• Documents
  • Authors
  • Tables

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 13,491
Next 10 →

The illusion of Control

by Ellen J. Langer - Journal of Personality and Social Psychology , 1975
"... A series of studies was conducted to elucidate a phenomenon here referred to as the "illusion of control. " An illusion of control was denned as an ex-pectancy of a personal success probability inappropriately higher than the ob-jective probability would warrant. It was predicted that fact ..."
Abstract - Cited by 607 (1 self) - Add to MetaCart
were asked their confidence at different times; finally, in Study 6 lottery participants either received a single three-digit ticket or one digit on each of 3 days. Indicators of confidence in all six studies sup-ported the prediction.

End-to-End Routing Behavior in the Internet

by Vern Paxson , 1996
"... The large-scale behavior of routing in the Internet has gone virtually without any formal study, the exception being Chinoy's analysis of the dynamics of Internet routing information [Ch93]. We report on an analysis of 40,000 end-to-end route measurements conducted using repeated “traceroutes” ..."
Abstract - Cited by 655 (13 self) - Add to MetaCart
, ” the likelihood that a route remains unchanged over a long period of time. We find that Internet paths are heavily dominated by a single prevalent route, but that the time periods over which routes persist show wide variation, ranging from seconds up to days. About 2/3's of the Internet paths had routes

The political blogosphere and the 2004 U.S. election: Divided they blog

by Lada A. Adamic, Natalie Glance , 2005
"... In this paper, we study the linking patterns and discussion topics of political bloggers. Our aim is to measure the degree of interaction between liberal and conservative blogs, and to uncover any differences in the structure of the two communities. Specifically, we analyze the posts of 40 “A-list” ..."
Abstract - Cited by 369 (11 self) - Add to MetaCart
-list” blogs over the period of two months preceding the U.S. Presidential Election of 2004, to study how often they referred to one another and to quantify the overlap in the topics they discussed, both within the liberal and conservative communities, and also across communities. We also study a single day

E.: Automatic clustering of orthologs and inparalogs from pairwise species comparisons.

by Maido Remm , Christian E V Storm , Erik L L Sonnhammer - Journal of Molecular Biology , 2001
"... Orthologs are genes in different species that originate from a single gene in the last common ancestor of these species. Such genes have often retained identical biological roles in the present-day organisms. It is hence important to identify orthologs for transferring functional information betwee ..."
Abstract - Cited by 311 (9 self) - Add to MetaCart
Orthologs are genes in different species that originate from a single gene in the last common ancestor of these species. Such genes have often retained identical biological roles in the present-day organisms. It is hence important to identify orthologs for transferring functional information

Developments in the Measurement of Subjective Well-Being

by Daniel Kahneman , Alan B Krueger - Psychological Science. , 1993
"... F or good reasons, economists have had a long-standing preference for studying peoples' revealed preferences; that is, looking at individuals' actual choices and decisions rather than their stated intentions or subjective reports of likes and dislikes. Yet people often make choices that b ..."
Abstract - Cited by 284 (7 self) - Add to MetaCart
individuals' responses to subjective well-being questions vary with their circumstances and other factors. We will argue that it is fruitful to distinguish among different conceptions of utility rather than presume to measure a single, unifying concept that motivates all human choices and registers all

Backtracking intrusions

by Samuel T. King, Peter M. Chen , 2003
"... Analyzing intrusions today is an arduous, largely manual task because system administrators lack the information and tools needed to understand easily the sequence of steps that occurred in an attack. The goal of BackTracker is to identify automatically potential sequences of steps that occurred in ..."
Abstract - Cited by 240 (11 self) - Add to MetaCart
in an intrusion. Starting with a single detection point (e.g., a suspicious file), BackTracker identifies files and processes that could have affected that detection point and displays chains of events in a dependency graph. We use BackTracker to analyze several real attacks against computers that we set up

Pennies from eBay: the Determinants of Price in Online Auctions,’ The

by David Lucking-reiley, Doug Bryan, Naghi Prasad, Daniel Reeves - Journal of Industrial Economics , 2006
"... This paper presents an exploratory analysis of the determinants of prices in online auctions for collectible United States one-cent coins at the eBay Web site. Starting with an initial data set of 20,000 auctions, we perform regression analysis on a restricted sample of 461 coins for which we obtain ..."
Abstract - Cited by 204 (1 self) - Add to MetaCart
have positive effects on the final auction price. In particular, minimum bids appear only to have a significant effect when they are binding on a single bidder, as predicted by theory. Third, when a seller chooses to have her auction last for a longer period of days, this significantly increases

Ensemble forecasting at NCEP and the breeding method

by Zoltan Toth, Eugenia Kalnay - Mon. Wea. Rev , 1997
"... The breeding method has been used to generate perturbations for ensemble forecasting at the National Centers for Environmental Prediction (formerly known as the National Meteorological Center) since December 1992. At that time a single breeding cycle with a pair of bred forecasts was implemented. In ..."
Abstract - Cited by 196 (15 self) - Add to MetaCart
The breeding method has been used to generate perturbations for ensemble forecasting at the National Centers for Environmental Prediction (formerly known as the National Meteorological Center) since December 1992. At that time a single breeding cycle with a pair of bred forecasts was implemented

Mariposa: A Wide-Area Distributed Database System

by Michael Stonebraker, Paul M. Aoki, Witold Litwin, Avi Pfeffer, Adam Sah, Jeff Sidell, Carl Staelin, Andrew Yu - VLDB Journal , 1996
"... Abstract. The requirements of wide-area distributed database systems differ dramatically from those of local-area network systems. In a wide-area network (WAN) configuration, individual sites usually report to different system administrators, have different access and charging algorithms, install si ..."
Abstract - Cited by 198 (8 self) - Add to MetaCart
in a WAN distributed DBMS. In this world, a single program performing global query optimization using a cost-based optimizer will not work well. Cost-based optimization does not respond well to sitespecific type extension, access constraints, charging algorithms, and time-of-day constraints

A forecast comparison of volatility models: Does anything beat a GARCH(1, 1)

by Peter Reinhard Hansen, Asger Lunde , 2001
"... By using intra-day returns to calculate a measure for the time-varying volatility, Andersen and Bollerslev (1998a) established that volatility models do provide good forecasts of the conditional variance. In this paper, we take the same approach and use intra-day estimated measures of volatility to ..."
Abstract - Cited by 194 (6 self) - Add to MetaCart
By using intra-day returns to calculate a measure for the time-varying volatility, Andersen and Bollerslev (1998a) established that volatility models do provide good forecasts of the conditional variance. In this paper, we take the same approach and use intra-day estimated measures of volatility
Next 10 →
Results 1 - 10 of 13,491
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University