Results 1 - 10
of
1,930
Labor supply response to the earned income tax credit. The Quarterly
- Journal of Economics
, 1996
"... This paper examines the impact of the Tax Reform Act of 1986 (TRA86), which included an expansion of the earned income tax credit, on the labor force participation and hours of work of single women with children. We identify the impact of TRA86 by comparing the change in labor supply of single women ..."
Abstract
-
Cited by 396 (12 self)
- Add to MetaCart
who were already in the labor force. Historically, the United States has chosen to provide a safety net for families with children. Since 1935, Aid to Families with Dependent Children (AFDC) has supplied cash welfare payments to needy single-parent families. Families on AFDC may also re-ceive food
Adaptive Subgradient Methods for Online Learning and Stochastic Optimization
, 2010
"... Stochastic subgradient methods are widely used, well analyzed, and constitute effective tools for optimization and online learning. Stochastic gradient methods ’ popularity and appeal are largely due to their simplicity, as they largely follow predetermined procedural schemes. However, most common s ..."
Abstract
-
Cited by 311 (3 self)
- Add to MetaCart
subgradient approaches are oblivious to the characteristics of the data being observed. We present a new family of subgradient methods that dynamically incorporate knowledge of the geometry of the data observed in earlier iterations to perform more informative gradient-based learning. The adaptation
Chosen Structure Families
"... Do not undergo photolytic, biological, and chemical degradation. low water solubility high lipid solubility semi-volatility high molecular masses Found in pesticides Transport by air and water Found at extremely low levels in 20 % of US Food Supply Continual exposure toxicity and effects ar ..."
Abstract
- Add to MetaCart
Do not undergo photolytic, biological, and chemical degradation. low water solubility high lipid solubility semi-volatility high molecular masses Found in pesticides Transport by air and water Found at extremely low levels in 20 % of US Food Supply Continual exposure toxicity and effects are unknown
Min-wise Independent Permutations
- Journal of Computer and System Sciences
, 1998
"... We define and study the notion of min-wise independent families of permutations. We say that F ⊆ Sn is min-wise independent if for any set X ⊆ [n] and any x ∈ X, when π is chosen at random in F we have Pr(min{π(X)} = π(x)) = 1 |X |. In other words we require that all the elements of any fixed set ..."
Abstract
-
Cited by 276 (11 self)
- Add to MetaCart
We define and study the notion of min-wise independent families of permutations. We say that F ⊆ Sn is min-wise independent if for any set X ⊆ [n] and any x ∈ X, when π is chosen at random in F we have Pr(min{π(X)} = π(x)) = 1 |X |. In other words we require that all the elements of any fixed set
The LOCO-I Lossless Image Compression Algorithm: Principles and Standardization into JPEG-LS
- IEEE TRANSACTIONS ON IMAGE PROCESSING
, 2000
"... LOCO-I (LOw COmplexity LOssless COmpression for Images) is the algorithm at the core of the new ISO/ITU standard for lossless and near-lossless compression of continuous-tone images, JPEG-LS. It is conceived as a "low complexity projection" of the universal context modeling paradigm, match ..."
Abstract
-
Cited by 253 (11 self)
- Add to MetaCart
for capturing high-order dependencies. The model is tuned for efficient performance in conjunction with an extended family of Golomb-type codes, which are adaptively chosen, and an embedded alphabet extension for coding of low-entropy image regions. LOCO-I attains compression ratios similar or superior to those
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
- IN PROC. OF ASIACRYPT
, 2000
"... Semantic security against chosen-ciphertext attacks (IND-CCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is often dangerous to give to only one people the power of decryption. Therefore, threshold cryptosystems aimed at distributing the ..."
Abstract
-
Cited by 40 (3 self)
- Add to MetaCart
Semantic security against chosen-ciphertext attacks (IND-CCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is often dangerous to give to only one people the power of decryption. Therefore, threshold cryptosystems aimed at distributing
Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two new Families of Asymmetric Algorithms
, 1996
"... In [11] T. Matsumoto and H. Imai described a new asymmetric algorithm based on multivariate polynomials of degree twoo ver a finite field. Then in [14] this algorithm was broken. The aim of this paper is to show that despite this result it is probably possible to use multivariate polynomials of degr ..."
Abstract
-
Cited by 150 (9 self)
- Add to MetaCart
of degree two in carefully designed algorithms for asymmetric cryptography. In this paper we will give some examples of suchschemes. All the examples that we will give, belong to two large family of schemes: HFE and IP. With HFE we will be able to do encryption, signatures or authentication in an asymmetric
On ellipsoidal techniques for reachability analysis. Part II. Internal Approximations Box-valued constraints
, 2001
"... Following Part I, this article continues to describe the calculation of the reach sets and tubes for linear control systems with time-varying coefficients and ellipsoidal hard bounds on the controls and initial states. It deals with parametrized families of internal ellipsoidal approximations constr ..."
Abstract
-
Cited by 168 (8 self)
- Add to MetaCart
Following Part I, this article continues to describe the calculation of the reach sets and tubes for linear control systems with time-varying coefficients and ellipsoidal hard bounds on the controls and initial states. It deals with parametrized families of internal ellipsoidal approximations
Regression Methods for Pricing Complex American-Style Options
- IEEE Transactions on Neural Networks
, 2000
"... We introduce and analyze a simulation-based, approximate dynamic programming method for pricing complex American-style options, with a possibly high-dimensional underlying state space. We work within a finitely parameterized family of approximate value functions, and introduce a variant of value ite ..."
Abstract
-
Cited by 157 (3 self)
- Add to MetaCart
We introduce and analyze a simulation-based, approximate dynamic programming method for pricing complex American-style options, with a possibly high-dimensional underlying state space. We work within a finitely parameterized family of approximate value functions, and introduce a variant of value
Results 1 - 10
of
1,930