• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 9,727
Next 10 →

The program dependence graph and its use in optimization

by Jeanne Ferrante, Karl J. Ottenstein, Joe D. Warren - ACM Transactions on Programming Languages and Systems , 1987
"... In this paper we present an intermediate program representation, called the program dependence graph (PDG), that makes explicit both the data and control dependence5 for each operation in a program. Data dependences have been used to represent only the relevant data flow relationships of a program. ..."
Abstract - Cited by 996 (3 self) - Add to MetaCart
In this paper we present an intermediate program representation, called the program dependence graph (PDG), that makes explicit both the data and control dependence5 for each operation in a program. Data dependences have been used to represent only the relevant data flow relationships of a program

The Determinants of Credit Spread Changes.

by Pierre Collin-Dufresne , Robert S Goldstein , J Spencer Martin , Gurdip Bakshi , Greg Bauer , Dave Brown , Francesca Carrieri , Peter Christoffersen , Susan Christoffersen , Greg Duffee , Darrell Duffie , Vihang Errunza , Gifford Fong , Mike Gallmeyer , Laurent Gauthier , Rick Green , John Griffin , Jean Helwege , Kris Jacobs , Chris Jones , Andrew Karolyi , Dilip Madan , David Mauer , Erwan Morellec , Federico Nardari , N R Prabhala , Tony Sanders , Sergei Sarkissian , Bill Schwert , Ken Singleton , Chester Spatt , René Stulz - Journal of Finance , 2001
"... ABSTRACT Using dealer's quotes and transactions prices on straight industrial bonds, we investigate the determinants of credit spread changes. Variables that should in theory determine credit spread changes have rather limited explanatory power. Further, the residuals from this regression are ..."
Abstract - Cited by 422 (2 self) - Add to MetaCart
-grade bond yield changes on Treasury yield changes and stock returns (see Kwan (1996)) we find that the R 2 falls to five percent when the dependent variable is credit spread changes. Hence, while much is known about yield changes, we have very limited knowledge about the determinants of credit spread

Fixing the Java memory model

by Jeremy Manson, William Pugh, Sarita V. Adve, Jeremy Manson - In ACM Java Grande Conference , 1999
"... This paper describes the new Java memory model, which has been revised as part of Java 5.0. The model specifies the legal behaviors for a multithreaded program; it defines the semantics of multithreaded Java programs and partially determines legal implementations of Java virtual machines and compile ..."
Abstract - Cited by 385 (10 self) - Add to MetaCart
they rely on a strong notion of data and control dependences that precludes some standard compiler transformations. Although the majority of what is currently done in compilers is legal, the new model introduces significant differences, and clearly defines the boundaries of legal transformations

Automatic Translation of FORTRAN Programs to Vector Form

by Randy Allen, Ken Kennedy - ACM Transactions on Programming Languages and Systems , 1987
"... This paper discusses the theoretical concepts underlying a project at Rice University to develop an automatic translator, called PFC (for Parallel FORTRAN Converter), from FORTRAN to FORTRAN 8x. The Rice project, based initially upon the research of Kuck and others at the University of Illinois [6, ..."
Abstract - Cited by 329 (34 self) - Add to MetaCart
in this section to extend dependence to multiple statements and multiple loops. Section 5 develops dependence-based algorithms for code generation and transformations for enhancing the parallelism of a statement. Section 6 describes a method for extending the power of data dependence to control statements

Secure Program Execution via Dynamic Information Flow Tracking

by G. Edward Suh, Jaewook Lee, Srinivas Devadas , 2004
"... Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of spurious information. Every security attack to take control of a program needs to transfer the program’s control to malevolen ..."
Abstract - Cited by 271 (3 self) - Add to MetaCart
Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of spurious information. Every security attack to take control of a program needs to transfer the program’s control

