Results 101 to 110 of about 453,973 (330)

Models in Decision‐Making Under Risk and Uncertainty

open access: yesJournal of Economic Surveys, EarlyView.
ABSTRACT This paper systematically compares dominant frameworks for modeling decision‐making under risk and uncertainty, evaluating their theoretical trade‐offs and practical relevance for economic research. We establish key criteria for model selection—including predictive accuracy, descriptive realism, computational tractability, and ecological ...
Martin Höppner
wiley   +1 more source

TC: Optimizing compiler

open access: yesSoftwareX
In scientific codes, particularly those used in simulations, the majority of execution time is consumed by the processing of program loops. However, the ordering of statement instances constituting a loop nest, which arises from its naive, typically hand-
Piotr Skotnicki
doaj   +1 more source

Price Indices Rekindled, 1970s–1990s: Theory and Practice at Cross Purposes?

open access: yesJournal of Economic Surveys, EarlyView.
ABSTRACT This paper revisits the discussions on price indices during a period marked by theoretical advancements and practical challenges in measuring inflation. Index‐number theorists sought to improve accuracy, yet national statistical offices largely maintained established practices due to concerns over data availability, stability, and public trust.
Victor Cruz‐e‐Silva, Bert M. Balk
wiley   +1 more source

Algebraic structures for transitive closure

open access: yesTheoretical Computer Science, 1977
AbstractClosed semi-rings and the closure of matrices over closed semi-rings are defined and studied. Closed semi-rings are structures weaker than the structures studied by Conway [3] and Aho, Hopcroft and Ullman [1]. Examples of closed semi-rings and closure operations are given, including the case of semi-rings on which the closure of an element is ...
openaire   +1 more source

Kinship‐based deference among Jaru siblings: A collaborative, adaptive, and multimodal accomplishment

open access: yesJournal of Linguistic Anthropology, EarlyView.
Abstract In the Jaru community of northern Western Australia, certain in‐laws and relatives are categorized as being in a highly respectful relationship in which they are expected to pay deference to one another. This conversation‐analytic study closely examines the deferential practices that are used among three Jaru siblings in an ordinary multi ...
Josua Dahmen
wiley   +1 more source

Status Transfer across Borders: The Mediating Role of Common Partners in First Entry

open access: yesJournal of Management Studies, EarlyView.
Abstract Recent studies on organizational status and international business (IB) have found evidence for the transferability of status to new markets by showing that, at least under certain circumstances, network status in the home market affects a firm's entry into and performance in new foreign markets; however, the status transfer mechanisms in ...
Yu Liu, Markku Maula, Brian C. Pinkham
wiley   +1 more source

Ripples in the Pond: Product Portfolio Reconfiguration and Dynamism in the Competitive Environment

open access: yesJournal of Management Studies, EarlyView.
Abstract The management literature often overlooks how firms can alter the competitive landscape without introducing groundbreaking changes or innovations. Applying the awareness, motivation, and capability framework from competitive dynamics, we posit that as a firm intensifies its product portfolio reconfiguration, its rivals become increasingly ...
Christopher Jung   +2 more
wiley   +1 more source

Does Computer‐Assisted Surgery Improve the Accuracy of Immediate Implant Placement? A Systematic Review and Network Meta‐Analysis

open access: yesJournal of Periodontal Research, EarlyView.
Computer‐assisted implant surgery (CAIS) enhances accuracy in immediate implant placement (IIP) compared to freehand, with no significant difference between CAIS techniques. The flapless technique is mainly used in IIP, reducing invasiveness and treatment time.
Lucia Schiavon   +4 more
wiley   +1 more source

Incremental clustering method based on Gaussian mixture model to identify malware family

open access: yesTongxin xuebao, 2019
Aiming at the logical similarity of the behavioral characteristics of malware belonging to the same family,the characteristics of malware were extracted by tracking the logic rules of API function call from the perspective of behavior detection,and the ...
Jianwei HU   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy