• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 11,150
Next 10 →

The effect of national culture on the choice of entry mode

by Bruce Kogut, Harbir Singh - Journal of International Business Studies , 1988
"... Abstract. Characteristics of national cultures have frequently been claimed to influence the selection of entry modes. This article investigates this claim by developing a theoretical argument for why culture should influence the choice of entry. Two hypotheses are derived which relate culture to en ..."
Abstract - Cited by 628 (0 self) - Add to MetaCart
mode by foreign firms is described in terms of country and industry patterns. Second, the factors that influence the choice between joint ventures, wholly owned greenfield (i.e., start-up) investments, and acquisitions are analyzed statistically. In particular, the statistical investigation seeks

Coda: A Highly Available File System for a Distributed Workstation Environment

by Mahadev Satyanarayanan, James J. Kistler, Puneet Kumar, Maria E. Okasaki, Ellen H. Siegel, David C. Steere - IN IEEE TRANSACTIONS ON COMPUTERS , 1990
"... Coda is a file system for a large-scale distributed computing environment composed of Unix workstations. It provides resiliency to server and network failures through the use of two distinct but complementary mechanisms. One mechanism, server replication,stores copies of a file at multiple servers ..."
Abstract - Cited by 530 (45 self) - Add to MetaCart
servers. The other mechanism, disconnected operation, is a mode of execution in which a caching site temporarily assumes the role of a replication site. Disconnected operation is particularly useful for supporting portable workstations. The design of Coda optimizes for availability and performance

Option pricing when underlying stock returns are discontinuous

by Robert C. Merton - Journal of Financial Economics , 1976
"... The validity of the classic Black-Scholes option pricing formula dcpcnds on the capability of investors to follow a dynamic portfolio strategy in the stock that replicates the payoff structure to the option. The critical assumption required for such a strategy to be feasible, is that the underlying ..."
Abstract - Cited by 1001 (3 self) - Add to MetaCart
In their classic paper on the theory of option pricing, Black and Scholcs (1973) prcscnt a mode of an:llysis that has rcvolutionizcd the theory of corporate liability pricing. In part, their approach was a breakthrough because it leads to pricing formulas using. for the most part, only obscrvablc variables

Loopy belief propagation for approximate inference: An empirical study. In:

by Kevin P Murphy , Yair Weiss , Michael I Jordan - Proceedings of Uncertainty in AI, , 1999
"... Abstract Recently, researchers have demonstrated that "loopy belief propagation" -the use of Pearl's polytree algorithm in a Bayesian network with loops -can perform well in the context of error-correcting codes. The most dramatic instance of this is the near Shannon-limit performanc ..."
Abstract - Cited by 676 (15 self) - Add to MetaCart
toyQMR and real QMR? An obvious difference is in the parameter val ues -while the CPTs for toyQMR are random, the real QMR parameters are not. In particular, the prior probability of a disease node being on is extremely low in the real QMR (typically of the order of 10-3 ). Would low priors cause

Visual interpretation of hand gestures for human-computer interaction: A review

by Vladimir I. Pavlovic, Rajeev Sharma, Thomas S. Huang - IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE , 1997
"... The use of hand gestures provides an attractive alternative to cumbersome interface devices for human-computer interaction (HCI). In particular, visual interpretation of hand gestures can help in achieving the ease and naturalness desired for HCI. This has motivated a very active research area conc ..."
Abstract - Cited by 489 (17 self) - Add to MetaCart
The use of hand gestures provides an attractive alternative to cumbersome interface devices for human-computer interaction (HCI). In particular, visual interpretation of hand gestures can help in achieving the ease and naturalness desired for HCI. This has motivated a very active research area

Integration of the cognitive and the psychodynamic unconscious

by Seymour Epstein - American Psychologist , 1994
"... Cognitive-experiential self-theory integrates the cognitive and the psychodynamic unconscious by assuming the ex-istence of two parallel, interacting modes of information processing: a rational system and an emotionally driven experiential system. Support for the theory is provided by the convergenc ..."
Abstract - Cited by 477 (1 self) - Add to MetaCart
Cognitive-experiential self-theory integrates the cognitive and the psychodynamic unconscious by assuming the ex-istence of two parallel, interacting modes of information processing: a rational system and an emotionally driven experiential system. Support for the theory is provided

A Secure Environment for Untrusted Helper Applications -- Confining the Wily Hacker

by Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer
"... Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are usually too complex to be bug-free. This raises si ..."
Abstract - Cited by 462 (7 self) - Add to MetaCart
significant security concerns. Therefore, it is desirable to create a secure environment to contain untrusted helper applications. We propose to reduce therisk of a security breachby restricting the program's access to the operating system. In particular, we intercept and filter dangerous system calls

Anti de Sitter space and holography

by Edward Witten , 1998
"... Recently, it has been proposed by Maldacena that large N limits of certain conformal field theories in d dimensions can be described in terms of supergravity (and string theory) on the product of d+1-dimensional AdS space with a compact manifold. Here we elaborate on this idea and propose a precise ..."
Abstract - Cited by 383 (7 self) - Add to MetaCart
correspondence between conformal field theory observables and those of supergravity: correlation functions in conformal field theory are given by the dependence of the supergravity action on the asymptotic behavior at infinity. In particular, dimensions of operators in conformal field theory are given by masses

Global Spontaneous Activity and Local Structured (learned) Delay Activity in Cortex

by Daniel J. Amit, La Sapienza, Ple Aldo Moro, Nicolas Brunel, Universita Di Roma, Universita Di Roma , 1996
"... to any of the stimuli learned have rates which gradually increase with the amplitude of synaptic potentiation. b. When the average LTP increases beyond a critical value, specific local attractors appear abruptly against the background of the global uniform spontaneous attractor. This happens with e ..."
Abstract - Cited by 306 (26 self) - Add to MetaCart
activity distribution. The particular mode of behavior depends on the stimulus: if it is unfa

Tree-based batch mode reinforcement learning

by Damien Ernst, Pierre Geurts, Louis Wehenkel - JOURNAL OF MACHINE LEARNING RESEARCH , 2005
"... Reinforcement learning aims to determine an optimal control policy from interaction with a system or from observations gathered from a system. In batch mode, it can be achieved by approximating the so-called Q-function based on a set of four-tuples (xt,ut,rt,xt+1) where xt denotes the system state a ..."
Abstract - Cited by 224 (42 self) - Add to MetaCart
Reinforcement learning aims to determine an optimal control policy from interaction with a system or from observations gathered from a system. In batch mode, it can be achieved by approximating the so-called Q-function based on a set of four-tuples (xt,ut,rt,xt+1) where xt denotes the system state
Next 10 →
Results 1 - 10 of 11,150
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University