scispace - formally typeset
Search or ask a question

Showing papers on "Proxy (statistics) published in 2002"


Journal ArticleDOI
TL;DR: Social comparison consists of comparing oneself with others in order to evaluate or to enhance some aspects of the self as mentioned in this paper, i.e., comparer assimilates or contrasts his or her self relative to superior or inferior others.
Abstract: Social comparison consists of comparing oneself with others in order to evaluate or to enhance some aspects of the self. Evaluation of ability is concerned with the question “Can I do X?” and relies on the existence of a proxy performer. A proxy's relative standing on attributes vis‐a‐vis the comparer and whether the proxy exerted maximum effort on a preliminary task are variables influencing his or her informational utility. Evaluation of opinions is concerned with the questions “Do I like X?”“Is X correct?” and “Will I like X?” Important variables that affect an individual's use of social comparison to evaluate his or her opinions are the other person's expertise, similarity with the individual, and previous agreement with the individual. Whether social comparison serves a self-enhancement function depends on whether the comparer assimilates or contrasts his or her self relative to superior or inferior others. The kinds of self‐knowledge made cognitively accessible and variables such as mutability of se...

778 citations


Journal ArticleDOI
TL;DR: In this article, the authors predict that managers' ability to optimistically bias earnings decreases with the extent to which the balance sheet overstates net assets relative to a neutral application of GAAP.
Abstract: The balance sheet accumulates the effects of previous accounting choices, so the level of net assets partly reflects the extent of previous earnings management. We predict that managers' ability to optimistically bias earnings decreases with the extent to which the balance sheet overstates net assets relative to a neutral application of GAAP. To test this prediction, we examine the likelihood of reporting various earnings surprises for 3,649 firms during 1993–1999. Consistent with our prediction, we find that the likelihood of reporting larger positive or smaller negative earnings surprises decreases with our proxy for overstated net asset values.

634 citations


Journal ArticleDOI
12 Jul 2002-Science
TL;DR: Research bias is pervasive in organismal research; i.e., research is not proportional to organisms' frequency in nature, and a reasonable proxy measure is to evaluate subject organisms in the research literature.
Abstract: Taxonomic bias is pervasive in organismal research; i.e., research is not proportional to organisms' frequency in nature ([1][1]–[4][2]). Quantifying research bias is difficult, but a reasonable proxy measure is to evaluate subject organisms in the research literature (e.g., [1][1], [4][2]). For

431 citations


Patent
31 Jul 2002
TL;DR: In this paper, a local proxy that is located between a client device and a host system may be used to identify, or provide information about, a client devices or identity using the client device that accesses the host system and the local proxy may append parental control information (such as a parental control level) to communications sent by the client devices.
Abstract: A local proxy that is located between a client device and a host system may be used to identify, or provide information about, a client device or identity using a client device that accesses a host system. The local proxy may append parental control information (such as a parental control level) to communications sent by the client device. The host system may provide, or restrict, access to information or features based on the information appended to communications sent by the client device. The local proxy and the host system both may store an additional copy of parental control information associated with one or more identities or client devices. The mirror copy of parental information may be used to restrict communications based on an identity or device's parental control classification and/or may be used to verify that parental control information has not been improperly modified or accessed. Parental controls may be applied using access control lists stored on the local proxy.

168 citations


Patent
01 Mar 2002
TL;DR: In this paper, a new form of security designated the proxy asset provides risk management capabilities, such as liquid interests in illiquid assets and economic indicators, without the deficiencies associated with other types of financial instruments.
Abstract: A new form of security designated the proxy asset provides risk management capabilities, such as liquid interests in illiquid assets and economic indicators, without the deficiencies associated with other types of financial instruments. A proxy assets set is defined to respond to one or more indices. Each proxy asset (1112A, 1112B) has a share value and a number of shares. The proxy assets (1112A, 1112B) have a proxy assets set account value equal to a sum over all proxy assets of the products of the share value and the number of shares. At least one proxy asset account value per share is a function of an index. The function is called an account formula. The account value for the entire set of proxy assets (1112A, 1112B) is constrained by a value of a resources pool. The proxy asset account value is reevaluated according to the account formula upon occurrence of each event of a plurality of predetermined events.

