Results 1 - 10
of
16,325
Path Analysis
"... Two methods of causal analysis have become popular: the Simon-Blalock method and path analysis. The Simon-Blalock method is a "weak " form of path analysis, whereas more information can be deduced by using path analysis. The Driver-Massey data, examined earlier by the Simon-Blalock method, ..."
Abstract
- Add to MetaCart
Two methods of causal analysis have become popular: the Simon-Blalock method and path analysis. The Simon-Blalock method is a "weak " form of path analysis, whereas more information can be deduced by using path analysis. The Driver-Massey data, examined earlier by the Simon-Blalock method
The Decomposition of Effects in Path Analysis
- American Sociological Review
, 1975
"... of a JSTOR transmission may be copied, downloaded, stored, further transmitted, transferred, distributed, altered, or otherwise used, in any form or by any means, except: (1) one stored electronic and one paper copy of any article solely for your personal, non-commercial use, or (2) with prior writt ..."
Abstract
-
Cited by 139 (3 self)
- Add to MetaCart
of a JSTOR transmission may be copied, downloaded, stored, further transmitted, transferred, distributed, altered, or otherwise used, in any form or by any means, except: (1) one stored electronic and one paper copy of any article solely for your personal, non-commercial use, or (2) with prior written permission of JSTOR and the publisher of the article or other text. Each copy of any part of a JSTOR transmission must contain the same copyright notice that appears on the screen or printed page of such transmission. American Sociological Review is published by American Sociological Association. Please contact the publisher for further permissions regarding the use of this work. Publisher contact information may be obtained at
Path Analysis
"... Part of the Psychology Commons This Article is brought to you for free and open access by the Department of Psychology at Scholarship at UWindsor. It has been accepted for inclusion in Psychology Publications by an authorized administrator of Scholarship at UWindsor. For more information, please con ..."
Abstract
- Add to MetaCart
Part of the Psychology Commons This Article is brought to you for free and open access by the Department of Psychology at Scholarship at UWindsor. It has been accepted for inclusion in Psychology Publications by an authorized administrator of Scholarship at UWindsor. For more information, please contact
Path analysis
"... Contents lists available at ScienceDirect Addictive BAdolescence is the key period in which alcohol use is initiated; the quantity of alcohol consumption increases, and drinking problems ..."
Abstract
- Add to MetaCart
Contents lists available at ScienceDirect Addictive BAdolescence is the key period in which alcohol use is initiated; the quantity of alcohol consumption increases, and drinking problems
Critical Path Analysis of TCP Transactions
- IEEE/ACM Transactions on Networking
, 2000
"... Improving the performance of data transfers in the Internet (such as Web transfers) requires a detailed understanding of when and how delays are introduced. Unfortunately, the complexity of data transfers like those using HTTP is great enough that identifying the precise causes of delays is difficul ..."
Abstract
-
Cited by 89 (3 self)
- Add to MetaCart
is difficult. In this paper we describe a method for pinpointing where delays are introduced into applications like HTTP by using critical path analysis. By constructing and pro ling the critical path, it is possible to determine what fraction of total transfer latency is due to packet propagation, network
A comparative analysis of selection schemes used in genetic algorithms
- Foundations of Genetic Algorithms
, 1991
"... This paper considers a number of selection schemes commonly used in modern genetic algorithms. Specifically, proportionate reproduction, ranking selection, tournament selection, and Genitor (or «steady state") selection are compared on the basis of solutions to deterministic difference or d ..."
Abstract
-
Cited by 531 (31 self)
- Add to MetaCart
or differential equations, which are verified through computer simulations. The analysis provides convenient approximate or exact solutions as well as useful convergence time and growth ratio estimates. The paper recommends practical application of the analyses and suggests a number of paths for more detailed
A simple cooperative diversity method based on network path selection
- IEEE J. SELECT. AREAS COMMUN
, 2006
"... Cooperative diversity has been recently proposed as a way to form virtual antenna arrays that provide dramatic gains in slow fading wireless environments. However, most of the proposed solutions require distributed space–time coding algorithms, the careful design of which is left for future investi ..."
Abstract
-
Cited by 452 (14 self)
- Add to MetaCart
. The success (or failure) to select the best available path depends on the statistics of the wireless channel, and a methodology to evaluate performance for any kind of wireless channel statistics, is provided. Information theoretic analysis of outage probability shows that our scheme achieves the same
Model Checking Programs
, 2003
"... The majority of work carried out in the formal methods community throughout the last three decades has (for good reasons) been devoted to special languages designed to make it easier to experiment with mechanized formal methods such as theorem provers, proof checkers and model checkers. In this pape ..."
Abstract
-
Cited by 592 (63 self)
- Add to MetaCart
environment for Java, called Java PathFinder (JPF), which integrates model checking, program analysis and testing. Part of this work has consisted of building a new Java Virtual Machine that interprets Java bytecode. JPF uses state compression to handle big states, and partial order and symmetry reduction
Token flow control
"... As companies move towards many-core chips, an efficient onchip communication fabric to connect these cores assumes critical importance. To address limitations to wire delay scalability and increasing bandwidth demands, state-of-the-art on-chip networks use a modular packet-switched design with route ..."
Abstract
-
Cited by 635 (35 self)
- Add to MetaCart
/delay. In this work, we propose token flow control (TFC), a flow control mechanism in which nodes in the network send out tokens in their local neighborhood to communicate information about their available resources. These tokens are then used in both routing and flow control: to choose less congested paths
A new approach to the maximum flow problem
- JOURNAL OF THE ACM
, 1988
"... All previously known efficient maximum-flow algorithms work by finding augmenting paths, either one path at a time (as in the original Ford and Fulkerson algorithm) or all shortest-length augmenting paths at once (using the layered network approach of Dinic). An alternative method based on the pre ..."
Abstract
-
Cited by 672 (33 self)
- Add to MetaCart
to be shortest paths. The algorithm and its analysis are simple and intuitive, yet the algorithm runs as fast as any other known method on dense. graphs, achieving an O(n³) time bound on an n-vertex graph. By incorporating the dynamic tree data structure of Sleator and Tarjan, we obtain a version
Results 1 - 10
of
16,325