Results 1 - 10
of
11,150
The effect of national culture on the choice of entry mode
- Journal of International Business Studies
, 1988
"... Abstract. Characteristics of national cultures have frequently been claimed to influence the selection of entry modes. This article investigates this claim by developing a theoretical argument for why culture should influence the choice of entry. Two hypotheses are derived which relate culture to en ..."
Abstract
-
Cited by 628 (0 self)
- Add to MetaCart
mode by foreign firms is described in terms of country and industry patterns. Second, the factors that influence the choice between joint ventures, wholly owned greenfield (i.e., start-up) investments, and acquisitions are analyzed statistically. In particular, the statistical investigation seeks
Coda: A Highly Available File System for a Distributed Workstation Environment
- IN IEEE TRANSACTIONS ON COMPUTERS
, 1990
"... Coda is a file system for a large-scale distributed computing environment composed of Unix workstations. It provides resiliency to server and network failures through the use of two distinct but complementary mechanisms. One mechanism, server replication,stores copies of a file at multiple servers ..."
Abstract
-
Cited by 530 (45 self)
- Add to MetaCart
servers. The other mechanism, disconnected operation, is a mode of execution in which a caching site temporarily assumes the role of a replication site. Disconnected operation is particularly useful for supporting portable workstations. The design of Coda optimizes for availability and performance
Option pricing when underlying stock returns are discontinuous
- Journal of Financial Economics
, 1976
"... The validity of the classic Black-Scholes option pricing formula dcpcnds on the capability of investors to follow a dynamic portfolio strategy in the stock that replicates the payoff structure to the option. The critical assumption required for such a strategy to be feasible, is that the underlying ..."
Abstract
-
Cited by 1001 (3 self)
- Add to MetaCart
In their classic paper on the theory of option pricing, Black and Scholcs (1973) prcscnt a mode of an:llysis that has rcvolutionizcd the theory of corporate liability pricing. In part, their approach was a breakthrough because it leads to pricing formulas using. for the most part, only obscrvablc variables
Loopy belief propagation for approximate inference: An empirical study. In:
- Proceedings of Uncertainty in AI,
, 1999
"... Abstract Recently, researchers have demonstrated that "loopy belief propagation" -the use of Pearl's polytree algorithm in a Bayesian network with loops -can perform well in the context of error-correcting codes. The most dramatic instance of this is the near Shannon-limit performanc ..."
Abstract
-
Cited by 676 (15 self)
- Add to MetaCart
toyQMR and real QMR? An obvious difference is in the parameter val ues -while the CPTs for toyQMR are random, the real QMR parameters are not. In particular, the prior probability of a disease node being on is extremely low in the real QMR (typically of the order of 10-3 ). Would low priors cause
Visual interpretation of hand gestures for human-computer interaction: A review
- IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE
, 1997
"... The use of hand gestures provides an attractive alternative to cumbersome interface devices for human-computer interaction (HCI). In particular, visual interpretation of hand gestures can help in achieving the ease and naturalness desired for HCI. This has motivated a very active research area conc ..."
Abstract
-
Cited by 489 (17 self)
- Add to MetaCart
The use of hand gestures provides an attractive alternative to cumbersome interface devices for human-computer interaction (HCI). In particular, visual interpretation of hand gestures can help in achieving the ease and naturalness desired for HCI. This has motivated a very active research area
Integration of the cognitive and the psychodynamic unconscious
- American Psychologist
, 1994
"... Cognitive-experiential self-theory integrates the cognitive and the psychodynamic unconscious by assuming the ex-istence of two parallel, interacting modes of information processing: a rational system and an emotionally driven experiential system. Support for the theory is provided by the convergenc ..."
Abstract
-
Cited by 477 (1 self)
- Add to MetaCart
Cognitive-experiential self-theory integrates the cognitive and the psychodynamic unconscious by assuming the ex-istence of two parallel, interacting modes of information processing: a rational system and an emotionally driven experiential system. Support for the theory is provided
A Secure Environment for Untrusted Helper Applications -- Confining the Wily Hacker
"... Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are usually too complex to be bug-free. This raises si ..."
Abstract
-
Cited by 462 (7 self)
- Add to MetaCart
significant security concerns. Therefore, it is desirable to create a secure environment to contain untrusted helper applications. We propose to reduce therisk of a security breachby restricting the program's access to the operating system. In particular, we intercept and filter dangerous system calls
Anti de Sitter space and holography
, 1998
"... Recently, it has been proposed by Maldacena that large N limits of certain conformal field theories in d dimensions can be described in terms of supergravity (and string theory) on the product of d+1-dimensional AdS space with a compact manifold. Here we elaborate on this idea and propose a precise ..."
Abstract
-
Cited by 383 (7 self)
- Add to MetaCart
correspondence between conformal field theory observables and those of supergravity: correlation functions in conformal field theory are given by the dependence of the supergravity action on the asymptotic behavior at infinity. In particular, dimensions of operators in conformal field theory are given by masses
Global Spontaneous Activity and Local Structured (learned) Delay Activity in Cortex
, 1996
"... to any of the stimuli learned have rates which gradually increase with the amplitude of synaptic potentiation. b. When the average LTP increases beyond a critical value, specific local attractors appear abruptly against the background of the global uniform spontaneous attractor. This happens with e ..."
Abstract
-
Cited by 306 (26 self)
- Add to MetaCart
activity distribution. The particular mode of behavior depends on the stimulus: if it is unfa
Tree-based batch mode reinforcement learning
- JOURNAL OF MACHINE LEARNING RESEARCH
, 2005
"... Reinforcement learning aims to determine an optimal control policy from interaction with a system or from observations gathered from a system. In batch mode, it can be achieved by approximating the so-called Q-function based on a set of four-tuples (xt,ut,rt,xt+1) where xt denotes the system state a ..."
Abstract
-
Cited by 224 (42 self)
- Add to MetaCart
Reinforcement learning aims to determine an optimal control policy from interaction with a system or from observations gathered from a system. In batch mode, it can be achieved by approximating the so-called Q-function based on a set of four-tuples (xt,ut,rt,xt+1) where xt denotes the system state
Results 1 - 10
of
11,150