127 citations


Journal ArticleDOI
TL;DR: This paper showed that the A&S empirical work cannot be interpreted as evidence of a negative relation between risk and incentives, and showed that in a model of CEO incentives that includes market value and risk as separate explanatory variables, the percent return variance is positively associated with incentives.
Abstract: In contrast to a body of research starting with Demsetz and Lehn (1985) that predict and find a strong positive association between firm percent return variance and incentives, Aggarwal and Samwick (1999) predict and find a strong negative association between firm dollar return variance and incentives. A key assumption of Aggarwal and Samwick's analysis is that firm risk is the sole determinant of the pay-performance sensitivity, and that expected dollar return variance (the product of expected percent return variance and firm market value) is the correct proxy for risk. We demonstrate that dollar return variance is a noisy measure of firm market value and argue that A&S re-documents a size effect that is already well-known from prior literature. Because dollar return variance is shown to be a noisy proxy for firm size, the A&S empirical specification does not include an appropriate proxy for firm risk. The data consistently show that it is important to examine market value and percent return variance as separate determinants of the effects of size and risk on CEO incentives, as is done in the managerial ownership literature. In a model of CEO incentives that includes market value and risk as separate explanatory variables, we find that, contrary to the results in A&S, percent return variance is positively associated with incentives. The A&S empirical work cannot be interpreted as evidence of a negative relation between risk and incentives.

115 citations


Patent
30 Aug 2002
TL;DR: In this paper, an entity is abstracted through implementation of a proxy object of the present invention, including functions for a software application to programmatically interact with the entity at runtime, as well as optional compile and design time implementation classes to support the development and customization of declarative proxy object definitions.
Abstract: An entity is abstracted through implementation of a proxy object of the present invention, including functions for a software application to programmatically interact with the entity at runtime, as well as optional compile and design time implementation classes to support the development and customization of declarative proxy object definitions. In one embodiment, builder and resource interfaces are provided to assist in the creation of the implementation classes. In one embodiment, an extension interface is also provided to facilitate extension of an implementation of the proxy object. Software applications including programmatic usage of proxy object functions are compiled into object codes with proxy objects and meta data files. The compiled object codes are executed using a runtime engine, which includes proxy context objects to facilitate interaction on an instance basis, and an asynchronous event router to route asynchronous events for the entity.

97 citations


Patent
25 Feb 2002
TL;DR: In this paper, an approach for providing a proxy service is described, in which a message from an application that supports browsing is received, and the message is identified as invoking the proxy service.
Abstract: An approach for providing a proxy service is disclosed. A message from an application that supports browsing is received. The message is identified as invoking the proxy service. The message is selectively forwarded to a proxy agent (e.g., a HyperText Transfer Protocol (HTTP) proxy or a Domain Name Service (DNS) proxy) that is configured to provide the proxy service. The forwarding of the message is transparent to the application. The present invention has particular applicability to a satellite network.

85 citations


Patent
10 Jan 2002
TL;DR: In this article, a request for secure data sent from a client computer 2 to a webtsite server computer 4 is redirected to a proxy computer 6 using a protocol such as HTTP and Certificate Exchange.
Abstract: A request for secure data sent from a client computer 2 to a webtsite server computer 4 is redirected to a proxy computer 6 . A secure connection is established with the proxy computer 6 using a protocol such as HTTP and Certificate Exchange. The proxy computer 6 then establishes its own secure connection with the website server 4 . The data requested is passed in encrypted form from the website server computer 4 to the proxy computer 6 . The proxy computer 6 decrypts this data and then scans it for illegal content, such as computer viruses, worms, Trojans, banned computer files, banned words, banned combinations of words or banned images and the like. Providing no illegal content is found, the data is encrypted again for transfer over the secure link between the proxy computer 6 and the client computer 2 . The proxy computer 6 may conveniently be the firewall computer within a local area network.

