Results 11 - 20
of
451
Capital Bu¤er and Risk Adjustments in BHCs
"... This paper makes use of a panel of United States (US) bank hold-ing company (BHC) and commercial bank balance sheet data in order to examine the relationship between capital bu¤er and portfolio risk adjustments since the introduction of Basel I. Esti-mating a set of limited informationas well as ful ..."
Abstract
- Add to MetaCart
This paper makes use of a panel of United States (US) bank hold-ing company (BHC) and commercial bank balance sheet data in order to examine the relationship between capital bu¤er and portfolio risk adjustments since the introduction of Basel I. Esti-mating a set of limited informationas well
Dynamic Routing on Networks with Fixed-Size Bu ers
- Proceedings of SODA 2003
"... The combination of the buer size of routers deployed in the Internet and the Internet traÆc itself leads routinely to routers dropping packets. Motivated by this, we initiate the rigorous study of dynamic store-and-forward routing on arbitrary networks in a model in which dropped packets must explic ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
The combination of the buer size of routers deployed in the Internet and the Internet traÆc itself leads routinely to routers dropping packets. Motivated by this, we initiate the rigorous study of dynamic store-and-forward routing on arbitrary networks in a model in which dropped packets must explicitly be taken into account. To avoid the uncertainties of traÆc modeling, we consider arbitrary traÆc on the network. We analyze and compare the eectiveness of several greedy, on-line, local-control protocols using a competitive analysis of the throughput. One goal of our approach is for the competitive results to continue to hold as a network grows without requiring the memory in the nodes to increase with the size of the network. Thus, in our model, we have link buers of xed size, B, which is independent of the size of the network, and B becomes a parameter of the model. Our results are in contrast to another adversarial traÆc model known as Adversarial Queuing Theory (AQT), which studies the stability and growth rate of queues as a function of the network and traÆc parameters. For example, in AQT the Furthest-To-Go (FTG) protocol is stable for all networks whereas Nearest-To-Go (NTG) can be unstable for some networks. Unlike AQT, in our setting NTG is preferable to FTG: we show that the NTG protocol is throughput-competitive on all networks whereas the FTG protocol has unbounded competitiveness whenever a network contains even small cycles. 1
Bu®er Over°ow and Format String Over°ow Vulnerabilities
"... Bu®er over°ow vulnerabilities are among the most widespread of security problems. Numerous incidents of bu®er over°ow attacks have been reported and many solutions have been proposed, but a solution that is both complete and highly practical is yet to be found. Another kind of vulnerability called f ..."
Abstract
- Add to MetaCart
Bu®er over°ow vulnerabilities are among the most widespread of security problems. Numerous incidents of bu®er over°ow attacks have been reported and many solutions have been proposed, but a solution that is both complete and highly practical is yet to be found. Another kind of vulnerability called
Accelerated Simulation for Packet Buffer with a Non FIFO Scheduler By
, 2006
"... Packet traffic in the IP networks has been found to possess self similar characteristics. Modelling IP network traffic with classical queuing system therefore can lead to inaccuracy. Furthermore, differential schedulers such the DiffServ, are very important in providing Quality of Service guarantees ..."
Abstract
- Add to MetaCart
guarantees to the corresponding class of traffic. However, problems arise in modelling self similar traffic through non-FIFO schedulers where to obtain crucial performance results such as the rare event probabilities (i.e. packet loss, buffer overflow and packet delay) consumes extremely long simulation
Performance analysis and bu'er allocations in some open assembly systems
"... This paper considers a 3nite capacity fork–join queueing model for open assembly systems with arrival and departure synchronizations and presents an approach for enumerating the state space and obtaining the steady state probabilities of the same for such a model under exponential assumptions. Sever ..."
Abstract
- Add to MetaCart
. Several performance measures like the throughput of the system, fraction of arrivals that actually enter into the system, utilizations of the work stations, etc., are obtained. Further, design of such fork–join systems in terms of bu'er size con3gurations for maximizing the throughput of the system
Dynamic Memory Disambiguation Using the Memory Conflict Buffer
- In Proceedings of the 6th Symposium on Architectural Support for Programming Languages and Operating Systems
, 1994
"... To exploit instruction level parallelism, compilers for VLIW and superscalar processors often employ static code scheduling. However, the available code reordering may be severely restricted due to ambiguous dependences between memory instructions. This paper introduces a simple hardware mechanism, ..."
Abstract
-
Cited by 93 (5 self)
- Add to MetaCart
, referred to as the memory con ict bu er, which facilitates static code scheduling in the presence of memory store/load dependences. Correct program execution is ensured by the memory con ict bu er and repair code provided by the compiler. With this addition, signi cant speedup over
Estimating Discount Functions with Consumption Choices Over the Lifecycle. Working Paper
, 2005
"... Intertemporal preferences are di ¢ cult to measure. We estimate time preferences using a structural bu¤er stock consumption model and the Method of Simulated Moments. The model includes stochastic labor income, liquidity constraints, child and adult dependents, liquid and illiquid assets, revolving ..."
Abstract
-
Cited by 92 (10 self)
- Add to MetaCart
Intertemporal preferences are di ¢ cult to measure. We estimate time preferences using a structural bu¤er stock consumption model and the Method of Simulated Moments. The model includes stochastic labor income, liquidity constraints, child and adult dependents, liquid and illiquid assets, revolving
ac er
"... with s ith con rea. les wit ce of bu trictions (OFR-SPC) are experimentally evaluated. The liquid-side mass trans-pecific interfacial area, a, are studied individually. The specific interfacial area columns are the most commonly used devices for enhancing gas–liquid mass transfer [2–7]. Nevertheless ..."
Abstract
- Add to MetaCart
with s ith con rea. les wit ce of bu trictions (OFR-SPC) are experimentally evaluated. The liquid-side mass trans-pecific interfacial area, a, are studied individually. The specific interfacial area columns are the most commonly used devices for enhancing gas–liquid mass transfer [2
Competitive Queueing Policies for QoS Switches
- In Proc. 14th ACM-SIAM Symp. on Discrete Algorithms
, 2003
"... We consider packet scheduling in a network providing di#erentiated services, where each packet is assigned a value. We study various queueing models for supporting QoS (Quality of Service). In the nonpreemptive model, packets accepted to the queue will be transmitted eventually and cannot be dropped ..."
Abstract
-
Cited by 38 (4 self)
- Add to MetaCart
(while transmission ordering is allowed to be arbitrary). In all models the goal of the bu#er policy is to maximize the total value of the accepted packets.
2010), "Inter- and Intra-generational Consequences of Pension Bu¤er Policy under Demographic, Financial and Economic Shocks", CESifo Economic Studies
"... An electronic version of the paper may be downloaded • from the SSRN website: www.SSRN.com • from the RePEc website: www.RePEc.org • from the CESifo website: Twww.CESifo-group.org/wp T ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
An electronic version of the paper may be downloaded • from the SSRN website: www.SSRN.com • from the RePEc website: www.RePEc.org • from the CESifo website: Twww.CESifo-group.org/wp T
Results 11 - 20
of
451