• Documents
  • Authors
  • Tables

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,023
Next 10 →

The influence of functional diversity and composition on ecosystem processes

by David Tilman, Johannes Knops, David Wedin, Peter Reich, Mark Ritchie, Evan Siemann - Science , 1997
"... Humans are modifying both the identities and numbers of species in ecosystems, but the impacts of such changes on ecosystem processes are controversial. Plant species diversity, functional diversity, and functional composition were experimentally varied in grassland plots. Each factor by itself had ..."
Abstract - Cited by 231 (13 self) - Add to MetaCart
significant effects on many ecosystem pro-cesses, but functional composition and functional diversity were the principal factors explaining plant productivity, plant percent nitrogen, plant total nitrogen, and light pen-etration. Thus, habitat modifications and management practices that change functional

Scalable, Graph-based Network Vulnerability Analysis,”

by Paul Ammann , Duminda Wijesekera , Saket Kaushik - Proceedings of the 9th ACM Conference on Computer and Communications Security, , 2002
"... ABSTRACT Even well administered networks are vulnerable to attack. Recent work in network security has focused on the fact that combinations of exploits are the typical means by which an attacker breaks into a network. Researchers have proposed a variety of graph-based algorithms to generate attack ..."
Abstract - Cited by 152 (0 self) - Add to MetaCart
attack trees (or graphs). Either structure represents all possible sequences of exploits, where any given exploit can take advantage of the penetration achieved by prior exploits in its chain, and the final exploit in the chain achieves the attacker's goal. The most recent approach in this line

Large Wind Penetration

by Juan Ma , 2012
"... 2 TABLE OF CONTENTS ..."
Abstract - Add to MetaCart
2 TABLE OF CONTENTS

Trade Policy, Trade Volumes and Plant-Level Productivity in Colombian Manufacturing Industries

by Ana M. Fernandes, David Mackenzie, Marc Melitz, Peter Schott, Christopher Timmins , 2003
"... This paper explores Colombian trade policy during 1977-1991, a period of substantial variation in protection across industries, to examine whether increased exposure to foreign competition generates plant-level productivity gains. Using a large panel of manufacturing plants, we find a strong positiv ..."
Abstract - Cited by 130 (0 self) - Add to MetaCart
This paper explores Colombian trade policy during 1977-1991, a period of substantial variation in protection across industries, to examine whether increased exposure to foreign competition generates plant-level productivity gains. Using a large panel of manufacturing plants, we find a strong

On the Efficiency of Estimating Penetrating Rank on Large Graphs

by Weiren Yu , Jiajin Le , Xuemin Lin , Wenjie Zhang
"... Abstract. P-Rank (Penetrating Rank) has been suggested as a useful measure of structural similarity that takes account of both incoming and outgoing edges in ubiquitous networks. Existing work often utilizes memoization to compute PRank similarity in an iterative fashion, which requires cubic time ..."
Abstract - Cited by 1 (1 self) - Add to MetaCart
Abstract. P-Rank (Penetrating Rank) has been suggested as a useful measure of structural similarity that takes account of both incoming and outgoing edges in ubiquitous networks. Existing work often utilizes memoization to compute PRank similarity in an iterative fashion, which requires cubic time

Authentic Third-party Data Publication

by Premkumar T. Devanbu, Michael Gertz, Chip Martel, Stuart G. Stubblebine - CONFERENCE ON DATABASE SECURITY: DATA AND APPLICATION SECURITY, DEVELOPMENT AND DIRECTIONS , 2000
"... Integrity critical databases, such as financial information, which are used in high-value decisions, are frequently published over the internet. Publishers of such data must satisfy the integrity, authenticity, and non-repudiation requirements of end clients. Providing this protection over public da ..."
Abstract - Cited by 94 (9 self) - Add to MetaCart
data networks is an expensive proposition. This is, in part, due to the difficulty of building and running secure systems. In practice, large systems can not be verified to be secure and are frequently penetrated. The negative consequences of a system intrusion at the publisher can be severe

Optimization of Pumped Storage Capacity in an Isolated Power System with Large Renewable Penetration,” in

by Paul D. Brown, J. A. Peças Lopes, Senior Member, Manuel A. Matos - IEEE Transactions on Power Systems , 2008
"... Abstract—This work describes an economic analysis of the inclusion of pumped storage in a small island system that has abundant renewable energy available but that at times cannot accept all of this power because of limits imposed by security criteria. The question of whether or how much pumped stor ..."
Abstract - Cited by 16 (0 self) - Add to MetaCart
, and optimal operating strategies for the scenarios are produced. Results showed that including pumped storage can be an effective means of allowing larger penetration of intermittent renewable energy sources, improving both the dynamic security and the economic operation of a test system. Including the dy

Market penetration costs and the new consumers margin in international trade

by Costas Arkolakis - Journal of Political Economy , 2010
"... I develop a new theory of marketing costs and introduce it into a model of trade with product differentiation and firm productivity heterogeneity. In this model, a firm enters a market if it makes profits by reaching a single consumer there and pays an increasing marginal cost to access additional c ..."
Abstract - Cited by 95 (10 self) - Add to MetaCart
consumers. This market penetration cost introduces an extensive margin of new consumers in firms ’ sales. I calibrate the key parameters of the model to match data on French firms from Eaton, Kortum and Kramarz, in particular the higher sales in France of firms that choose to export to more destinations

The carbon balance of tropical, temperate and boreal forests.

by Y Malhi , D D Baldocchi , P G Jarvis , Rd6 - Plant Cell and Environment, , 1999
"... ABSTRACT Forest biomes are major reserves for terrestrial carbon, and major components of global primary productivity. The carbon balance of forests is determined by a number of component processes of carbon acquisition and carbon loss, and a small shift in the magnitude of these processes would ha ..."
Abstract - Cited by 102 (2 self) - Add to MetaCart
have a large impact on the global carbon cycle. In this paper, we discuss the climatic influences on the carbon dynamics of boreal, temperate and tropical forests by presenting a new synthesis of micrometeorological, ecophysiological and forestry data, concentrating on three case-study sites

Gender differences in partner violence in a birth cohort of 21-year-olds: Bridging the gap between clinical and epidemiological approaches

by Lynn Magdol, Terrie E. Moffitt, Avshalom Caspi, Denise L. Newman, Jeffrey Fagan, Phil A. Silva, Lynn Magdol, Terrie E. Moffitt, Avshalom Caspi, Denise L. New - Journal of Consulting and Clinical Psychology , 1997
"... This study describes partner violence in a representative sample of young adults. Physical violence perpetration was reported by 37.2 % of women and 21.8 % of men. Correlates of involvement in severe physical violence differed by gender. Severe physical violence was more strongly associated with une ..."
Abstract - Cited by 91 (0 self) - Add to MetaCart
symptoms of anxiety. The findings converge with community studies showing that more women than men are physically violent oward a partner and with clinical studies highlighting violence perpetrated against women by men with deviant characteristics. We report a study of partner violence in a large
Next 10 →
Results 1 - 10 of 3,023
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University