Results 1 - 10
of
60,805
Illiquidity and stock returns: cross-section and time-series effects,
- Journal of Financial Markets
, 2002
"... Abstract This paper shows that over time, expected market illiquidity positively affects ex ante stock excess return, suggesting that expected stock excess return partly represents an illiquidity premium. This complements the cross-sectional positive return-illiquidity relationship. Also, stock ret ..."
Abstract
-
Cited by 864 (9 self)
- Add to MetaCart
Abstract This paper shows that over time, expected market illiquidity positively affects ex ante stock excess return, suggesting that expected stock excess return partly represents an illiquidity premium. This complements the cross-sectional positive return-illiquidity relationship. Also, stock
New directions in cryptography.
- IEEE Trans. Inf. Theory,
, 1976
"... Abstract Two kinds of contemporary developments in cryp-communications over an insecure channel order to use cryptogtography are examined. Widening applications of teleprocess-raphy to insure privacy, however, it currently necessary for the ing have given rise to a need for new types of cryptograph ..."
Abstract
-
Cited by 3542 (7 self)
- Add to MetaCart
Abstract Two kinds of contemporary developments in cryp-communications over an insecure channel order to use cryptogtography are examined. Widening applications of teleprocess-raphy to insure privacy, however, it currently necessary for the ing have given rise to a need for new types
An integrative theory of prefrontal cortex function.
- Annual Review of Neuroscience,
, 2001
"... Abstract The prefrontal cortex has long been suspected to play an important role in cognitive control, in the ability to orchestrate thought and action in accordance with internal goals. Its neural basis, however, has remained a mystery. Here, we propose that cognitive control stems from the active ..."
Abstract
-
Cited by 1093 (20 self)
- Add to MetaCart
Abstract The prefrontal cortex has long been suspected to play an important role in cognitive control, in the ability to orchestrate thought and action in accordance with internal goals. Its neural basis, however, has remained a mystery. Here, we propose that cognitive control stems from
Least squares quantization in pcm.
- Bell Telephone Laboratories Paper
, 1982
"... Abstract-It has long been realized that in pulse-code modulation (PCM), with a given ensemble of signals to handle, the quantum values should be spaced more closely in the voltage regions where the signal amplitude is more likely to fall. It has been shown by Panter and Dite that, in the limit as t ..."
Abstract
-
Cited by 1362 (0 self)
- Add to MetaCart
Abstract-It has long been realized that in pulse-code modulation (PCM), with a given ensemble of signals to handle, the quantum values should be spaced more closely in the voltage regions where the signal amplitude is more likely to fall. It has been shown by Panter and Dite that, in the limit
Estimating Wealth Effects without Expenditure Data— or Tears
- Policy Research Working Paper 1980, The World
, 1998
"... Abstract: We use the National Family Health Survey (NFHS) data collected in Indian states in 1992 and 1993 to estimate the relationship between household wealth and the probability a child (aged 6 to 14) is enrolled in school. A methodological difficulty to overcome is that the NFHS, modeled closely ..."
Abstract
-
Cited by 871 (16 self)
- Add to MetaCart
Abstract: We use the National Family Health Survey (NFHS) data collected in Indian states in 1992 and 1993 to estimate the relationship between household wealth and the probability a child (aged 6 to 14) is enrolled in school. A methodological difficulty to overcome is that the NFHS, modeled
Web Document Clustering: A Feasibility Demonstration
, 1998
"... Abstract Users of Web search engines are often forced to sift through the long ordered list of document “snippets” returned by the engines. The IR community has explored document clustering as an alternative method of organizing retrieval results, but clustering has yet to be deployed on the major s ..."
Abstract
-
Cited by 435 (3 self)
- Add to MetaCart
Abstract Users of Web search engines are often forced to sift through the long ordered list of document “snippets” returned by the engines. The IR community has explored document clustering as an alternative method of organizing retrieval results, but clustering has yet to be deployed on the major
Policy gradient methods for reinforcement learning with function approximation.
- In NIPS,
, 1999
"... Abstract Function approximation is essential to reinforcement learning, but the standard approach of approximating a value function and determining a policy from it has so far proven theoretically intractable. In this paper we explore an alternative approach in which the policy is explicitly repres ..."
Abstract
-
Cited by 439 (20 self)
- Add to MetaCart
Abstract Function approximation is essential to reinforcement learning, but the standard approach of approximating a value function and determining a policy from it has so far proven theoretically intractable. In this paper we explore an alternative approach in which the policy is explicitly
It’s Not Factor Accumulation: Stylized Facts and Growth Models,” World Bank.
, 2001
"... Abstract: We document five stylized facts of economic growth. (1) The "residual" rather than factor accumulation accounts for most of the income and growth differences across nations. (2) Income diverges over the long run. (3) Factor accumulation is persistent while growth is not persiste ..."
Abstract
-
Cited by 427 (14 self)
- Add to MetaCart
Abstract: We document five stylized facts of economic growth. (1) The "residual" rather than factor accumulation accounts for most of the income and growth differences across nations. (2) Income diverges over the long run. (3) Factor accumulation is persistent while growth
Performance Anomaly of 802.11b
- In IEEE INFOCOM
, 2003
"... Abstract — We analyze the performance of the IEEE 802.11b wireless local area networks. We have observed that when some mobile hosts use a lower bit rate than the others, the performance of all hosts is considerably degraded. Such a situation is a common case in wireless local area networks in which ..."
Abstract
-
Cited by 431 (11 self)
- Add to MetaCart
Abstract — We analyze the performance of the IEEE 802.11b wireless local area networks. We have observed that when some mobile hosts use a lower bit rate than the others, the performance of all hosts is considerably degraded. Such a situation is a common case in wireless local area networks
Learning from demonstration”.
- Advances in Neural Information Processing Systems 9.
, 1997
"... Abstract By now it is widely accepted that learning a task from scratch, i.e., without any prior knowledge, is a daunting undertaking. Humans, however, rarely attempt to learn from scratch. They extract initial biases as well as strategies how to approach a learning problem from instructions and/or ..."
Abstract
-
Cited by 399 (32 self)
- Add to MetaCart
Abstract By now it is widely accepted that learning a task from scratch, i.e., without any prior knowledge, is a daunting undertaking. Humans, however, rarely attempt to learn from scratch. They extract initial biases as well as strategies how to approach a learning problem from instructions and
Results 1 - 10
of
60,805