• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 21 - 30 of 35,562
Next 10 →

Table 1: Preferred Model for Six SITEs by Risk Return

in Modelling the Volatility in Country Risk for Small Island
by Tourism Economies Suhejla, Suhejla Hoti, Michael Mcaleer, Riaz Shareef

Table A.3: Choices in the Risk Preference Experiment safe payment lottery

in Are Risk Aversion and Impatience Related to Cognitive Ability?
by Thomas Dohmen, Armin Falk, David Huffman, Uwe Sunde

Table 2. Coefficients for the stroke risk score Risk factor Men Women

in Coronary-Event Registration and Coronary Care #20 Registration of Coronary Events, Hot and Cold Pursuit The ideal
by unknown authors
"... In PAGE 29: ...Risk score for stroke events The risk score for stroke events was derived from Finnish follow-up data (3): a71 baseline risk-factor levels from Finnish risk-factor surveys conducted in 1982 and 1987 a71 14902 (7195 men and 7705 women) at the baseline a71 553 (299 men and 234 women) fatal and non-fatal stroke events during follow-up. The coefficients for the stroke risk score are given in Table2 (3). Regression dilution For risk factors, which have large within-person variation compared with the between-person variation, the regression coefficients underestimate their true effect (4).... ..."

Table 3: The risk factors used in the Framingham risk equations.

in unknown title
by unknown authors
"... In PAGE 7: ...ttp://www.biomedcentral.com/1472-6947/4/6 time horizon of the age of 85 years taking account of the risk factors in Table 3. Validation All cases within the Whickham data set were identified between the ages of 35 and 65 and the risk factors described in Table3 were extracted. Absence of left ven- tricular hypertrophy (LVH) and an average high density lipoprotein (HDL) of 1.... In PAGE 8: ... The correlation between the model apos;s estimated survival and actual survival are shown in Table 6. Graphs showing the plots of the model apos;s estimates of survival probability and the average survival in the Whick- ham cohort for each of the groups analysed in Table3 are shown in the Figures 4, 5, 6, 7, 8 and 9. There is a high level of agreement between the predictions of the model and the actual survival in the Whickham cohort.... ..."

Table I. Correlations between risk factor ratings and risk likelihood ratings

in HEALTH EDUCATION RESEARCH Theory & Practice
by Short Communication, Neil D. Weinstein, Michael A. Diefenbach

Table 2. Risk factors for which the RiskMetrics mapping is discontinuous.

in COMPARISONS OF CASHFLOW MAPS FOR VALUE-AT-RISK
by Marc Henrard

Table 1. Efficient Extreme Points

in Preference-Driven Hierarchical Hardware/Software Partitioning
by Gang Quan, Xiaobo (Sharon) Hu, Garrison Greenwood 1999
"... In PAGE 5: ... In [10], the relation be- tween the number of extreme points, dimension and number of constraints was studied. Table1 was copied from [10] to illustrate the relationship between constraints and dimension. Consider the case of a design alternative with 10 attributes and 20 preference con- straints.... In PAGE 5: ... Consider the case of a design alternative with 10 attributes and 20 preference con- straints. Referring to Table1 , we have at most 28 extreme points. Let D8 CT be the amount of time needed to calculate the extreme points with ADBASE, and D8 BC be the time to com- pute the fitness value at each extreme point (which is the amount of time for performing 10 multiplications and 9 ad- ditions), and D8 BD be the amount of time for comparing two fitness values.... ..."
Cited by 7

Table 3: Correspondence between certainty equivalents and lottery decisions for extreme cases

in Hindsight Bias and Individual Risk Attitude within the Context of Experimental Asset Markets
by Tarek El-Sehity, Hans Haumer, Christian Helmenstein, Erich Kirchler, Boris Maciejovsky, Jel-classification C

Table 3 Statistical Analysis for Each Risk Factor

in unknown title
by unknown authors
"... In PAGE 7: ... This study has unveiled the main risk factors to IS/IT outsourcing in the private sector of Kuwait. Table3 shows the mean, standard deviation, median, minimum and maximum for each risk factor. Table 4 shows the ranking of each risk factor.... ..."

Table 2 Risk factors identified by literature review

in Abstract A model for inbound supply risk analysis
by Teresa Wu A, Jennifer Blackhurst B 2006
"... In PAGE 3: ....1. Risk classification In this paper, a wide range of inbound supply risk characteristics have been compiled from reviewing the literature and conducting industry interviews with supply chain and purchasing executives to create a new hierarchical supply risk classification system. Table2 lists examples of the risk factors identified from the literature review. Based upon a literature review and industry interviews a hierarchical inbound risk classification system is created based upon internal and external types of risk.... ..."
Next 10 →
Results 21 - 30 of 35,562
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2016 The Pennsylvania State University