The pioneering study by Bowman [1980) reawakened interest in risk and return relations in the strategic management literature. We do not examine this literature here because we have elsewhere reviewed it in detail 1 a...
详细信息
ISBN:
(数字)9783642606632
ISBN:
(纸本)9783642644993
The pioneering study by Bowman [1980) reawakened interest in risk and return relations in the strategic management literature. We do not examine this literature here because we have elsewhere reviewed it in detail 1 and because, for the most part, these studies have been confined to ex post data. Discussions of the strategies which subjects used to direct their ex ante evaluations of risks and returns have either been omitted or else have been only indirectly inferred from ex post data. In addition, with few exceptions, this literature does not attempt to ascertain the meanings that might have been assigned by subjects to terms like "risk" and/or the "returns" with which they have been concerned. Even fewer of these studies have attempted to ascertain how the subjects implemented their definitions en of prospective strategies. Thus, tius literature may route to arriving at evaluations best be regarded as bearing only indirect relations to the present study which is concerned not only with the meanings assigned to terms like "risk" and "return" but also with how these terms are used in arriving at risk and return evaluations of proposed strategies as well as how they are measured and used, on an ex ante basis en route to seeing how these evaluations match with ex post performance. In a sense, one part of this study--i. e.
The first part of this preface is for the student; the second for the instructor. But whoever you are, welcome to both parts. For the Student You have finished secondary school, and are about to begin at a university ...
详细信息
ISBN:
(数字)9781846288456
The first part of this preface is for the student; the second for the instructor. But whoever you are, welcome to both parts. For the Student You have finished secondary school, and are about to begin at a university or technical college. You want to study computing. The course includes some mathematics { and that was not necessarily your favourite subject. But there is no escape: some finite mathematics is a required part of the first year curriculum. That is where this book comes in. Its purpose is to provide the basics { the essentials that you need to know to understand the mathematical language that is used in computer and information science. It does not contain all the mathematics that you will need to look at through the several years of your undergraduate career. There are other very good, massive volumes that do that. At some stage you will probably find it useful to get one and keep it on your shelf for reference. But experience has convinced this author that no matter how good the compendia are, beginning students tend to feel intimidated, lost, and unclear about what parts to focus on. This short book, on the other hand, offers just the basics which you need to know from the beginning, and on which you can build further when needed.
This book constitutes the refereed proceedings of the Third International Conference on Information Computing and Applications, ICICA 2012, held in Chengde, China, in September 2012. The 100 revised full papers were c...
详细信息
ISBN:
(数字)9783642340628
ISBN:
(纸本)9783642340611
This book constitutes the refereed proceedings of the Third International Conference on Information Computing and Applications, ICICA 2012, held in Chengde, China, in September 2012. The 100 revised full papers were carefully reviewed and selected from 1089 submissions. The papers are organized in topical sections on internet computing and applications, multimedia networking and computing, intelligent computing and applications, computational statistics and applications, cloud and evolutionary computing, computer engineering and applications, knowledge management and applications, communication technology and applications.
This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017.;The 12 full papers were carefully...
详细信息
ISBN:
(数字)9783319720890
ISBN:
(纸本)9783319720883
This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017.;The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.
One of the superb characteristics of Intelligent Data Analysis (IDA) is that it is an interdisciplinary ?eld in which researchers and practitioners from a number of areas are involved in a typical project. This also c...
详细信息
ISBN:
(数字)9783540319269
ISBN:
(纸本)9783540287957
One of the superb characteristics of Intelligent Data Analysis (IDA) is that it is an interdisciplinary ?eld in which researchers and practitioners from a number of areas are involved in a typical project. This also creates a challenge in which the success of a team depends on the participation of users and domain experts who need to interact with researchers and developers of any IDA system. All this is usually re?ected in successful projects and of course on the papers that were evaluated by this year’s program committee from which the ?nal program has been developed. In our call for papers, we solicited papers on (i) applications and tools, (ii) theory and general principles, and (iii) algorithms and techniques. We received a total of 184 papers, reviewing these was a major challenge. Each paper was assigned to three reviewers. In the end 46 papers were accepted, which are all included in the proceedings and presented at the conference. This year’s papers re?ect the results of applied and theoretical researchfrom a number of disciplines all of which are related to the ?eld of Intelligent Data Analysis. To have the best combination of theoretical and applied research and also provide the best focus, we have divided this year’s IDA program into tu- rials, invited talks, panel discussions and technical sessions.
The computers and Games (CG) series began in 1998 with the objective of showcasing new developments in arti?cial intelligence (AI) research that used games as the experimental test-bed. The ?rst two CG conferences wer...
详细信息
ISBN:
(数字)9783540400318
ISBN:
(纸本)9783540205456
The computers and Games (CG) series began in 1998 with the objective of showcasing new developments in arti?cial intelligence (AI) research that used games as the experimental test-bed. The ?rst two CG conferences were held at Hamamatsu,Japan(1998,2000).computersandGames2002(CG2002)wasthe third event in this biennial series. The conference was held at the University of Alberta(Edmonton,Alberta,Canada),July25–27,*** of the main conference featuring refereed papers and keynote speakers, as well as several side events including the Games Informatics Workshop, the Agents in computer Games Workshop, the Trading Agents Competition, and the North American computer Go Championship. CG 2002 attracted 110 participants from over a dozen countries. Part of the successoftheconferencewasthatitwasco-locatedwiththeNationalConference of the American Association for Arti?cial Intelligence (AAAI), which began in Edmonton just as CG 2002 ended. The CG 2002 program had 27 refereed paper presentations. The papers ranged over a wide variety of AI-related topics including search, knowledge, learning, planning, and combinatorial game theory. Research test-beds included one-player games (blackjack, sliding-tile puzzles, Sokoban), two-player games (Amazons, awari, chess, Chinese chess, clobber, Go, Hex, Lines of Action, O- ello, shogi), multi-player games (Chinese checkers, cribbage, Diplomacy, hearts, spades), commercial games (role-playing games, real-time strategy games), and novel applications (Post’s Correspondence Problem).
This book constitutes the refereed proceedings of the 7th International Symposium on Algorithmic Game Theory, SAGT 2014, held in Haifa, Israel, in October 2014. The 24 full papers and 5 short papers presented were car...
详细信息
ISBN:
(数字)9783662448038
ISBN:
(纸本)9783662448021
This book constitutes the refereed proceedings of the 7th International Symposium on Algorithmic Game Theory, SAGT 2014, held in Haifa, Israel, in October 2014. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 65 submissions. They cover various important aspects of algorithmic game theory, such as matching theory, game dynamics, games of coordination, networks and social choice, markets and auctions, price of anarchy, computational aspects of games, mechanism design and auctions.
This book constitutes the refereed proceedings of the 21st International Conference on Analytical and Stochastic Modelling Techniques and Applications, ASMTA 2014, held in Budapest, Hungary, in June/July 2014. The 18 ...
详细信息
ISBN:
(数字)9783319082196
ISBN:
(纸本)9783319082189
This book constitutes the refereed proceedings of the 21st International Conference on Analytical and Stochastic Modelling Techniques and Applications, ASMTA 2014, held in Budapest, Hungary, in June/July 2014. The 18 papers presented were carefully reviewed and selected from 27 submissions. The papers discuss the latest developments in analytical, numerical and simulation algorithms for stochastic systems, including Markov processes, queueing networks, stochastic Petri nets, process algebras, game theory, etc.
暂无评论