Results 1 - 10
of
346
Whom You Know Matters: Venture Capital Networks and Investment Performance,
- Journal of Finance
, 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract
-
Cited by 138 (8 self)
- Add to MetaCart
validates our choice of using syndication networks to proxy for the broader networks VCs operate in. B. Pooled Portfolio Company Survival Models So far, we have modeled round-by-round survival. We now take the panel nature of the data explicitly into account. We track each sample company from its first
Materials for an exploratory theory of the network society.
- The British Journal of Sociology
, 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract
-
Cited by 122 (0 self)
- Add to MetaCart
ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world
Remembering over the short-term: The case against the standard model.
- Annual Review of Psychology,
, 2002
"... s Abstract Psychologists often assume that short-term storage is synonymous with activation, a mnemonic property that keeps information in an immediately accessible form. Permanent knowledge is activated, as a result of on-line cognitive processing, and an activity trace is established "in&quo ..."
Abstract
-
Cited by 74 (0 self)
- Add to MetaCart
at output does not mean that rehearsal is responsible. Again, the raw passage of time could be critical: Recalling long words first imposes more of an output delay on the remaining words than recalling short words first. In fact, when spoken recall protocols are analyzed in microscopic detail, it turns out
High resolution traction force microscopy based on experimental and computational advances
- Biophys. J
, 2008
"... ABSTRACT Cell adhesion and migration crucially depend on the transmission of actomyosin-generated forces through sites of focal adhesion to the extracellular matrix. Here we report experimental and computational advances in improving the resolution and reliability of traction force microscopy. First ..."
Abstract
-
Cited by 50 (7 self)
- Add to MetaCart
. First, we introduce the use of two differently colored nanobeads as fiducial markers in polyacrylamide gels and explain how the displacement field can be computationally extracted from the fluorescence data. Second, we present different improvements regarding standard methods for force reconstruction
likelihood and the role of models in molecular phylogenetics.
- Mol. Biol. Evol.
, 2000
"... Methods such as maximum parsimony (MP) are frequently criticized as being statistically unsound and not being based on any ''model.'' On the other hand, advocates of MP claim that maximum likelihood (ML) has some fundamental problems. Here, we explore the connection between the ..."
Abstract
-
Cited by 70 (11 self)
- Add to MetaCart
the different versions of MP and ML methods, particularly in light of recent theoretical results. We describe links between the two methods-for example, we describe how MP can be regarded as an ML method when there is no common mechanism between sites (such as might occur with morphological data and certain
Discourse, social theory, and social research: The discourse of welfare reform
- Journal of Sociolinguistics
, 2000
"... 2 Discourse, social theory, and social research: the discourse of welfare reform Abstract Recent social theory includes important insights into language which constitute a so far underdeveloped resource for sociolinguistics. But much of this theory stops short -theoretical frameworks and categories ..."
Abstract
-
Cited by 47 (2 self)
- Add to MetaCart
central place to language, they tend not to specify how it does the social work that is ascribed to it. What is missing is a theoretical specification of the social power of language which could be operationalized as ways of showing in detail within particular social research projects how language
Men-streaming’ gender? Questions for gender and development policy in the twenty-first century.
- Progress in Development Studies
, 2002
"... Abstract: Insofar as gender is still so often equated with women alone, the move from Women in Development to Gender in Development has changed very little. Men as a human category have always been present, involved, consulted, obeyed and disobeyed in development work. Yet men as a gendered categor ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
under the Gender and Development umbrella, there is far less consensus as to how this should be done, and the extent to which this should become a component element within development work around gender issues. III Why should men be incorporated in gender and development operations? Although to date
Culture on the Rise: How and Why Cultural Membership Promotes Democratic Politics
"... Abstract Selectively using Tocqueville, many social scientists suggest that civic participation increases democracy. We go beyond this neo-Tocquevillian model in three ways. First, to capture broader political and economic transformations, we consider different types of participation; results chang ..."
Abstract
- Add to MetaCart
of many past models no long seem to work or demand qualification. How do any others specifically link to the growing salience of culture and the arts in the past few decades (see Our past work documented elements of this structural socioeconomic change as the rise of the "new political culture
UvA-DARE (Digital Academic Repository) What Pehuenche blood does: hemic feasting, intersubjective participation, and witchcraft in Southern Chile What Pehuenche blood does Hemic feasting, intersubjective participation, and witchcraft in Southern Chile
"... Among the Pehuenche, blood is extracted from humans and animals and shared and eaten among people, offered as food to land spirits and deities, as well as devoured by evil spirits and witches. Through an ethnographic analysis of eating and feeding practices involving a variety of blood eaters, this ..."
Abstract
- Add to MetaCart
body is all closed. If the head is all closed, how does it enter?" 32 The stages of a nocturnal visitation are thus the following: first, the person needs to be asleep. Once the am has left the personal composition, the nocturnal visitor then takes advantage of the situation and tries to frighten
Securing the Internet of Things,
- IEEE Computer,
, 2011
"... In the Internet of Things vision, every physical object has a virtual component that can produce and consume services. Such extreme interconnection will bring unprecedented convenience and economy, but it will also require novel approaches to ensure its safe and ethical use. In the Internet of Thin ..."
Abstract
-
Cited by 26 (1 self)
- Add to MetaCart
legal and technical framework is essential. To establish it, analysts must thoroughly understand the risks associated with various IoT scenarios, such as air travel, which has many interrelated elements, including safety, privacy, and economy All these requirements underline some critical first steps
Results 1 - 10
of
346