Global and regional climate changes due to black carbon,

by V Ramanathan , G Carmichael - Nat. Geosci., , 2008
"... Figure 1: Global distribution of BC sources and radiative forcing. a, BC emission strength in tons per year from a study by Bond et al. Full size image (42 KB) Review Nature Geoscience 1, 221 -227 (2008 Black carbon in soot is the dominant absorber of visible solar radiation in the atmosphere. Ant ..."
Abstract - Cited by 228 (5 self) - Add to MetaCart
clouds, with vertical extents of 3 to 5 km. Because of the combination of high absorption, a regional distribution roughly aligned with solar irradiance, and the capacity to form widespread atmospheric brown clouds in a mixture with other aerosols, emissions of black carbon are the second strongest

The strengthening the reporting of observational studies in epidemiology (STROBE) statement: guidelines for reporting observational studies.

by Erik Von Elm , Douglas G Altman , Matthias Egger , Stuart J Pocock , Peter C Gøtzsche , Jan P Vandenbroucke - PLoS Med , 2007
"... A B S T R A C T Much biomedical research is observational. The reporting of such research is often inadequate, which hampers the assessment of its strengths and weaknesses and of a study's generalisability. The Strengthening the Reporting of Observational Studies in Epidemiology (STROBE) Initi ..."
Abstract - Cited by 207 (1 self) - Add to MetaCart
) Initiative developed recommendations on what should be included in an accurate and complete report of an observational study. We defined the scope of the recommendations to cover three main study designs: cohort, case-control, and cross-sectional studies. We convened a 2-day workshop in September 2004

Introducing the Tileworld: Experimentally evaluating agent architectures

by Martha E. Pollack, Marc Ringuette - In Proceedings of the National Conference on Artificial Intelligence , 1990
"... We describe a system called Tileworld, which consists of a simulated robot agent and a simulated environment which is both dynamic and unpredictable. Both the agent and the environment are highly parameterized, enabling one to control certain characteristics of each. We can thus experimentally inves ..."
Abstract - Cited by 195 (13 self) - Add to MetaCart
We describe a system called Tileworld, which consists of a simulated robot agent and a simulated environment which is both dynamic and unpredictable. Both the agent and the environment are highly parameterized, enabling one to control certain characteristics of each. We can thus experimentally

Analysis of a cone-based distributed topology control algorithm for wireless multi-hop networks

by Li Li, Joseph Y. Halpern, Paramvir Bahl, Yi-min Wang, Roger Wattenhofer - In ACM Symposium on Principle of Distributed Computing (PODC , 2001
"... bahl~microsoft, corn ymwang~microsoft, corn rogerwa~microsoft, corn The topology of a wireless multi-hop network can be con-trolled by varying the transmission power at each node. In this paper, we give a detailed analysis of a cone-based dis-tributed topology control algorithm. This algorithm, intr ..."
Abstract - Cited by 174 (14 self) - Add to MetaCart
bahl~microsoft, corn ymwang~microsoft, corn rogerwa~microsoft, corn The topology of a wireless multi-hop network can be con-trolled by varying the transmission power at each node. In this paper, we give a detailed analysis of a cone-based dis-tributed topology control algorithm. This algorithm

Working-memory capacity and the control of attention: The contributions of goal neglect, response competition, and task set to Stroop interference

by Michael J. Kane, Randall W. Engle - JOURNAL OF EXPERIMENTAL PSYCHOLOGY GENERAL , 2003
"... Individual differences in working-memory (WM) capacity predicted performance on the Stroop task in 5 experiments, indicating the importance of executive control and goal maintenance to selective attention. When the Stroop task encouraged goal neglect by including large numbers of congruent trials (R ..."
Abstract - Cited by 169 (9 self) - Add to MetaCart
Individual differences in working-memory (WM) capacity predicted performance on the Stroop task in 5 experiments, indicating the importance of executive control and goal maintenance to selective attention. When the Stroop task encouraged goal neglect by including large numbers of congruent trials
Next 10 →
Results 1 - 10 of 9,727
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University