79 citations


Proceedings ArticleDOI
10 Jun 2002
TL;DR: This paper presents an enhancement to their scheme such that the identity of the proxy signer is hidden behind an alias, and the identity can be revealed only by the alias authority.
Abstract: Mambo et al. (1996) discussed the delegation of signature power to a proxy signer. Lee et al. (2001) constructed a strong non-designated proxy signature scheme in which the proxy signer had strong non-repudiation. In this paper, we present an enhancement to their scheme such that the identity of the proxy signer is hidden behind an alias. The identity can be revealed only by the alias authority. We also discuss other applications of this technique.

78 citations


01 Jan 2002
TL;DR: A new approach to volume haptics is presented that makes use of a proxy that is constrained by ‘virtual surfaces’, defined by the local gradient at the proxy position.
Abstract: In this paper a new approach to volume haptics is presented. The developed method makes use of a proxy that is constrained by ‘virtual surfaces’, defined by the local gradient at the proxy position ...

Journal ArticleDOI
TL;DR: In this paper, it is shown that the cross-sectional correlation matrix of the market model?s residual errors is not diagonal, which implies that the capital asset pricing model, as conventionally specified by South African academics does not hold on the JSE.
Abstract: Given the reclassification of the Johannesburg Stock Exchange (JSE) sector indices that occurred in March 2000, this paper updates the factor analytic procedure conducted by van Rensburg and Slaney (1997). It is found that the new Financial-Industrial (CI21) and Resources (CI11) indices may be used as observable proxies for the first two principal components extracted from the covariance matrix of JSE returns. Consequently, it is suggested that these indices replace the Industrial and All-Gold index in future applications of the two factor arbitrage pricing theory (APT) model. Prior research is extended by considering the implications of the dichotomy in the return generating processes underlying JSE financial-industrial and resource stocks for the estimation of security betas. It is mathematically demonstrated that this dichotomy implies that the cross-sectional correlation matrix of the market model?s residual errors is not diagonal. As a result, conventionally conducted market model regressions are characterised by the problem of omitted variable bias and downwardly biased t statistics. A remedial procedure is proposed, which may serve as a general correction for omitted variable bias in ordinary least squares regression analysis when using panel data. Finally, it is pointed out that the All-Share Index, conventionally employed as the market proxy in South African beta estimation, is not mean-variance efficient given the opportunity for offshore investment. This implies that the capital asset pricing model, as conventionally specified by South African academics does not hold on the JSE.

Patent
Brian P. Holt1
20 Jun 2002
TL;DR: In this article, the location of a transmitter can be determined using a proxy receiver, such as a natural landmark or man-made stucture, which reflects and/or refracts the signal from a transmitter toward a receiver.
Abstract: The location of a transmitter can be determined using a proxy receiver, such as a natural landmark or man-made stucture, which reflects and/or refracts the signal from a transmitter (64) toward a receiver. A processor (65) is operatively connected to the receiver and determines the location of the transmitter based on a multilateration calculation that includes the Time of Arrivals of the transmitted signal at the proxy receiver and the known or calculated location of the proxy receiver as inputs.

Patent
24 Jun 2002
TL;DR: A presence proxy (40) maintains presence information concerning a number of mobile units (80, 85) user agents (72, 74, 76, 78) and retains the presence information should the requesting user agent (10) be unavailable.
Abstract: A presence proxy (40) maintains presence information concerning a number of mobile units (80, 85) user agents (72, 74, 76, 78) and retains the presence information should the requesting user agent (10) be unavailable. Further, presence proxy 40 provides lists of user agents about which a particular user agent (10) is interested in having presence information. Further, presence proxy (40) maintains and minimizes a number of notify messages (126) sent to user agent (10). Lastly, presence proxy (40) maintains information when a user agent (10) loses or drops access (150) to the network (20).

