• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,010
Next 10 →

Hierarchical Modelling and Analysis for Spatial Data. Chapman and Hall/CRC,

by S Banerjee , B P Carlin , A E Gelfand , Chapman , / Hall , New Crc , N York; Cressie , P J Diggle , P J Ribeiro Jr , B D Ripley , 2004
"... Abstract Often, there are two streams in statistical research -one developed by practitioners and other by main stream statisticians. Development of geostatistics is a very good example where pioneering work under realistic assumptions came from mining engineers whereas it is only now that statisti ..."
Abstract - Cited by 442 (45 self) - Add to MetaCart
in There is no doubt that the availability of cheap and powerful computers has increased the interest in ML applications. With spatially correlated data, the maximization of the likelihood requires considerable computer power mainly for two numerical operations: matrix inversion and maximization in multidimensional

Monetary Policy Rules Based on Real-Time Data

by Athanasios Orphanides - BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM FINANCE AND ECONOMICS DISCUSSION PAPER SERIES , 1997
"... In recent years, simple policy rules have received attention as a means to a more transparent and effective monetary policy. Often, however, the analysis is based on unrealistic assumptions about the timeliness of data availability. This permits rule specifications that are not operational and ignor ..."
Abstract - Cited by 431 (18 self) - Add to MetaCart
In recent years, simple policy rules have received attention as a means to a more transparent and effective monetary policy. Often, however, the analysis is based on unrealistic assumptions about the timeliness of data availability. This permits rule specifications that are not operational

The Determinants of Credit Spread Changes.

by Pierre Collin-Dufresne , Robert S Goldstein , J Spencer Martin , Gurdip Bakshi , Greg Bauer , Dave Brown , Francesca Carrieri , Peter Christoffersen , Susan Christoffersen , Greg Duffee , Darrell Duffie , Vihang Errunza , Gifford Fong , Mike Gallmeyer , Laurent Gauthier , Rick Green , John Griffin , Jean Helwege , Kris Jacobs , Chris Jones , Andrew Karolyi , Dilip Madan , David Mauer , Erwan Morellec , Federico Nardari , N R Prabhala , Tony Sanders , Sergei Sarkissian , Bill Schwert , Ken Singleton , Chester Spatt , René Stulz - Journal of Finance , 2001
"... ABSTRACT Using dealer's quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression are ..."
Abstract - Cited by 422 (2 self) - Add to MetaCart
are highly crosscorrelated, and principal components analysis implies they are mostly driven by a single common factor. Although we consider several macro-economic and financial variables as candidate proxies, we cannot explain this common systematic component. Our results suggest that monthly credit spread

A Blind Source Separation Technique Using Second Order Statistics

by Adel Belouchrani, Karim Abed-meraim, Jean-François Cardoso, Eric Moulines , 1997
"... Separation of sources consists in recovering a set of signals of which only instantaneous linear mixtures are observed. In many situations, no a priori information on the mixing matrix is available: the linear mixture should be `blindly' processed. This typically occurs in narrow-band array pro ..."
Abstract - Cited by 336 (9 self) - Add to MetaCart
Separation of sources consists in recovering a set of signals of which only instantaneous linear mixtures are observed. In many situations, no a priori information on the mixing matrix is available: the linear mixture should be `blindly' processed. This typically occurs in narrow-band array

Exploiting hardware performance counters with flow and context sensitive profiling

by Glenn Ammons, Thomas Ball, James R. Larus - ACM Sigplan Notices , 1997
"... A program pro le attributes run-time costs to portions of a program's execution. Most pro ling systems su er from two major de ciencies: rst, they only apportion simple metrics, such as execution frequency or elapsed time to static, syntactic units, such as procedures or statements; second, the ..."
Abstract - Cited by 254 (9 self) - Add to MetaCart
, they aggressively reduce the volume of information collected and reported, although aggregation can hide striking di erences in program behavior. This paper addresses both concerns by exploiting the hardware counters available in most modern processors and by incorporating two concepts from data ow analysis { ow

The stages of economic growth.

by W W Rostow - Economic History Review , 2nd series 12, , 1959
"... JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship. For more information about J ..."
Abstract - Cited by 297 (0 self) - Add to MetaCart
propositions about supply, demand, and the pattern of production; and before indicating the historical content of the categories I shall briefly state the underlying propositions. A Dynamic Theory of Production The classical theory of production is formulated under essentially static assumptions which freeze

Social Network Analysis for Routing in Disconnected Delay-tolerant MANETs

by Elizabeth Daly, Mads Haahr , 2007
"... Message delivery in sparse Mobile Ad hoc Networks (MANETs) is difficult due to the fact that the network graph is rarely (if ever) connected. A key challenge is to find a route that can provide good delivery performance and low end-to-end delay in a disconnected network graph where nodes may move fr ..."
Abstract - Cited by 276 (1 self) - Add to MetaCart
where nodes are not required to exchange information about the entire network topology, but only locally available information is considered. Then SimBet Routing is proposed which exploits the exchange of pre-estimated ‘betweenness’ centrality metrics and locally determined social ‘similarity

The Quadratic Eigenvalue Problem

by Françoise Tisseur, Karl Meerbergen , 2001
"... . We survey the quadratic eigenvalue problem, treating its many applications, its mathematical properties, and a variety of numerical solution techniques. Emphasis is given to exploiting both the structure of the matrices in the problem (dense, sparse, real, complex, Hermitian, skew-Hermitian) and t ..."
Abstract - Cited by 260 (21 self) - Add to MetaCart
. We survey the quadratic eigenvalue problem, treating its many applications, its mathematical properties, and a variety of numerical solution techniques. Emphasis is given to exploiting both the structure of the matrices in the problem (dense, sparse, real, complex, Hermitian, skew

A principal-components analysis of the Narcissistic Personality Inventory and further evidence of its construct validity.

by Robert Raskin , Howard Terry , Kenneth Craik , John Kamp , Jill Novacek , Dan Ozer - Journal of Personality and Social Psychology, , 1988
"... We examined the internal and external validity of the Narcissistic Personality Inventory (NPI). Study 1 explored the internal structure of the NPI responses of 1,018 subjects. Using principal-components analysis, we analyzed the tetrachoric correlations among the NPI item responses and found eviden ..."
Abstract - Cited by 209 (1 self) - Add to MetaCart
We examined the internal and external validity of the Narcissistic Personality Inventory (NPI). Study 1 explored the internal structure of the NPI responses of 1,018 subjects. Using principal-components analysis, we analyzed the tetrachoric correlations among the NPI item responses and found

Highly Accurate Data Value Prediction using Hybrid Predictors

by Kai Wang, Manoj Franklin , 1997
"... Data dependences (data flow constraints) present a major hurdle to the amount of instruction-level parallelism that can be exploited from a program. Recent work has suggested that the limits imposed by data dependences can be overcome to some extent with the use of data value prediction. That is, wh ..."
Abstract - Cited by 211 (3 self) - Add to MetaCart
Data dependences (data flow constraints) present a major hurdle to the amount of instruction-level parallelism that can be exploited from a program. Recent work has suggested that the limits imposed by data dependences can be overcome to some extent with the use of data value prediction. That is
Next 10 →
Results 1 - 10 of 4,010
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University