• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 27,876
Next 10 →

A Case for End System Multicast

by Yang-hua Chu, Sanjay G. Rao, Srinivasan Seshan, Hui Zhang - in Proceedings of ACM Sigmetrics , 2000
"... Abstract — The conventional wisdom has been that IP is the natural protocol layer for implementing multicast related functionality. However, more than a decade after its initial proposal, IP Multicast is still plagued with concerns pertaining to scalability, network management, deployment and suppor ..."
Abstract - Cited by 1290 (24 self) - Add to MetaCart
Abstract — The conventional wisdom has been that IP is the natural protocol layer for implementing multicast related functionality. However, more than a decade after its initial proposal, IP Multicast is still plagued with concerns pertaining to scalability, network management, deployment

FFTW: An Adaptive Software Architecture For The FFT

by Matteo Frigo, Steven G. Johnson , 1998
"... FFT literature has been mostly concerned with minimizing the number of floating-point operations performed by an algorithm. Unfortunately, on present-day microprocessors this measure is far less important than it used to be, and interactions with the processor pipeline and the memory hierarchy have ..."
Abstract - Cited by 602 (4 self) - Add to MetaCart
FFT literature has been mostly concerned with minimizing the number of floating-point operations performed by an algorithm. Unfortunately, on present-day microprocessors this measure is far less important than it used to be, and interactions with the processor pipeline and the memory hierarchy have

Self-Similarity Through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level

by Walter Willinger, Murad S. Taqqu, Robert Sherman, Daniel V. Wilson - IEEE/ACM TRANSACTIONS ON NETWORKING , 1997
"... A number of recent empirical studies of traffic measurements from a variety of working packet networks have convincingly demonstrated that actual network traffic is self-similar or long-range dependent in nature (i.e., bursty over a wide range of time scales) -- in sharp contrast to commonly made tr ..."
Abstract - Cited by 743 (24 self) - Add to MetaCart
analyses of real-time traffic measurements from Ethernet LAN's at the level of individual sources. This paper is an extended version of [53] and differs from it in significant ways. In particular, we develop here the mathematical results concerning the superposition of strictly alternating ON

The Construct of Resilience: A Critical Evaluation and Guidelines for Future Work.

by Suniya S Luthar , Dante Cicchetti , Bronwyn Becker - Child Development, , 2000
"... This paper presents a critical appraisal of resilience, a construct connoting the maintenance of positive adaptation by individuals despite experiences of significant adversity. As empirical research on resilience has burgeoned in recent years, criticisms have been levied at work in this area. Thes ..."
Abstract - Cited by 495 (8 self) - Add to MetaCart
This paper presents a critical appraisal of resilience, a construct connoting the maintenance of positive adaptation by individuals despite experiences of significant adversity. As empirical research on resilience has burgeoned in recent years, criticisms have been levied at work in this area

From Data Mining to Knowledge Discovery in Databases.

by Usama Fayyad , Gregory Piatetsky-Shapiro , Padhraic Smyth - AI Magazine, , 1996
"... ■ Data mining and knowledge discovery in databases have been attracting a significant amount of research, industry, and media attention of late. What is all the excitement about? This article provides an overview of this emerging field, clarifying how data mining and knowledge discovery in database ..."
Abstract - Cited by 538 (0 self) - Add to MetaCart
■ Data mining and knowledge discovery in databases have been attracting a significant amount of research, industry, and media attention of late. What is all the excitement about? This article provides an overview of this emerging field, clarifying how data mining and knowledge discovery

Measuring the information content of stock trades

by Joel Hasbrouck - Journal of Finance , 1991
"... This paper suggests that the interactions of security trades and quote revisions be modeled as a vector autoregressive system. Within this framework, a trade's information effect may be meaningfully measured as the ultimate price impact of the trade innovation. Estimates for a sample of NYSE is ..."
Abstract - Cited by 469 (11 self) - Add to MetaCart
significant for smaller firms. CENTRALTO THE ANALYSIS of market microstructure is the notion that in a market with asymmetrically informed agents, trades convey information and therefore cause a persistent impact on the security price. The magnitude of the price effect for a given trade size is generally held

A Secure Environment for Untrusted Helper Applications -- Confining the Wily Hacker

by Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer
"... Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are usually too complex to be bug-free. This raises si ..."
Abstract - Cited by 462 (7 self) - Add to MetaCart
significant security concerns. Therefore, it is desirable to create a secure environment to contain untrusted helper applications. We propose to reduce therisk of a security breachby restricting the program's access to the operating system. In particular, we intercept and filter dangerous system calls

Reconsidering research on learning from media.

by Richard E Clark - Review of Educational Research, , 1983
"... ABSTRACT. Recent meta-analyses and other studies of media influence on learning are reviewed. Consistent evidence is found for the generalization that there are no learning benefits to be gained from employing any specific medium to deliver instruction. Research showing performance or time-saving g ..."
Abstract - Cited by 462 (6 self) - Add to MetaCart
-saving gains from one or another medium are shown to be vulnerable to compelling rival hypotheses concerning the uncontrolled effects of instructional method and novelty. Problems with current media attribute and symbol system theories are described and suggestions made for more promising research directions

Perceived locus of causality and internalization: Examining reasons for acting in two domains.

by Richard M Ryan , James P Connell , Rachel Avery , Wendy Grolnick , John Lynch , Christina Frederick , Cynthia Mellor-Crummey , James Wellborn , Elizabeth Whitehead , Edward Deci - Journal of Personality and Social Psychology, , 1989
"... Theories of internalization typically suggest that self-perceptions of the "causes" of(i.e., reasons for) behavior are differentiated along a continuum of autonomy that contains identifiable gradations. A model of perceived locus of causality (PLOC) is developed, using children's sel ..."
Abstract - Cited by 401 (24 self) - Add to MetaCart
and conceptualization of PLOC are discussed with regard to intrapersonal versus interpersonal perception, internalization, causereason distinctions, and the significance of perceived autonomy in human behavior. A central issue for theories of motivation concerns the perceived locus relative to the person of variables

Assessing the contribution of venture capital to innovation

by Samuel Kortum, Josh Lerner - Rand Journal of Economics , 2000
"... We examine the influence of venture capital on patented inventions in the United States across twenty industries over three decades. We address concerns about causality in several ways, including exploiting a 1979 policy shift that spurred venture capital fundraising. We find that increases in ventu ..."
Abstract - Cited by 356 (34 self) - Add to MetaCart
We examine the influence of venture capital on patented inventions in the United States across twenty industries over three decades. We address concerns about causality in several ways, including exploiting a 1979 policy shift that spurred venture capital fundraising. We find that increases
Next 10 →
Results 1 - 10 of 27,876
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University