Patent
25 Apr 2002
TL;DR: In this article, a proxy server receives incoming data on behalf of the protected network device, which data is retrieved by a proxy agent that periodically polls the proxy server to see if any data awaits retrieval.
Abstract: A scheme allowing communication between a network device on a protected network and an external network device outside the protected network using "reverse proxying." A proxy server receives incoming data on behalf of the protected network device, which data is retrieved by a proxy agent that periodically polls the proxy server to see if any data awaits retrieval.

Patent
Arup Acharya1, Stefan Berger1, Young-Bae Ko1, Nathan Junsup Lee1, James Rubas1 
18 Jan 2002
TL;DR: In this article, the authors propose a service discovery proxy that allows devices to enter and leave a local domain often and still allow consumers of the service provided by the device to easily detect its availability.
Abstract: The invention provides methods, apparatus and systems that allow devices to enter and leave a local domain often and still allow consumers of the service provided by the device to easily detect its availability. To achieve this, an example embodiment locates a “service discovery proxy” in the local domain. On receiving a service discovery request from a remote inquirer, the proxy resolves the service request based on those services that are determined to be dynamically available in the local domain at that time. The proxy resolves the incoming service request within its local domain by using any method for local service discovery. The response to the service discovery received from the local devices is customized by the service discovery proxy, wherein the customization includes formatting, filtering, aggregating, and/or selecting particular responses. The proxy then sends the customized response back to the remote inquirer.

Patent
Adam Just1
24 Apr 2002
TL;DR: In this article, a proxy generator produces computer code for compilation as a client-side proxy in support of client-server distributed software applications using information from a software "contract" file that defines the desired functionality of the distributed application, and, optionally, from a configuration file that tailors proxy operation for a specific application.
Abstract: A proxy generator produces computer code for compilation as a client-side proxy in support of client-server distributed software applications. Using information from a software “contract” file that defines the desired functionality of the distributed application, and, optionally, from a configuration file that tailors proxy operation for a specific application, the proxy generator generates proxy code for compilation as a generated proxy. This generated proxy interfaces a client application with a server application, and insulates the client application from the complexities of distributed computing. More particularly, the generated proxy automatically includes exception-handling mechanisms tailored to the software contract for both recoverable and non-recoverable errors. Information in the configuration file determines the generated proxy's response to recoverable errors, such as the number of retries attempted for a given type of network communication error.

Posted Content
TL;DR: In this paper, the authors provide arguments in favor of using subjective questions as a proxy to measure welfare and well-being, which makes it possible to avoid having to define what welfare means and identifying the relevant indicators.
Abstract: This paper provides arguments in favor of using subjective questions as a proxy to measure welfare and well-being. This approach makes it possible to avoid having to define welfare and well-being means and having to identify the relevant indicators. Instead, individuals themselves define their level of welfare and well-being. For a meaningful analysis of subjective questions, two main assumptions are needed: namely, that individuals are able to evaluate their own situation, and that responses among individuals can be compared. Both assumptions are discussed here. Next, empirical studies that use subjective questions are surveyed. This offers a fIrst approximation of the structure of individual well-being and preferences. Finally, four areas of application are identified, along with a short survey of relevant studies.

Patent
15 Oct 2002
TL;DR: In this article, the authors describe a single signon with basic authentication on a transparent proxy, where a user accesses a client to issue requests for content on an origin server.
Abstract: Methods, systems, and data structures are provided for single sign-on with basic authentication on a transparent proxy. A user accesses a client to issue requests for content on an origin server. The transparent proxy requires user authentication before access can be granted to the origin server. The transparent proxy receives the requests and determines if the user is presently authenticated to the origin server. If the user is not authenticated, then the transparent proxy issues a basic authentication error to the client causing the client to prompt the user for authentication information. The transparent proxy directs the client to retain the authentication information and supply it with subsequent requests to the origin server. Further, the transparent proxy independently reconstructs the authentication information for subsequent requests directed to other servers under the handling of the transparent proxy, without requiring additional user action.

