integrity, authenticity, and non-repudiation requirements of end clients. Providing this protection over public da ..."
Abstract
-
Cited by 94 (9 self)
- Add to MetaCart
data networks is an expensive proposition. This is, in part, due to the difficulty of building and running secure systems. In practice, large systems can not be verified to be secure and are frequently penetrated. The negative consequences of a system intrusion at the publisher can be severe
Optimization of Pumped Storage Capacity in an Isolated Power System with Large Renewable Penetration,” in
- IEEE Transactions on Power Systems
, 2008
"... Abstract—This work describes an economic analysis of the inclusion of pumped storage in a small island system that has abundant renewable energy available but that at times cannot accept all of this power because of limits imposed by security criteria. The question of whether or how much pumped stor ..."
Abstract
-
Cited by 16 (0 self)
- Add to MetaCart
, and optimal operating strategies for the scenarios are produced. Results showed that including pumped storage can be an effective means of allowing larger penetration of intermittent renewable energy sources, improving both the dynamic security and the economic operation of a test system. Including the dy
Market penetration costs and the new consumers margin in international trade
- Journal of Political Economy
, 2010
"... I develop a new theory of marketing costs and introduce it into a model of trade with product differentiation and firm productivity heterogeneity. In this model, a firm enters a market if it makes profits by reaching a single consumer there and pays an increasing marginal cost to access additional c ..."
Abstract
-
Cited by 95 (10 self)
- Add to MetaCart
consumers. This market penetration cost introduces an extensive margin of new consumers in firms ’ sales. I calibrate the key parameters of the model to match data on French firms from Eaton, Kortum and Kramarz, in particular the higher sales in France of firms that choose to export to more destinations
The carbon balance of tropical, temperate and boreal forests.
- Plant Cell and Environment,
, 1999
"... ABSTRACT Forest biomes are major reserves for terrestrial carbon, and major components of global primary productivity. The carbon balance of forests is determined by a number of component processes of carbon acquisition and carbon loss, and a small shift in the magnitude of these processes would ha ..."
Abstract
-
Cited by 102 (2 self)
- Add to MetaCart
have a large impact on the global carbon cycle. In this paper, we discuss the climatic influences on the carbon dynamics of boreal, temperate and tropical forests by presenting a new synthesis of micrometeorological, ecophysiological and forestry data, concentrating on three case-study sites
Gender differences in partner violence in a birth cohort of 21-year-olds: Bridging the gap between clinical and epidemiological approaches
- Journal of Consulting and Clinical Psychology
, 1997
"... This study describes partner violence in a representative sample of young adults. Physical violence perpetration was reported by 37.2 % of women and 21.8 % of men. Correlates of involvement in severe physical violence differed by gender. Severe physical violence was more strongly associated with une ..."
Abstract
-
Cited by 91 (0 self)
- Add to MetaCart
symptoms of anxiety. The findings converge with community studies showing that more women than men are physically violent oward a partner and with clinical studies highlighting violence perpetrated against women by men with deviant characteristics. We report a study of partner violence in a large
Results 1 - 10
of
3,023