Results 1  10
of
2,771
Term Premia and Interest Rate Forecasts in Affine Models
, 2001
"... I find that the standard class of a#ne models produces poor forecasts of future changes in Treasury yields. Better forecasts are generated by assuming that yields follow random walks. The failure of these models is driven by one of their key features: The compensation that investors receive for faci ..."
Abstract

Cited by 454 (13 self)
 Add to MetaCart
I find that the standard class of a#ne models produces poor forecasts of future changes in Treasury yields. Better forecasts are generated by assuming that yields follow random walks. The failure of these models is driven by one of their key features: The compensation that investors receive
Stock Market Prices Do Not Follow Random Walks: Evidence from a Simple Specification Test
 REVIEW OF FINANCIAL STUDIES
, 1988
"... In this article we test the random walk hypothesis for weekly stock market returns by comparing variance estimators derived from data sampled at different frequencies. The random walk model is strongly rejected for the entire sample period (19621985) and for all subperiod for a variety of aggrega ..."
Abstract

Cited by 517 (17 self)
 Add to MetaCart
In this article we test the random walk hypothesis for weekly stock market returns by comparing variance estimators derived from data sampled at different frequencies. The random walk model is strongly rejected for the entire sample period (19621985) and for all subperiod for a variety
Search and replication in unstructured peertopeer networks
, 2002
"... Abstract Decentralized and unstructured peertopeer networks such as Gnutella are attractive for certain applicationsbecause they require no centralized directories and no precise control over network topologies and data placement. However, the floodingbased query algorithm used in Gnutella does n ..."
Abstract

Cited by 692 (6 self)
 Add to MetaCart
propose a query algorithm based on multiple random walks that resolves queries almost as quickly as gnutella's flooding method while reducing the network traffic by two orders of magnitude in many cases. We also present a distributed replication strategy that yields closetooptimal performance
A model of growth through creative destruction
, 1990
"... This paper develops a model based on Schumpeter's process of creative destruction. It departs from existing models of endogeneous growth in emphasizing obsolescence of old technologies induced by the accumulation of knowledge and the resulting process or industrial innovations. This has both ..."
Abstract

Cited by 1941 (27 self)
 Add to MetaCart
the log of GNP follows a random walk with drift. The size of the drift is the average growth rate of the economy and it is endogeneous to the model; in particular it depends on the size and likilihood of innovations resulting from research and also on the degree of market power available to an innovator.
Loopy belief propagation for approximate inference: An empirical study. In:
 Proceedings of Uncertainty in AI,
, 1999
"... Abstract Recently, researchers have demonstrated that "loopy belief propagation" the use of Pearl's polytree algorithm in a Bayesian network with loops can perform well in the context of errorcorrecting codes. The most dramatic instance of this is the near Shannonlimit performanc ..."
Abstract

Cited by 676 (15 self)
 Add to MetaCart
to converge if none of the beliefs in successive iterations changed by more than a small threshold (104). All messages were initialized to a vector of ones; random initializa tion yielded similar results, since the initial conditions rapidly get "washed out" . For comparison, we also implemented
Testing ContinuousTime Models of the Spot Interest Rate
 Review of Financial Studies
, 1996
"... Different continuoustime models for interest rates coexist in the literature. We test parametric models by comparing their implied parametric density to the same density estimated nonparametrically. We do not replace the continuoustime model by discrete approximations, even though the data are rec ..."
Abstract

Cited by 310 (9 self)
 Add to MetaCart
are recorded at discrete intervals. The principal source of rejection of existing models is the strong nonlinearity of the drift. Around its mean, where the drift is essentially zero, the spot rate behaves like a random walk. The drift then meanreverts strongly when far away from the mean. The volatility
Fast random walk with restart and its applications
 In ICDM ’06: Proceedings of the 6th IEEE International Conference on Data Mining
, 2006
"... How closely related are two nodes in a graph? How to compute this score quickly, on huge, diskresident, real graphs? Random walk with restart (RWR) provides a good relevance score between two nodes in a weighted graph, and it has been successfully used in numerous settings, like automatic captionin ..."
Abstract

Cited by 179 (19 self)
 Add to MetaCart
How closely related are two nodes in a graph? How to compute this score quickly, on huge, diskresident, real graphs? Random walk with restart (RWR) provides a good relevance score between two nodes in a weighted graph, and it has been successfully used in numerous settings, like automatic
What is the Best MultiStage Architecture for Object Recognition?
"... In many recent object recognition systems, feature extraction stages are generally composed of a filter bank, a nonlinear transformation, and some sort of feature pooling layer. Most systems use only one stage of feature extraction in which the filters are hardwired, or two stages where the filter ..."
Abstract

Cited by 252 (22 self)
 Add to MetaCart
accuracy on object recognition benchmarks. We show that two stages of feature extraction yield better accuracy than one. Most surprisingly, we show that a twostage system with random filters can yield almost 63 % recognition rate on Caltech101, provided that the proper nonlinearities and pooling layers
The Security of the Cipher Block Chaining Message Authentication Code
, 2000
"... Let F be some block cipher (eg., DES) with block length l. The Cipher Block Chaining Message Authentication Code (CBC MAC) specifies that an mblock message x: Xl...xm be authenticated among parties who share a secret key a for the block cipher by tagging x with a prefix of ym, where Y0: 01 and Y ..."
Abstract

Cited by 240 (41 self)
 Add to MetaCart
and Yi: Fa(miYi1) for i: 1,2,...,m. This method is a pervasively used international and U.S. standard. We provide its first formal justification, showing the following general lemma: cipher block chaining a pseudorandom function yields a pseudorandom function. Underlying our results is a technical
Stochastic Completion Fields: A Neural Model of Illusory Contour Shape and Salience
 Neural Computation
, 1995
"... We describe an algorithm and representation level theory of illusory contour shape and salience. Unlike previous theories, our model is derived from a single assumption namely, that the prior probability distribution of boundary completion shape can be modeled by a random walk in a lattice whose ..."
Abstract

Cited by 210 (14 self)
 Add to MetaCart
particle following a random walk will pass through a given position and orientation on a path joining two boundary fragments can be computed directly as the product of two vectorfield convolutions. We show that for the random walk we define, the maximum likelihood paths are curves of least energy, that is
Results 1  10
of
2,771