Proceedings ArticleDOI
07 Nov 2002
TL;DR: Full file caching outperforms prefix caching over a significant region of this system design space, due to more efficient multicast streaming protocols as well as a more complete exploration of the practical system configuration space.
Abstract: This paper develops simple cost models for provisioning content distribution networks that use the simple and highly scalable bandwidth skimming protocol for streaming. New insight is obtained into: (1) how cost-effective proxy servers are in multicast streaming systems; (2) the most effective streaming protocol; and (3) the optimal proxy content, as a function of the system configuration and workload. A key result is that proxy servers are only cost effective if: (a) the origin server does not have a multicast capability; or (b) the file request rate is low, and thus multicast is not highly effective; or (c) the cost of a proxy server stream is a very small fraction (i.e., approximately 1/P) of the cost of an origin server stream, where P is the number of proxy servers and the cost of either type of stream includes both the server and network resource costs. For cases where proxy servers are cost effective, results in the paper provide the optimal proxy content and the most effective streaming protocol, as a function of a wide range of system configuration and workload parameters. In contrast to previous work, full file caching outperforms prefix caching over a significant region of this system design space, due to more efficient multicast streaming protocols as well as a more complete exploration of the practical system configuration space.

Journal ArticleDOI
TL;DR: This work presents a simple, comprehensive method for assessing agreement between patients with head injury and their proxy responders, and defines agreement separately for each patient-proxy pair, and compares HRQOL profiles along three dimensions-level, or the average of the ratings.

Patent
30 Oct 2002
TL;DR: In this paper, a virtual private proxy is generated based on an agreement between a first entity and a second entity, and data associated with the first entity is monitored at the virtual private proxies.
Abstract: A method and system for secure communication is presented. A virtual private proxy is generated based on an agreement between a first entity and a second entity. A first virtual private proxy is associated with the first entity and a second virtual private proxy is associated with the second entity. Data associated with the first entity is monitored at the virtual private proxy. Whether the data violates the agreement is determined and communication of the data from the first virtual private proxy to the second virtual private proxy is disallowed when the data violates the agreement.

Patent
05 Feb 2002
TL;DR: In this article, a proxy is installed in a communication path through a data network, and a replacement proxy is provided in the communication path automatically and without manual intervention to perform the proxy function of the first proxy.
Abstract: Server-to-user delivery of a data stream associated with a service provided by the server is effectuated by selecting the server and, automatically and without manual intervention, providing in a communication path that is to be used for the delivery a proxy that performs a proxy operation on the data stream during the delivery. A proxy can be automatically installed in a communication path through a data network. In response to an installation request, a communication port for coupling to the communication path is automatically allocated and a proxy to support data flow through the communication port is automatically loaded. The proxy is operable for performing a proxy operation on the data stream. In maintaining proxies in a communication path used to deliver from a server to a user a data stream associated with a service provided by the server, it can be determined when a first proxy in the communication path is not performing its proxy function within the communication path. In response to such a determination, a replacement proxy can be provided in the communication path automatically and without manual intervention. The replacement proxy replaces the first proxy in the communication path to perform the proxy function of the first proxy.


Patent
26 Sep 2002
TL;DR: In this paper, a system and method for providing remote access to network applications using a dual proxy is described, where a request is received via a first network, from a remote client on the first network to access a second network.
Abstract: A system and method are disclosed for providing remote access to network applications using a dual proxy. A request is received via a first network, from a remote client on the first network, to access a second network. A client side proxy applet is provided to the remote client. Client side application software associated with an application residing on the second network and installed at the remote client establishes a connection with the client side proxy applet. A server side proxy configured (1) to communicate with the client side proxy applet via the first network and (2) to communicate with an application server via the second network is provided on a proxy server associated with the second network. The client side proxy is configured to relay data between the remote client and the server side proxy and the server side proxy is configured to relay data between the client side proxy applet and the application server.

