Edu-sharing

Results: 3043



#Item
331Finance / Money / Economy / Investment / Financial services / Prospect theory / Hedge fund / Investment management / Futures contract / Cumulative prospect theory / Behavioral economics / Management fee

PROFIT SHARING IN HEDGE FUNDS Xue Dong He∗ and Steven Kou† June 21, 2016 Abstract In a new scheme for hedge fund managerial compensation known as the first-loss scheme,

Add to Reading List

Source URL: www.rmi.nus.edu.sg

Language: English - Date: 2016-06-21 01:04:20
332Computing / Reputation management / Collaboration / Distributed data storage / File sharing / Peer-to-peer computing / Concurrent computing / EigenTrust / Intellectual property law / Peer-to-peer / Distributed hash table / Scalability

The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D. Kamvar Mario T. Schlosser

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-11-08 11:14:15
333Education / Academia / Academic transfer / Knowledge sharing / Curricula / Syllabus / Teaching assistant / Grading systems by country / Royal Academy of Dance / Course credit

IST 300: Information Studies Skills Undergraduate Teaching Assistant Identification Form Student Name _______________________________ Semester_____________________________

Add to Reading List

Source URL: facultycenter.ischool.syr.edu

Language: English - Date: 2014-12-15 13:54:22
334Author / Literary criticism / Civility / Behavior

T HE DIGNITY PROJ ECT Responsible conduct in graduate and professional education Managing Collaborative Publications Sharing Recognition and Credit Publishing research is an

Add to Reading List

Source URL: www.sos.umn.edu

Language: English - Date: 2016-06-21 16:33:05
335Computing / Fault-tolerant computer systems / Distributed data storage / Concurrent computing / Distributed computing / File sharing / Distributed algorithms / Distributed hash table / Paxos / Consensus / Peer-to-peer / Routing table

Speedy : a Sybil-resistant DHT implementation* anquan Liu, Qian Long, Pratiksha aker, Wenting Zheng May 12, Introduction Distributed hash tables (DHTs) are common services that leverage peer-to-peer (P2P)

Add to Reading List

Source URL: css.csail.mit.edu

Language: English - Date: 2014-12-08 14:33:02
336Graph theory / Discrete mathematics / Mathematics / Directed acyclic graph / Vertex / Tree / Image segmentation / Graph

This article was published in an Elsevier journal. The attached copy is furnished to the author for non-commercial research and education use, including for instruction at the author’s institution, sharing with colleag

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2016-06-12 17:36:46
337Software / Computing / Intellectual property law / File sharing / Peer-to-peer / Peer-to-peer file sharing / LimeWire / Social peer-to-peer processes / P2P caching / Anonymous P2P

Peer to Peer (P2P) and File Sharing Applications Policy The University allows the use of peer-to-peer (P2P) and file sharing applications when properly requested and for legitimate business and academic use. For that rea

Add to Reading List

Source URL: dos.mst.edu

Language: English - Date: 2015-06-04 06:31:09
338Computing / File sharing networks / File sharing / Collaboration / Peer-to-peer computing / Intellectual property law / Peer-to-peer / Gnutella / Distributed data storage / EigenTrust / Social peer-to-peer processes / Scalability

Addressing the Non-Cooperation Problem in Competitive P2P Systems Sepandar Kamvar Beverly Yang

Add to Reading List

Source URL: netecon.seas.harvard.edu

Language: English - Date: 2009-11-30 14:32:01
339Training / Trainee / Schedule / Recruit training / Human resource management / Education / Knowledge sharing

2006 Program Setup – Master Gardener Training

Add to Reading List

Source URL: mastergardener.wsu.edu

Language: English - Date: 2012-12-10 19:46:30
340Cryptography / Secure multi-party computation / Digital signature / Secure two-party computation / Secret sharing / Cryptographic protocol / Challengeresponse authentication / Blinding

MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

Add to Reading List

Source URL: www.cs.rpi.edu

Language: English - Date: 2011-02-19 14:29:40
UPDATE