Institution
DePaul University
Education•Chicago, Illinois, United States•
About: DePaul University is a education organization based out in Chicago, Illinois, United States. It is known for research contribution in the topics: Population & Context (language use). The organization has 5658 authors who have published 11562 publications receiving 295257 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: In this article, the basic ideas of blockchain are reviewed and a sample minimalist implementation in Python is presented, based on the same idea. But the implementation is different from the one presented in this paper.
Abstract: Blockchain is a new technology, based on hashing, which is at the foundation of the platforms for trading cryptocurrencies and executing smart contracts. This article reviews the basic ideas of this technology and provides a sample minimalist implementation in Python.
240 citations
•
TL;DR: A comprehensive overview of the state-of-the-art in web personalization can be found in this article, where the authors discuss the various sources of data available to personalization systems, the modelling approaches employed and the current approaches to evaluating these systems.
Abstract: In this chapter we provide a comprehensive overview of the topic of Intelligent Techniques for Web Personalization. Web Personalization is viewed as an application of data mining and machine learning techniques to build models of user behaviour that can be applied to the task of predicting user needs and adapting future interactions with the ultimate goal of improved user satisfaction. This chapter survey's the state-of-the-art in Web personalization. We start by providing a description of the personalization process and a classification of the current approaches to Web personalization. We discuss the various sources of data available to personalization systems, the modelling approaches employed and the current approaches to evaluating these systems. A number of challenges faced by researchers developing these systems are described as are solutions to these challenges proposed in literature. The chapter concludes with a discussion on the open challenges that must be addressed by the research community if this technology is to make a positive impact on user satisfaction with the Web.
240 citations
••
TL;DR: In this article, the authors show firms pay more dividends and repurchase more shares when they have higher levels of institutional ownership, even if the institutions are not activist investors, and find evidence of an effect of the institutional ownership on proxy voting, profitability, R&D, and CEO compensation.
Abstract: We show firms pay more dividends and repurchase more shares when they have higher levels of institutional ownership, even if the institutions are not activist investors. We also find evidence of an effect of institutional ownership on proxy voting, profitability, R&D, and CEO compensation. Our identification strategy relies on an instrument for ownership based on the annual composition of the Russell 1,000 and 2,000 indices. Overall, results support agency models where institutional owners lower the marginal cost of delegated monitoring.
238 citations
••
TL;DR: A variety of factors have been examined to understand and explain destination choice behavior, ranging from the relatively tangible attributes of products, to the intangible benefits, needs, and pe... as discussed by the authors.
Abstract: A variety of factors have been examined to understand and explain destination choice behavior, ranging from the relatively tangible attributes of products, to the intangible benefits, needs, and pe...
235 citations
••
TL;DR: A set of techniques and algorithms are presented that provide automatic discovery of firewall policy anomalies to reveal rule conflicts and potential problems in legacy firewalls, and anomaly-free policy editing for rule insertion, removal, and modification.
Abstract: Firewalls are core elements in network security. However, managing firewall rules, especially for enterprise networks, has become complex and error-prone. Firewall filtering rules have to be carefully written and organized in order to correctly implement the security policy. In addition, inserting or modifying a filtering rule requires thorough analysis of the relationship between this rule and other rules in order to determine the proper order of this rule and commit the updates. In this paper we present a set of techniques and algorithms that provide automatic discovery of firewall policy anomalies to reveal rule conflicts and potential problems in legacy firewalls, and anomaly-free policy editing for rule insertion, removal, and modification. This is implemented in a user-friendly tool called ?Firewall Policy Advisor.? The Firewall Policy Advisor significantly simplifies the management of any generic firewall policy written as filtering rules, while minimizing network vulnerability due to firewall rule misconfiguration.
234 citations
Authors
Showing all 5724 results
Name | H-index | Papers | Citations |
---|---|---|---|
C. N. R. Rao | 133 | 1646 | 86718 |
Mark T. Greenberg | 107 | 529 | 49878 |
Stanford T. Shulman | 85 | 502 | 34248 |
Paul Erdös | 85 | 640 | 34773 |
T. M. Crawford | 85 | 270 | 23805 |
Michael H. Dickinson | 79 | 196 | 23094 |
Hanan Samet | 75 | 369 | 25388 |
Stevan E. Hobfoll | 74 | 271 | 35870 |
Elias M. Stein | 69 | 189 | 44787 |
Julie A. Mennella | 68 | 178 | 13215 |
Raouf Boutaba | 67 | 519 | 23936 |
Paul C. Kuo | 64 | 389 | 13445 |
Gary L. Miller | 63 | 306 | 13010 |
Bamshad Mobasher | 63 | 243 | 18867 |
Gail McKoon | 62 | 125 | 14952 |