Patent
25 Jul 2002
TL;DR: In this article, a method for providing proxy-based caching services to a client device is presented, which comprises selectively removing cookies from a message by an origin server to the client device; and caching the removed cookies separately for each unique combination of user identifier and client device identifier in the message.
Abstract: In one embodiment, a method for providing proxy based caching services to a client device is provided. The method comprises selectively removing cookies from a message by an origin server to the client device; and caching the removed cookies separately for each unique combination of user identifier and client device identifier in the message.

Patent
30 Jul 2002
TL;DR: In this article, a proxy device intercepts both the control connection and the data connection from the client and transmits data received from the server-selected port of the server to the client through the fixed port of a proxy devices.
Abstract: A system provides a proxy connection by intercepting a control connection and a data connection between a client and a server. A proxy device receives a control connection request from a client and establishes a proxy control connection with a server in response to the control connection request from the client. The proxy device then receives a data connection request from the client. In response to the data connection request, the proxy device establishes a data connection with the server at a server-selected or dynamic port of the server and establishes a data connection with the client at a fixed port of the proxy device. Using this technique, the proxy device transparently intercepts both the control connection and the data connection from the client and transmits data received from the server-selected port of the server to the client through the fixed port of the proxy device.

Patent
22 Mar 2002
TL;DR: In this article, an asynchronous protocol framework is proposed where a registry is provided having a plurality of proxies, where each proxy implements a generic interface for a related to a software component, and each proxy is capable of providing specific messages to the related software component based on an underlying design structure of the software component.
Abstract: An invention is disclosed for providing an asynchronous protocol framework. A registry is provided having a plurality of proxies, wherein each proxy implements a generic interface for a related to a software component. In addition, each proxy is capable of providing specific messages to the related software component based on an underlying design structure of the software component, for example, EJB specific or JMS specific messages. A first proxy is obtained from the registry, wherein the first proxy is related to a first software component, a message is sent to the first software component using the generic interface of the first proxy. In particular, the first proxy sends a specific message to the first software component based on the underlying design structure of the first software component.

Patent
02 Jul 2002
TL;DR: In this article, a proxy auto-configuration file for a system including a plurality of proxy servers is created, and the PAC file is posted on a web server to be updated periodically by periodically conducting the accessing, the performing and the creating.
Abstract: A method creates a proxy auto-configuration file for a system including a plurality of proxy servers. The method includes accessing and performing a performance test on each of the plurality of proxy servers, and creating a proxy auto-configuration (PAC) file in response to the performing. The PAC file may be posted on a web server. The method may further include iteratively updating the PAC file by periodically conducting the accessing, the performing, and the creating. The creating the PAC file may include generating a list of a selected number of best-performing proxy servers among the plurality of proxy servers. The performing the performance test may include sending a command to fetch at least one selected web page, receiving the selected web page, and determining an amount of time required to fetch the selected web page.

Patent
14 Mar 2002
TL;DR: In this paper, a split proxy server is defined as a proxy server disposed behind a firewall in a private portion of the data communications network, and a proxy client disposed in a client computing device positioned externally to the private portion.
Abstract: In a data communications network, a split proxy can include a split proxy server disposed behind a firewall in a private portion of the data communications network; a split proxy client disposed in a client computing device positioned externally to the private portion of the data communications network; a split proxy client interface to at least one client application in the client computing device, and a split proxy server interface to at least one server application corresponding to the at least one client application in the private portion of the data communications network. A tunnel can be established between the split proxy client and split proxy server. The tunnel can host all Internet Protocol (IP) data traffic between the client application and the corresponding server application in the private portion of the data communications network.