Results 41 to 50 of about 24,781 (241)

From Ecosystem Threats to Balance Sheets: Biodiversity Risks Exposure and Corporate Cash Policies

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This study investigates how firms strategically respond to biodiversity risk by examining their cash holding decisions. Using firm‐level data from China, we find that firm‐level biodiversity risk exposure significantly increases corporate cash holdings.
Jing Hao   +4 more
wiley   +1 more source

Multi-Agent Deep-Q Network-Based Cache Replacement Policy for Content Delivery Networks

open access: yesFuture Internet
In today’s digital landscape, content delivery networks (CDNs) play a pivotal role in ensuring rapid and seamless access to online content across the globe.
Janith K. Dassanayake   +3 more
doaj   +1 more source

Location-aware cache replacement for mobile environments [PDF]

open access: yes, 2004
Traditional cache replacement policies rely on the temporal locality of users' access pattern to improve cache performance. These policies, however, are not ideal in supporting mobile clients.
Bertok, P, Lai, K, Tari, Z
core  

Using Grouped Linear Prediction and Accelerated Reinforcement Learning for Online Content Caching

open access: yes, 2018
Proactive caching is an effective way to alleviate peak-hour traffic congestion by prefetching popular contents at the wireless network edge. To maximize the caching efficiency requires the knowledge of content popularity profile, which however is often ...
Tao, Meixia, Zhang, Naifu, Zheng, Kaibin
core   +1 more source

Reputational Risk: An Investigation Into How Environmental Failures Drive Stock Price Crashes

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT The study examines the relationship between stock price crashes and firm environment reputational risk. Using a large sample of US listed firms, covering a time span from 2007 to 2021, we test the effect of environmental reputation risk on three measures for the stock price crash risk (NEGCSK, DRUV, and CRASH).
Man Dang   +4 more
wiley   +1 more source

Toward Edge-Assisted Video Content Intelligent Caching With Long Short-Term Memory Learning

open access: yesIEEE Access, 2019
Nowadays video content has contributed to the majority of Internet traffic, which brings great challenge to the network infrastructure. Fortunately, the emergence of edge computing has provided a promising way to reduce the video load on the network by ...
Cong Zhang   +6 more
doaj   +1 more source

Barriers and Enablers of Circular Economy in Electrical and Electronic Equipment: A Systematic Literature Review

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT Rapid technological change, shorter lifecycles and rising demand for electrical and electronic equipment (EEE) are increasing waste electrical and electronic equipment (WEEE) and emphasise the need for a circular economy. This paper identifies barriers and enablers of the circular transition in EEE and outlines interventions.
Aya Abdelmeguid, Lucia Corsini
wiley   +1 more source

Full Dollarisation and Economic Performance Revisited

open access: yesInternational Journal of Finance &Economics, EarlyView.
ABSTRACT This paper examines the economic performance of fully dollarised economies compared to those with alternative monetary regimes. Using an extensive dataset covering 192 countries from 1980 to 2021, we employ a variety of econometric techniques, including joint maximum likelihood and propensity score matching, to address endogeneity and ...
John Thornton, Chrysovalantis Vasilakis
wiley   +1 more source

Exploring Adaptive Cache for Reconfigurable VLIW Processor

open access: yesIEEE Access, 2019
In this paper, we focus on a very long instruction word (VLIW) processor design that “shares” its cache blocks when switching to different performance modes to alleviate the aforementioned cold starts.
Sensen Hu, Jing Haung
doaj   +1 more source

THE MINIMIZATING OF LOGICAL SCHEME FOR IMPLEMENTATION OF PSEUDO LRU BY INTER-TYPE TRANSITION IN TRIGGER STRUCTURES

open access: yesРадіоелектронні і комп'ютерні системи, 2020
The principle of program control means that the processor core turns to the main memory of the computer for operands or instructions. According to architectural features, operands are stored in data segments, and instructions are stored in code segments ...
Вадим Олексійович Пуйденко   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy