• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 451
Next 10 →

Capital Bu¤er and Risk Adjustments in BHCs

by Terhi Jokipii
"... This paper makes use of a panel of United States (US) bank hold-ing company (BHC) and commercial bank balance sheet data in order to examine the relationship between capital bu¤er and portfolio risk adjustments since the introduction of Basel I. Esti-mating a set of limited informationas well as ful ..."
Abstract - Add to MetaCart
This paper makes use of a panel of United States (US) bank hold-ing company (BHC) and commercial bank balance sheet data in order to examine the relationship between capital bu¤er and portfolio risk adjustments since the introduction of Basel I. Esti-mating a set of limited informationas well

Dynamic Routing on Networks with Fixed-Size Bu ers

by William Aiello, Rafail Ostrovsky, Eyal Kushilevitz - Proceedings of SODA 2003
"... The combination of the buer size of routers deployed in the Internet and the Internet traÆc itself leads routinely to routers dropping packets. Motivated by this, we initiate the rigorous study of dynamic store-and-forward routing on arbitrary networks in a model in which dropped packets must explic ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
The combination of the buer size of routers deployed in the Internet and the Internet traÆc itself leads routinely to routers dropping packets. Motivated by this, we initiate the rigorous study of dynamic store-and-forward routing on arbitrary networks in a model in which dropped packets must explicitly be taken into account. To avoid the uncertainties of traÆc modeling, we consider arbitrary traÆc on the network. We analyze and compare the eectiveness of several greedy, on-line, local-control protocols using a competitive analysis of the throughput. One goal of our approach is for the competitive results to continue to hold as a network grows without requiring the memory in the nodes to increase with the size of the network. Thus, in our model, we have link buers of xed size, B, which is independent of the size of the network, and B becomes a parameter of the model. Our results are in contrast to another adversarial traÆc model known as Adversarial Queuing Theory (AQT), which studies the stability and growth rate of queues as a function of the network and traÆc parameters. For example, in AQT the Furthest-To-Go (FTG) protocol is stable for all networks whereas Nearest-To-Go (NTG) can be unstable for some networks. Unlike AQT, in our setting NTG is preferable to FTG: we show that the NTG protocol is throughput-competitive on all networks whereas the FTG protocol has unbounded competitiveness whenever a network contains even small cycles. 1

Bu®er Over°ow and Format String Over°ow Vulnerabilities

by Kyung-suk Lhee, Steve J. Chapin, Kyung-suk Lhee, Steve J. Chapin
"... Bu®er over°ow vulnerabilities are among the most widespread of security problems. Numerous incidents of bu®er over°ow attacks have been reported and many solutions have been proposed, but a solution that is both complete and highly practical is yet to be found. Another kind of vulnerability called f ..."
Abstract - Add to MetaCart
Bu®er over°ow vulnerabilities are among the most widespread of security problems. Numerous incidents of bu®er over°ow attacks have been reported and many solutions have been proposed, but a solution that is both complete and highly practical is yet to be found. Another kind of vulnerability called

Accelerated Simulation for Packet Buffer with a Non FIFO Scheduler By

by Sharifah Hafizah, Syed Ariffin, Queen Mary , 2006
"... Packet traffic in the IP networks has been found to possess self similar characteristics. Modelling IP network traffic with classical queuing system therefore can lead to inaccuracy. Furthermore, differential schedulers such the DiffServ, are very important in providing Quality of Service guarantees ..."
Abstract - Add to MetaCart
guarantees to the corresponding class of traffic. However, problems arise in modelling self similar traffic through non-FIFO schedulers where to obtain crucial performance results such as the rare event probabilities (i.e. packet loss, buffer overflow and packet delay) consumes extremely long simulation

Performance analysis and bu'er allocations in some open assembly systems

by N. Hemach, Sarat Kumar Eedupugantib
"... This paper considers a 3nite capacity fork–join queueing model for open assembly systems with arrival and departure synchronizations and presents an approach for enumerating the state space and obtaining the steady state probabilities of the same for such a model under exponential assumptions. Sever ..."
Abstract - Add to MetaCart
. Several performance measures like the throughput of the system, fraction of arrivals that actually enter into the system, utilizations of the work stations, etc., are obtained. Further, design of such fork–join systems in terms of bu'er size con3gurations for maximizing the throughput of the system

