نتایج جستجو برای: proxy model

تعداد نتایج: 2124051  

2011
Amil Dasgupta Konstantinos E. Zachariadis

Mutual funds hold large blocks of shares in many major corporations. Practitioners and regulators alike have been concerned that mutual funds use their proxy votes in a promanagement manner in order to garner lucrative pensions administration contracts, thus hindering shareholder value. Such concerns led the SEC to mandate the disclosure of mutual fund proxy votes starting in 2003. We present a...

2006
Christian P. Fries Mark S. Joshi Christian Fries Mark Joshi

We consider a generic framework which allows to calculate robust Monte-Carlo sensitivities seamlessly through simple finite difference approximation. The method proposed is a generalization and improvement of the proxy simulation scheme method (Fries and Kampen, 2005). As a benchmark we apply the method to the pricing of digital caplets and target redemption notes using LIBOR and CMS indices un...

1997
Beng-Hong Lim Philip Heidelberger Pratap Pattnaik Marc Snir

This research addresses the problem ofproviding eficient, protected communication in an SMPcluster without incurring the overhead of system calls or the cost of custom hardware. It anafyzes an approach that uses an idle SMP processor to run a message proxy, a communication process that provides protected access to the nemork. We implement message proxy based communication between a pair of IBM ...

2012
S. F. M. Breitenbach K. Rehfeld B. Goswami J. U. L. Baldini H. E. Ridley D. J. Kennett K. M. Prufer V. V. Aquino

Reliable age models are fundamental for any palaeoclimate reconstruction. Available interpolation procedures between age control points are often inadequately reported, and very few translate age uncertainties to proxy uncertainties. Most available modeling algorithms do not allow incorporation of layer counted intervals to improve the confidence limits of the age model in question. We present ...

Journal: :Paleoceanography and paleoclimatology 2023

The Eocene-Oligocene transition (EOT) marks the shift from greenhouse to icehouse conditions at 34 Ma, when a permanent ice sheet developed on Antarctica. Climate modeling studies have recently assessed drivers of globally. Here we revisit those experiments for detailed study southern high latitudes in comparison growing number mean annual sea surface temperature (SST) and air (MAT) proxy recon...

2012
Anna R. McGaraghan Raphael M. Kudela

[1] Owing to the difficulties inherent in measuring trace metals and the importance of iron as a limiting nutrient for biological systems, the ability to monitor particulate iron concentration remotely is desirable. This study examines the relationship between labile particulate iron, described here as weak acid leachable particulate iron or total dissolvable iron, and easily obtained bio-optic...

Journal: :Telecommunication Systems 1999
Tony Przygienda Patrick Droz Colin H. West

ATM networks often carry other popular communication protocols such as TCP/IP. LAN emulation techniques, with LANE and MPOA being the most prominent ones, make it possible to support existing applications, but do not take advantage of many ATM capabilities. Furthermore, such server-based solutions often suffer from single point of failure problems. PNNI Augmented Routing (PAR), based on Private...

Journal: :J. Internet Serv. Inf. Secur. 2011
Sébastien Canard Julien Devigne Fabien Laguillaumie

A proxy re-encryption (PRE) scheme allows a designated proxy, that has beforehand received a so-called re-encryption key, to translate a ciphertext intended to one user to a ciphertext intended to another one. Traditionally, the re-encryption key is generated at the initiative of the initial receiver and ideally, no secret keys should be known to the proxy. Such scheme is said unidirectional if...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید