Results 151 to 160 of about 22,093 (250)

Transfer learning with XAI for robust malware and IoT network security. [PDF]

open access: yesSci Rep
Almadhor A   +6 more
europepmc   +1 more source

When does category spanning hurt or help producers?

open access: yesStrategic Management Journal, EarlyView.
Abstract Research Summary Scholars have theorized many factors shaping whether category spanning helps or hurts producers. We first synthesize evidence by meta‐analyzing 25 years of empirical research, which reveals a null effect of spanning on average, yet with significant subsample heterogeneity. To unpack it, we theorize and find that spanning hurts
Jungsoo Ahn   +2 more
wiley   +1 more source

From armed roots to airline routes in South America: A dual imprinting perspective

open access: yesStrategic Management Journal, EarlyView.
Abstract Reserch Summary We propose that founding partner relationships can leave distinct imprints on organizations that differ in durability and in how they respond to subsequent changes involving the founding partner. Examining South American airlines founded between 1919 and 1984, we argue and find that such relationships simultaneously create an ...
Kunyuan Qiao   +2 more
wiley   +1 more source

X9: An Obfuscation Resilient Approach for Source Code Plagiarism Detection in Virtual Learning Environments

open access: yesProceedings of the 20th International Conference on Enterprise Information Systems, 2018
Bruno O. Prado   +2 more
openaire   +1 more source

Collaboration post‐acquisition: The role of acquirers' motives

open access: yesStrategic Management Journal, EarlyView.
Abstract Research Summary What role do collaborations with a target's partners play in an acquisition, and how do these collaborations evolve post‐acquisition? Research suggests that these collaborations are an important reason to acquire but often diminish post‐acquisition. But if they tend to diminish, why are they a reason to acquire?
Henning Piezunka   +3 more
wiley   +1 more source

MeAJOR: Merged email assets from joint open-source repositories. [PDF]

open access: yesData Brief
Cardoso F   +4 more
europepmc   +1 more source

On the Effectiveness of Source Code Transformations for Binary Obfuscation.

open access: yes, 2006
Madou, Matias   +5 more
openaire   +1 more source

Funding, Facilities, and the Face of Homelessness: Heterogeneous Impacts of Federal Grants on Sheltered and Unsheltered Counts

open access: yesSouthern Economic Journal, EarlyView.
ABSTRACT This paper examines the causal impact of federal homeless‐assistance grants on reported homelessness and shelter capacity across 370 Continuums of Care in 2019. We exploit cross‐sectional variation in pre‐1940 housing shares, used in Community Development Block Grant formula allocations, as an instrument for combined CoC and Emergency ...
Luke Maddock, Anita Alves Pena
wiley   +1 more source

Home - About - Disclaimer - Privacy