Search

Results: 16248
Asymmetric Information and R&D Disclosure
We examine how asymmetric information in financial markets affects voluntary research and development (R&D) disclosure, considering scientific publications as a disclosure channel. Difference-in-differences regressions...
Asymmetric Information and R&D Disclosure
We examine how asymmetric information in financial markets affects voluntary research and development (R&D) disclosure, considering scientific publications as a disclosure channel. Difference-in-differences regressions...
R/BHC
BACKGROUND: Although the use of clustering methods has rapidly become one of the standard computational approaches in the literature of microarray gene expression data analysis, little attention has been paid to uncertainty in...
Orchestrating privacy-protected big data analyses of data from different resources with R and DataSHIELD.
Combined analysis of multiple, large datasets is a common objective in the health- and biosciences. Existing methods tend to require researchers to physically bring data together in one place or follow an analysis plan and share...
The Expansion of Approximant /r/ in Dutch
Renée Van Bezooijen
Sep 30, 2014
In present-day Standard Dutch as spoken in the Netherlands, three main categories of pronunciation variants of Irl can be distinguished, namely alveolar /r/, uvular /r/, and approximant /r/. Approximant /r/, the focus of this...
Alphonse R. Dochez, 1925
Alphonse R. Dochez. Etiology of Scarlet Fever Lecture delivered January 17th, 1925 Posted with permission
Published by: J.B. Lippincott Company
<b>Exploring investor viewson accounting for R&amp;D costs under IAS 38</b>

Research and development (R&D) is increasingly significant in the global economy and its accounting treatment has always been, and remains, a contentious area. The standard governing its accounting treatment under...

Florence R. Sabin, 1915
Prof. Florence R. Sabin. The Method of Growth of the Lymphatic System Lecture delivered December 18th, 1915
Published by: J.B. Lippincott Company
Personality Antecedents of EWoM in Determining Online Customer Purchase Behavior
Electronic word of mouth (EWoM) is similar to the standard word of mouth- the only difference is, the use of Internet as a base in EWoM. By understanding the personality antecedents of EWoM, the consumer buyer beahviour could be...
Static spherically symmetric wormholes in generalized f(R, $\phi$ ϕ ) gravity
Abstract.: In this paper, we examine static spherically symmetric wormhole solutions in generalized f(R, ϕ) gravity. To do this, we consider three different kinds of fluids: anisotropic, barotropic and isotropic. We explore...
<b>Exploring investor viewson accounting for R&amp;D costs under IAS 38</b>

Research and development (R&D) is increasingly significant in the global economy and its accounting treatment has always been, and remains, a contentious area. The standard governing its accounting treatment under...

The Expansion of Approximant /r/ in Dutch
Renée Van Bezooijen
Sep 30, 2014
In present-day Standard Dutch as spoken in the Netherlands, three main categories of pronunciation variants of Irl can be distinguished, namely alveolar /r/, uvular /r/, and approximant /r/. Approximant /r/, the focus of this...
Bayesian Spatial Modelling with R-INLA
Finn Lindgren, Håvard Rue
Feb 01, 2015
The principles behind the interface to continuous domain spatial models in the R- INLA software package for R are described. The integrated nested Laplace approximation (INLA) approach proposed by Rue, Martino, and Chopin (2009)...
Bayesian Spatial Modelling with R-INLA
Finn Lindgren, Håvard Rue
Feb 01, 2015
The principles behind the interface to continuous domain spatial models in the R- INLA software package for R are described. The integrated nested Laplace approximation (INLA) approach proposed by Rue, Martino, and Chopin (2009)...
First do no harm
Timo Kivimaki
Dec 01, 2015
A recent revelation by President and Nobel Peace Prize laureate Martti Ahtisaari suggests that the large scale destruction of Syria could perhaps have been avoided by diplomacy. However, the negotiated solution was not accepted...
First do no harm
Timo Kivimaki
Dec 01, 2015
A recent revelation by President and Nobel Peace Prize laureate Martti Ahtisaari suggests that the large scale destruction of Syria could perhaps have been avoided by diplomacy. However, the negotiated solution was not accepted...
Using R and Bioconductor for proteomics data analysis.
This review presents how R, the popular statistical environment and programming language, can be used in the frame of proteomics data analysis. A short introduction to R is given, with special emphasis on some of the features...
Capitalisation of R&amp;D and the informativeness of stock prices
We examine whether requiring (IFRS) versus allowing (UK GAAP) conditional capitalisation of development expenditure affects the extent to which capitalisation conveys more information about future earnings, relative to...
A farewell to <i>R</i>
The time-dependent reproduction number, Rt, is a key metric used by epidemiologists to assess the current state of an outbreak of an infectious disease. This quantity is usually estimated using...
Do board interlocks increase innovation? Evidence from a corporate governance reform in India
C Helmers, M Patnam, R Rau
Jul 11, 2017
We examine the effect of board interlocks on patenting and R&D spending for publicly traded companies in India. We exploit a corporate governance reform to address the endogeneity of board interlocks through exogenous changes...
What Do Academic Library Deans Do?
Mark Y. Herring
Jan 01, 0001
A recent discussion apropos of nothing set me to a thought-experiment: what is it deans of library services (or, as it often the case when I'm introduced, deans of library sciences) do? If one were to write up a short list of...
Published by: Winthrop University
Explanatory Adequacy in Phonology
Eric Russell Webb
Aug 01, 2013
This work reexamines phonological variation particular to the /R/ of convergent French, departing from the hypothesis that a deductive approach to this question can offer explanatory advantages. In contrast to data-driven...
Threat-Path Estimate-Based Watchword-Chunk Algorithm for Advanced Persistent Threat in the Cloud
In cloud computing, an advanced persistent threat (APT) is a cyber-attack that gains access to a network and remains undetected for some time. As well APTs have proven difficult to detect and protect, in the existing system they...

|<

<

1

2

3

4

5

>

>|