• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 185,597
Next 10 →

Building a Practically Useful Theory of Goal Setting and Task Motivation -- A 35-Year Odyssey

by Edwin A. Locke, Gary P. Latham , 2002
"... The authors summarize 35 years of empirical research on goal-setting theory. They describe the core findings of the theory, the mechanisms by which goals operate, moderators of goal effects, the relation of goals and satisfaction, and the role of goals as mediators of incentives. The external validi ..."
Abstract - Cited by 501 (10 self) - Add to MetaCart
validity and practical significance of goal-setting theory are explained, and new directions in goal-setting research are discussed. The relationships of goal setting to other theories are described as are the theory’s limitations.

Practical Byzantine fault tolerance

by Miguel Castro, Barbara Liskov , 1999
"... This paper describes a new replication algorithm that is able to tolerate Byzantine faults. We believe that Byzantinefault-tolerant algorithms will be increasingly important in the future because malicious attacks and software errors are increasingly common and can cause faulty nodes to exhibit arbi ..."
Abstract - Cited by 673 (15 self) - Add to MetaCart
arbitrary behavior. Whereas previous algorithms assumed a synchronous system or were too slow to be used in practice, the algorithm described in this paper is practical: it works in asynchronous environments like the Internet and incorporates several important optimizations that improve the response time

Jflow: Practical mostly-static information flow control.

by Andrew C Myers - In Proceedings of the 26th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, , 1999
"... Abstract A promising technique for protecting privacy and integrity of sensitive data is to statically check information flow within programs that manipulate the data. While previous work has proposed programming language extensions to allow this static checking, the resulting languages are too res ..."
Abstract - Cited by 584 (33 self) - Add to MetaCart
restrictive for practical use and have not been implemented. In this paper, we describe the new language JFlow, an extension to the Java language that adds statically-checked information flow annotations. JFlow provides several new features that make information flow checking more flexible and convenient than

Intelligent agents: Theory and practice

by Michael Wooldridge, Nicholas R. Jennings - The Knowledge Engineering Review , 1995
"... The concept of an agent has become important in both Artificial Intelligence (AI) and mainstream computer science. Our aim in this paper is to point the reader at what we perceive to be the most important theoretical and practical issues associated with the design and construction of intelligent age ..."
Abstract - Cited by 1441 (85 self) - Add to MetaCart
The concept of an agent has become important in both Artificial Intelligence (AI) and mainstream computer science. Our aim in this paper is to point the reader at what we perceive to be the most important theoretical and practical issues associated with the design and construction of intelligent

A Practical Guide to Wavelet Analysis

by Christopher Torrence, Gilbert P. Compo , 1998
"... A practical step-by-step guide to wavelet analysis is given, with examples taken from time series of the El Nio-- Southern Oscillation (ENSO). The guide includes a comparison to the windowed Fourier transform, the choice of an appropriate wavelet basis function, edge effects due to finite-length t ..."
Abstract - Cited by 869 (3 self) - Add to MetaCart
A practical step-by-step guide to wavelet analysis is given, with examples taken from time series of the El Nio-- Southern Oscillation (ENSO). The guide includes a comparison to the windowed Fourier transform, the choice of an appropriate wavelet basis function, edge effects due to finite

Principles and Practice in Second Language Acquisition

by Stephen D Krashen , 1982
"... This is the original version of Principles and Practice, as published in 1982, with only minor changes. It is gratifying to point out that many of the predictions made in this book were confirmed by subsequent research, for example, the superiority of comprehensible-input based methods and sheltered ..."
Abstract - Cited by 775 (4 self) - Add to MetaCart
best through comprehensible input (Krashen, 1989; 2003). I have changed my position on only one issue: At the end of Principles and Practice, I suggest the use of a form of deception- students may think they are acquiring vocabulary or learning subject matter, but unknown to them, they are acquiring

Practical network support for IP traceback

by Stefan Savage, David Wetherall, Anna Karlin, Tom Anderson , 2000
"... This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or “spoofed”, source ad ..."
Abstract - Cited by 678 (13 self) - Add to MetaCart
). Moreover, this traceback can be performed “post-mortem ” – after an attack has completed. We present an implementation of this technology that is incrementally deployable, (mostly) backwards compatible and can be efficiently implemented using conventional technology. 1.

The theory and practice of corporate finance: Evidence from the field

by John R. Graham, Campbell R. Harvey - Journal of Financial Economics , 2001
"... We survey 392 CFOs about the cost of capital, capital budgeting, and capital structure. Large firms rely heavily on present value techniques and the capital asset pricing model, while small firms are relatively likely to use the payback criterion. We find that a surprising number of firms use their ..."
Abstract - Cited by 725 (23 self) - Add to MetaCart
We survey 392 CFOs about the cost of capital, capital budgeting, and capital structure. Large firms rely heavily on present value techniques and the capital asset pricing model, while small firms are relatively likely to use the payback criterion. We find that a surprising number of firms use

Seven principles for good practice in undergraduate education

by W. Chickering, Zelda F. Gamson , 1987
"... Apathetic students, illiterate graduates, incompetent teaching, impersonal campuses-- so rolls the drumfire of criticism of higher education. More than two years of reports have spelled out the problems. States have been quick to respond by holding out carrots and beating with sticks. There are neit ..."
Abstract - Cited by 799 (0 self) - Add to MetaCart
education? Many campuses around the country are asking this question. To provide a focus for their work, we offer seven principles based on research on good teaching and learning in colleges and universities. Good practice in undergraduate education: 1. Encourages contacts between students and faculty. 2

A Practical Bayesian Framework for Backprop Networks

by David J.C. MacKay - Neural Computation , 1991
"... A quantitative and practical Bayesian framework is described for learning of mappings in feedforward networks. The framework makes possible: (1) objective comparisons between solutions using alternative network architectures ..."
Abstract - Cited by 494 (19 self) - Add to MetaCart
A quantitative and practical Bayesian framework is described for learning of mappings in feedforward networks. The framework makes possible: (1) objective comparisons between solutions using alternative network architectures
Next 10 →
Results 1 - 10 of 185,597
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University