• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,555
Next 10 →

Liberal-conservative differences in inclusion-exclusion strategy choice

by John D. Jasper, Daniel Ansted
"... Inclusion and exclusion strategies for allocation of scarce goods involve different processes. The conditions under which one strategy is chosen in favor of the other, however, have not been fully explicated. In the present study, decision makers chose a single strategy after reading through descrip ..."
Abstract - Add to MetaCart
Inclusion and exclusion strategies for allocation of scarce goods involve different processes. The conditions under which one strategy is chosen in favor of the other, however, have not been fully explicated. In the present study, decision makers chose a single strategy after reading through

Exclusive strategy for generalization algorithms in micro-data disclosure

by Lei Zhang, Lingyu Wang, Sushil Jajodia, Er Brodsky - In Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security , 2008
"... Abstract. When generalization algorithms are known to the public, an adver-sary can obtain a more precise estimation of the secret table than what can be deduced from the disclosed generalization result. Therefore, whether a general-ization algorithm can satisfy a privacy property should be judged b ..."
Abstract - Cited by 3 (3 self) - Add to MetaCart
suggest an alternative exclusive strategy, which adopts a seemingly drastic approach to eliminate the need for recursion. Surprisingly, the data utility of the two strategies are actually not com-parable and the exclusive strategy can provide better data utility in certain cases. 1

The Implementation of the Cilk-5 Multithreaded Language

by Matteo Frigo, Charles E. Leiserson, Keith H. Randall , 1998
"... The fifth release of the multithreaded language Cilk uses a provably good "work-stealing " scheduling algorithm similar to the rst system, but the language has been completely redesigned and the runtime system completely reengineered. The efficiency of the new implementation was aided ..."
Abstract - Cited by 489 (28 self) - Add to MetaCart
compared to equivalent C programs. This paper describes how the work-first principle was exploited in the design of Cilk-5's compiler and its runtime system. In particular, we present Cilk-5's novel "two-clone" compilation strategy and its Dijkstra-like mutual-exclusion protocol

Luxury Brand Exclusivity Strategies – An Illustration of a Cultural Collaboration

by Anita Radón Phd
"... This paper examines how luxury fashion brands renew themselves in order to balance the exclusivity that is associated with luxury goods and with profit maximization. Using consumers ’ demand theory it is shown how luxury fashion brands go through different phases to renew the perception of exclusivi ..."
Abstract - Add to MetaCart
This paper examines how luxury fashion brands renew themselves in order to balance the exclusivity that is associated with luxury goods and with profit maximization. Using consumers ’ demand theory it is shown how luxury fashion brands go through different phases to renew the perception

Accounting for Exogenous Information on Decision Maker Processing Strategies in Models of Discrete Choice: Attribute Exclusion Strategies in Airline Choice By

by John M Rose, David A Hensher, William H Greene , 2005
"... ABSTRACT: In this paper, we examine the impact of individual specific information processing strategies (IPS) on the inclusion/exclusion of attributes on the parameter estimates and behavioural outputs of models of discrete choice. Current modelling practice assumes that whilst respondents may exhib ..."
Abstract - Add to MetaCart
ABSTRACT: In this paper, we examine the impact of individual specific information processing strategies (IPS) on the inclusion/exclusion of attributes on the parameter estimates and behavioural outputs of models of discrete choice. Current modelling practice assumes that whilst respondents may

How to assign votes in a distributed system

by Hector Garcia-molina, Daniel Barbara - Journal of the ACM , 1985
"... Abstract. In a distributed system, one strategy for achieving mutual exclusion of groups of nodes without communication is to assign to each node a number of votes. Only a group with a majority of votes can execute the critical operations, and mutual exclusion is achieved because at any given time t ..."
Abstract - Cited by 204 (3 self) - Add to MetaCart
Abstract. In a distributed system, one strategy for achieving mutual exclusion of groups of nodes without communication is to assign to each node a number of votes. Only a group with a majority of votes can execute the critical operations, and mutual exclusion is achieved because at any given time

The resource-based view of the firm in two environments: The Hollywood film studios from 1936 to 1965

by Danny Miller, Ecole Hautes, Etudes Commerciales, Jamal Shamsie - Academy of Management Journal , 1996
"... This article continues to operationally define and test the resource-hased view of the firm in a study of the major U.S. film studios from 1936 to 1965. We found that property-hased resources in the form of exclusive long-term contracts with stars and theaters helped financial performance in the sta ..."
Abstract - Cited by 212 (0 self) - Add to MetaCart
This article continues to operationally define and test the resource-hased view of the firm in a study of the major U.S. film studios from 1936 to 1965. We found that property-hased resources in the form of exclusive long-term contracts with stars and theaters helped financial performance

The Seeds of Exclusion The Seeds of Exclusion

by Claire Luscombe, The Salvation Army, Commissioner John Matear
"... The effects of social exclusion are often all too easy to see: family breakdown, poverty, poor health, addictive behaviour and homelessness. The purpose of The Seeds of Exclusion, the fourth in a series of reports published by The Salvation Army since 1999, is to identify how patterns of early-life ..."
Abstract - Add to MetaCart
The effects of social exclusion are often all too easy to see: family breakdown, poverty, poor health, addictive behaviour and homelessness. The purpose of The Seeds of Exclusion, the fourth in a series of reports published by The Salvation Army since 1999, is to identify how patterns of early

Semantics of transactional memory and automatic mutual exclusion

by Martín Abadi, Andrew Birrell, Tim Harris, Michael Isard - In Proceedings of the 35th ACM SIGPLANSIGACT Symposium on Principles of Programming Languages (POPL , 2008
"... Software Transactional Memory (STM) is an attractive basis for the development of language features for concurrent programming. However, the semantics of these features can be delicate and problematic. In this paper we explore the tradeoffs between semantic simplicity, the viability of efficient imp ..."
Abstract - Cited by 88 (6 self) - Add to MetaCart
implementation strategies, and the flexibility of language constructs. Specifically, we develop semantics and type systems for the constructs of the Automatic Mutual Exclusion (AME) programming model; our results apply also to other constructs, such as atomic blocks. With this semantics as a point of reference

MAKE AND BUY IN INNOVATION STRATEGIES: EVIDENCE FROM BELGIAN MANUFACTURING FIRMS

by Bruno Cassiman, et al. , 1998
"... This paper characterizes the innovation strategy of manufacturing firms and examines the relation between the innovation strategy and industry-, firm- and innovation-specific characteristics using Belgian company data from the Eurostat Community Innovation Survey. In addition to important size effe ..."
Abstract - Cited by 138 (5 self) - Add to MetaCart
itself (Make) or to source technology externally (Buy), we find that small firms are more likely to restrict their innovation strategy to an exclusive make or buy strategy, while large firms are more likely to combine both internal and external knowledge acquisition in their innovation strategy. After
Next 10 →
Results 1 - 10 of 2,555
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University