• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 10,320
Next 10 →

to the latter work for additional results and generalizations. On the Political Substitutability between Tariffs

by Subsidiesa, Daniel Broub, Michele Rutac, Jel-classification F
"... opinions expressed in this paper should be attributed to the authors. They are not meant to represent the positions or opinions of the WTO and its Members and are without prejudice to Members ’ rights and obligations under the WTO. ..."
Abstract - Add to MetaCart
opinions expressed in this paper should be attributed to the authors. They are not meant to represent the positions or opinions of the WTO and its Members and are without prejudice to Members ’ rights and obligations under the WTO.

Modeling TCP Throughput: A Simple Model and its Empirical Validation

by Jitendra Padhye, Victor Firoiu, Don Towsley, Jim Kurose , 1998
"... In this paper we develop a simple analytic characterization of the steady state throughput, as a function of loss rate and round trip time for a bulk transfer TCP flow, i.e., a flow with an unlimited amount of data to send. Unlike the models in [6, 7, 10], our model captures not only the behavior of ..."
Abstract - Cited by 1337 (36 self) - Add to MetaCart
of TCP’s fast retransmit mechanism (which is also considered in [6, 7, 10]) but also the effect of TCP’s timeout mechanism on throughput. Our measurements suggest that this latter behavior is important from a modeling perspective, as almost all of our TCP traces contained more timeout events than fast

Fully homomorphic encryption using ideal lattices

by Craig Gentry - In Proc. STOC , 2009
"... We propose a fully homomorphic encryption scheme – i.e., a scheme that allows one to evaluate circuits over encrypted data without being able to decrypt. Our solution comes in three steps. First, we provide a general result – that, to construct an encryption scheme that permits evaluation of arbitra ..."
Abstract - Cited by 663 (17 self) - Add to MetaCart
that is represented as a lattice), as needed to evaluate general circuits. Unfortunately, our initial scheme is not quite bootstrappable – i.e., the depth that the scheme can correctly evaluate can be logarithmic in the lattice dimension, just like the depth of the decryption circuit, but the latter is greater than

Value-Based Software Engineering

by Barry W. Boehm - ACM Software Engineering Notes , 2003
"... Abstract—This paper provides a definition of the term “software engineering ” and a survey of the current state of the art and likely future trends in the field. The survey covers the technology available in the various phases of the software life cycle—requirements engineering, design, coding, test ..."
Abstract - Cited by 472 (32 self) - Add to MetaCart
, test, and maintenance—and in the overall area of software management and integrated technology-management approaches. It is oriented primarily toward discussing the domain of applicability of techniques (where and when they work), rather than how they work in detail. To cover the latter, an extensive

The faculty of language: what is it, who has it, and how did it evolve?

by Marc D Hauser , Noam Chomsky , W Tecumseh Fitch - Science, , 2002
"... We argue that an understanding of the faculty of language requires substantial interdisciplinary cooperation. We suggest how current developments in linguistics can be profitably wedded to work in evolutionary biology, anthropology, psychology, and neuroscience. We submit that a distinction should ..."
Abstract - Cited by 472 (7 self) - Add to MetaCart
We argue that an understanding of the faculty of language requires substantial interdisciplinary cooperation. We suggest how current developments in linguistics can be profitably wedded to work in evolutionary biology, anthropology, psychology, and neuroscience. We submit that a distinction should

Universal coalgebra: a theory of systems

by J. J. M. M. Rutten , 2000
"... In the semantics of programming, nite data types such as finite lists, have traditionally been modelled by initial algebras. Later final coalgebras were used in order to deal with in finite data types. Coalgebras, which are the dual of algebras, turned out to be suited, moreover, as models for certa ..."
Abstract - Cited by 408 (42 self) - Add to MetaCart
for certain types of automata and more generally, for (transition and dynamical) systems. An important property of initial algebras is that they satisfy the familiar principle of induction. Such a principle was missing for coalgebras until the work of Aczel (Non-Well-Founded sets, CSLI Leethre Notes, Vol. 14

The validity and utility of selection methods in personnel psychology: Practical and theoretical implications of 85 years of research findings

by Frank L. Schmidt, John E. Hunter - Psychological Bulletin , 1998
"... This article summarizes the practical and theoretical implications of 85 years of research in personnel selection. On the basis of meta-analytic findings, this article presents the validity of 19 selection procedures for predicting job performance and training performance and the validity of paired ..."
Abstract - Cited by 392 (2 self) - Add to MetaCart
combinations of general mental ability (GMA) and Ihe 18 other selection procedures. Overall, the 3 combinations with the highest multivariate validity and utility for job performance were GMA plus a work sample test (mean validity of.63), GMA plus an integrity test (mean validity of.65), and GMA plus a

Posterior Predictive Assessment of Model Fitness Via Realized Discrepancies

by Andrew Gelman, Xiao-li Meng, Hal Stern - Statistica Sinica , 1996
"... Abstract: This paper considers Bayesian counterparts of the classical tests for goodness of fit and their use in judging the fit of a single Bayesian model to the observed data. We focus on posterior predictive assessment, in a framework that also includes conditioning on auxiliary statistics. The B ..."
Abstract - Cited by 348 (39 self) - Add to MetaCart
. The Bayesian formulation facilitates the construction and calculation of a meaningful reference distribution not only for any (classical) statistic, but also for any parameter-dependent “statistic ” or discrepancy. The latter allows us to propose the realized discrepancy assessment of model fitness, which

Smodels - an Implementation of the Stable Model and Well-Founded Semantics for Normal Logic Programs

by Ilkka Niemelä, Patrik Simons , 1997
"... The Smodels system is a C++ implementation of the wellfounded and stable model semantics for range-restricted function-free normal programs. The system includes two modules: (i) smodels which implements the two semantics for ground programs and (ii) parse which computes a grounded version of a range ..."
Abstract - Cited by 294 (9 self) - Add to MetaCart
range-restricted function-free normal program. The latter module does not produce the whole set of ground instances of the program but a subset that is sufficient in the sense that no stable models are lost. The implementation of the stable model semantics for ground programs is based on bottom

Measuring Trends in Leisure: The Allocation of Time Over Five Decades,”

by Erik Hurst , 2006
"... In this paper, we use five decades of time-use surveys to document trends in the allocation of time within the United States. We find that a dramatic increase in leisure time lies behind the relatively stable number of market hours worked between 1965 and 2003. Specifically, using a variety of defi ..."
Abstract - Cited by 263 (5 self) - Add to MetaCart
In this paper, we use five decades of time-use surveys to document trends in the allocation of time within the United States. We find that a dramatic increase in leisure time lies behind the relatively stable number of market hours worked between 1965 and 2003. Specifically, using a variety
Next 10 →
Results 1 - 10 of 10,320
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University