• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,930
Next 10 →

Labor supply response to the earned income tax credit. The Quarterly

by Nada Eissa, Jeffrey, B. Liebman - Journal of Economics , 1996
"... This paper examines the impact of the Tax Reform Act of 1986 (TRA86), which included an expansion of the earned income tax credit, on the labor force participation and hours of work of single women with children. We identify the impact of TRA86 by comparing the change in labor supply of single women ..."
Abstract - Cited by 396 (12 self) - Add to MetaCart
who were already in the labor force. Historically, the United States has chosen to provide a safety net for families with children. Since 1935, Aid to Families with Dependent Children (AFDC) has supplied cash welfare payments to needy single-parent families. Families on AFDC may also re-ceive food

Adaptive Subgradient Methods for Online Learning and Stochastic Optimization

by John Duchi, Elad Hazan, Yoram Singer , 2010
"... Stochastic subgradient methods are widely used, well analyzed, and constitute effective tools for optimization and online learning. Stochastic gradient methods ’ popularity and appeal are largely due to their simplicity, as they largely follow predetermined procedural schemes. However, most common s ..."
Abstract - Cited by 311 (3 self) - Add to MetaCart
subgradient approaches are oblivious to the characteristics of the data being observed. We present a new family of subgradient methods that dynamically incorporate knowledge of the geometry of the data observed in earlier iterations to perform more informative gradient-based learning. The adaptation

Chosen Structure Families

by Marquita Watkins
"... Do not undergo photolytic, biological, and chemical degradation. low water solubility high lipid solubility semi-volatility high molecular masses Found in pesticides Transport by air and water Found at extremely low levels in 20 % of US Food Supply Continual exposure toxicity and effects ar ..."
Abstract - Add to MetaCart
Do not undergo photolytic, biological, and chemical degradation. low water solubility high lipid solubility semi-volatility high molecular masses Found in pesticides Transport by air and water Found at extremely low levels in 20 % of US Food Supply Continual exposure toxicity and effects are unknown

Min-wise Independent Permutations

by Andrei Z. Broder, Moses Charikar, Alan M. Frieze, Michael Mitzenmacher - Journal of Computer and System Sciences , 1998
"... We define and study the notion of min-wise independent families of permutations. We say that F ⊆ Sn is min-wise independent if for any set X ⊆ [n] and any x ∈ X, when π is chosen at random in F we have Pr(min{π(X)} = π(x)) = 1 |X |. In other words we require that all the elements of any fixed set ..."
Abstract - Cited by 276 (11 self) - Add to MetaCart
We define and study the notion of min-wise independent families of permutations. We say that F ⊆ Sn is min-wise independent if for any set X ⊆ [n] and any x ∈ X, when π is chosen at random in F we have Pr(min{π(X)} = π(x)) = 1 |X |. In other words we require that all the elements of any fixed set

The LOCO-I Lossless Image Compression Algorithm: Principles and Standardization into JPEG-LS

by Marcelo J. Weinberger, Gadiel Seroussi, Guillermo Sapiro - IEEE TRANSACTIONS ON IMAGE PROCESSING , 2000
"... LOCO-I (LOw COmplexity LOssless COmpression for Images) is the algorithm at the core of the new ISO/ITU standard for lossless and near-lossless compression of continuous-tone images, JPEG-LS. It is conceived as a "low complexity projection" of the universal context modeling paradigm, match ..."
Abstract - Cited by 253 (11 self) - Add to MetaCart
for capturing high-order dependencies. The model is tuned for efficient performance in conjunction with an extended family of Golomb-type codes, which are adaptively chosen, and an embedded alphabet extension for coding of low-entropy image regions. LOCO-I attains compression ratios similar or superior to those

Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks

by Pierre-Alain Fouque, David Pointcheval - IN PROC. OF ASIACRYPT , 2000
"... Semantic security against chosen-ciphertext attacks (IND-CCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is often dangerous to give to only one people the power of decryption. Therefore, threshold cryptosystems aimed at distributing the ..."
Abstract - Cited by 40 (3 self) - Add to MetaCart
Semantic security against chosen-ciphertext attacks (IND-CCA) is widely believed as the correct security level for public-key encryption scheme. On the other hand, it is often dangerous to give to only one people the power of decryption. Therefore, threshold cryptosystems aimed at distributing

Hidden Field Equations (HFE) and Isomorphisms of Polynomials (IP): two new Families of Asymmetric Algorithms

by Jacques Patarin , 1996
"... In [11] T. Matsumoto and H. Imai described a new asymmetric algorithm based on multivariate polynomials of degree twoo ver a finite field. Then in [14] this algorithm was broken. The aim of this paper is to show that despite this result it is probably possible to use multivariate polynomials of degr ..."
Abstract - Cited by 150 (9 self) - Add to MetaCart
of degree two in carefully designed algorithms for asymmetric cryptography. In this paper we will give some examples of suchschemes. All the examples that we will give, belong to two large family of schemes: HFE and IP. With HFE we will be able to do encryption, signatures or authentication in an asymmetric

On ellipsoidal techniques for reachability analysis. Part II. Internal Approximations Box-valued constraints

by A. B. Kurzhanski , P. Varaiya , 2001
"... Following Part I, this article continues to describe the calculation of the reach sets and tubes for linear control systems with time-varying coefficients and ellipsoidal hard bounds on the controls and initial states. It deals with parametrized families of internal ellipsoidal approximations constr ..."
Abstract - Cited by 168 (8 self) - Add to MetaCart
Following Part I, this article continues to describe the calculation of the reach sets and tubes for linear control systems with time-varying coefficients and ellipsoidal hard bounds on the controls and initial states. It deals with parametrized families of internal ellipsoidal approximations

On the Definitions of Cryptographic Security: Chosen-Ciphertext Attack Revisited

by unknown authors , 1999
"... ..."
Abstract - Add to MetaCart
Abstract not found

Regression Methods for Pricing Complex American-Style Options

by John N. Tsitsiklis, Benjamin Van Roy - IEEE Transactions on Neural Networks , 2000
"... We introduce and analyze a simulation-based, approximate dynamic programming method for pricing complex American-style options, with a possibly high-dimensional underlying state space. We work within a finitely parameterized family of approximate value functions, and introduce a variant of value ite ..."
Abstract - Cited by 157 (3 self) - Add to MetaCart
We introduce and analyze a simulation-based, approximate dynamic programming method for pricing complex American-style options, with a possibly high-dimensional underlying state space. We work within a finitely parameterized family of approximate value functions, and introduce a variant of value
Next 10 →
Results 1 - 10 of 1,930
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University