Dynamic Memory Disambiguation Using the Memory Conflict Buffer

by David M. Gallagher, William Y. Chen, Scott A. Mahlke, John C. Gyllenhaal, Wen-mei W. Hwu - In Proceedings of the 6th Symposium on Architectural Support for Programming Languages and Operating Systems , 1994
"... To exploit instruction level parallelism, compilers for VLIW and superscalar processors often employ static code scheduling. However, the available code reordering may be severely restricted due to ambiguous dependences between memory instructions. This paper introduces a simple hardware mechanism, ..."
Abstract - Cited by 93 (5 self) - Add to MetaCart
, referred to as the memory con ict bu er, which facilitates static code scheduling in the presence of memory store/load dependences. Correct program execution is ensured by the memory con ict bu er and repair code provided by the compiler. With this addition, signi cant speedup over

Estimating Discount Functions with Consumption Choices Over the Lifecycle. Working Paper

by David Laibson, Andrea Repetto, Jeremy Tobacman, Orazio Attanasio, Felipe Balmaceda, Robert Barro, John Campbell, Christopher Carroll, Pierre-olivier Gourinchas, Cristóbal Huneeus, Greg Mankiw , 2005
"... Intertemporal preferences are di ¢ cult to measure. We estimate time preferences using a structural bu¤er stock consumption model and the Method of Simulated Moments. The model includes stochastic labor income, liquidity constraints, child and adult dependents, liquid and illiquid assets, revolving ..."
Abstract - Cited by 92 (10 self) - Add to MetaCart
Intertemporal preferences are di ¢ cult to measure. We estimate time preferences using a structural bu¤er stock consumption model and the Method of Simulated Moments. The model includes stochastic labor income, liquidity constraints, child and adult dependents, liquid and illiquid assets, revolving

ac er

by unknown authors
"... with s ith con rea. les wit ce of bu trictions (OFR-SPC) are experimentally evaluated. The liquid-side mass trans-pecific interfacial area, a, are studied individually. The specific interfacial area columns are the most commonly used devices for enhancing gas–liquid mass transfer [2–7]. Nevertheless ..."
Abstract - Add to MetaCart
with s ith con rea. les wit ce of bu trictions (OFR-SPC) are experimentally evaluated. The liquid-side mass trans-pecific interfacial area, a, are studied individually. The specific interfacial area columns are the most commonly used devices for enhancing gas–liquid mass transfer [2

Competitive Queueing Policies for QoS Switches

by Nir Andelman, Yishay Mansour, An Zhu - In Proc. 14th ACM-SIAM Symp. on Discrete Algorithms , 2003
"... We consider packet scheduling in a network providing di#erentiated services, where each packet is assigned a value. We study various queueing models for supporting QoS (Quality of Service). In the nonpreemptive model, packets accepted to the queue will be transmitted eventually and cannot be dropped ..."
Abstract - Cited by 38 (4 self) - Add to MetaCart
(while transmission ordering is allowed to be arbitrary). In all models the goal of the bu#er policy is to maximize the total value of the accepted packets.

2010), "Inter- and Intra-generational Consequences of Pension Bu¤er Policy under Demographic, Financial and Economic Shocks", CESifo Economic Studies

by Alessandro Bucciol, Roel M. W. J. Beetsma, Roel M. W. J. Beetsma
"... An electronic version of the paper may be downloaded • from the SSRN website: www.SSRN.com • from the RePEc website: www.RePEc.org • from the CESifo website: Twww.CESifo-group.org/wp T ..."
Abstract - Cited by 4 (1 self) - Add to MetaCart
An electronic version of the paper may be downloaded • from the SSRN website: www.SSRN.com • from the RePEc website: www.RePEc.org • from the CESifo website: Twww.CESifo-group.org/wp T
Next 10 →
Results 11 - 20 of 451
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University