Results 1  10
of
232,246
Okapi at TREC3
, 1996
"... this document length correction factor is #global": it is added at the end, after the weights for the individual terms have been summed, and is independentofwhich terms match. ..."
Abstract

Cited by 593 (5 self)
 Add to MetaCart
this document length correction factor is #global": it is added at the end, after the weights for the individual terms have been summed, and is independentofwhich terms match.
A NoArbitrage Vector Autoregression of Term Structure Dynamics with Macroeconomic and Latent Variables
, 2002
"... ..."
Constraint Logic Programming: A Survey
"... Constraint Logic Programming (CLP) is a merger of two declarative paradigms: constraint solving and logic programming. Although a relatively new field, CLP has progressed in several quite different directions. In particular, the early fundamental concepts have been adapted to better serve in differe ..."
Abstract

Cited by 864 (25 self)
 Add to MetaCart
in different areas of applications. In this survey of CLP, a primary goal is to give a systematic description of the major trends in terms of common fundamental concepts. The three main parts cover the theory, implementation issues, and programming for applications.
A Threshold of ln n for Approximating Set Cover
 JOURNAL OF THE ACM
, 1998
"... Given a collection F of subsets of S = f1; : : : ; ng, set cover is the problem of selecting as few as possible subsets from F such that their union covers S, and max kcover is the problem of selecting k subsets from F such that their union has maximum cardinality. Both these problems are NPhar ..."
Abstract

Cited by 778 (5 self)
 Add to MetaCart
hard. We prove that (1 \Gamma o(1)) ln n is a threshold below which set cover cannot be approximated efficiently, unless NP has slightly superpolynomial time algorithms. This closes the gap (up to low order terms) between the ratio of approximation achievable by the greedy algorithm (which is (1 \Gamma
KodairaSpencer theory of gravity and exact results for quantum string amplitudes
 Commun. Math. Phys
, 1994
"... We develop techniques to compute higher loop string amplitudes for twisted N = 2 theories with ĉ = 3 (i.e. the critical case). An important ingredient is the discovery of an anomaly at every genus in decoupling of BRST trivial states, captured to all orders by a master anomaly equation. In a particu ..."
Abstract

Cited by 545 (60 self)
 Add to MetaCart
’ of holomorphic curves of higher genus curves in Calabi–Yau manifolds. It is shown that topological amplitudes can also be reinterpreted as computing corrections to superpotential terms appearing in the effective 4d theory resulting from compactification of standard 10d superstrings on the corresponding N = 2
Bigtable: A distributed storage system for structured data
 IN PROCEEDINGS OF THE 7TH CONFERENCE ON USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION  VOLUME 7
, 2006
"... Bigtable is a distributed storage system for managing structured data that is designed to scale to a very large size: petabytes of data across thousands of commodity servers. Many projects at Google store data in Bigtable, including web indexing, Google Earth, and Google Finance. These applications ..."
Abstract

Cited by 995 (3 self)
 Add to MetaCart
place very different demands on Bigtable, both in terms of data size (from URLs to web pages to satellite imagery) and latency requirements (from backend bulk processing to realtime data serving). Despite these varied demands, Bigtable has successfully provided a flexible, highperformance solution
StrategyProofness and Arrow’s Conditions: Existence and Correspondence Theorems for Voting Procedures and Social Welfare Functions
 J. Econ. Theory
, 1975
"... Consider a committee which must select one alternative from a set of three or more alternatives. Committee members each cast a ballot which the voting procedure counts. The voting procedure is strategyproof if it always induces every committee member to cast a ballot revealing his preference. I pro ..."
Abstract

Cited by 542 (0 self)
 Add to MetaCart
to JeanMarie Blin, Richard Day, Theodore Groves, Rubin Saposnik, Maria Schmundt, Hugo Sonnenschein, and an anonymous referee for their help in the development of this paper. 1 Farquharson [4] introduced the terms sophisticated strategy and sincere strategy.
Detecting LongRun Abnormal Stock Returns: The Empirical Power and Specification of Test Statistics
 Journal of Financial Economics
, 1997
"... We analyze the empirical power and specification of test statistics in event studies designed to detect longrun (one to fiveyear) abnormal stock returns. We document that test statistics based on abnormal returns calculated using a reference portfolio, such as a market index, are misspecified (em ..."
Abstract

Cited by 517 (7 self)
 Add to MetaCart
We analyze the empirical power and specification of test statistics in event studies designed to detect longrun (one to fiveyear) abnormal stock returns. We document that test statistics based on abnormal returns calculated using a reference portfolio, such as a market index, are misspecified (empirical rejection rates exceed theoretical rejection rates) and identify three reasons for this misspecification. We correct for the three identified sources of misspecification by matching sample firms to control firms of similar sizes and booktomarket ratios. This control firm approach yields wellspecified test statistics in virtually all sampling situations considered.
Trade Policy and Economic Growth: A Skeptic's Guide to the CrossNational Evidence
 Macroeconomics Annual 2000, Ben Bemanke and
, 2000
"... Andrew Warner for generously sharing their data with us. We are particularly grateful to BenDavid, Frankel, Romer, Sachs, Warner and Romain Wacziarg for helpful email exchanges. We have benefited greatly from discussions in seminars at the University of California at Berkeley, ..."
Abstract

Cited by 1013 (25 self)
 Add to MetaCart
Andrew Warner for generously sharing their data with us. We are particularly grateful to BenDavid, Frankel, Romer, Sachs, Warner and Romain Wacziarg for helpful email exchanges. We have benefited greatly from discussions in seminars at the University of California at Berkeley,
Linklevel Measurements from an 802.11b Mesh Network
 In SIGCOMM
, 2004
"... This paper anal yzes the causes of packetl oss in a 38node urban mul tihop 802.11b network. The patterns and causes oflv# are important in the design of routing and errorcorrection proto colv as wel as in networkplqq"(v The paper makes the fol l owing observations. The distribution of intern ..."
Abstract

Cited by 565 (11 self)
 Add to MetaCart
This paper anal yzes the causes of packetl oss in a 38node urban mul tihop 802.11b network. The patterns and causes oflv# are important in the design of routing and errorcorrection proto colv as wel as in networkplqq"(v The paper makes the fol l owing observations. The distribution of inter
Results 1  10
of
232,246