ࡱ> IKFGH Lbjbj .hh5**mmmmm8k8Y:7777777$c9<8m,,,8mm4%8///, mm7/,7//:4,4*C-'44 7;80k8>4R<("<44<m5D0 "//K88+(k8,,,,<* 3: Downloads and Citations in Intelligent Systems in Accounting, Finance and Management Daniel E. OLeary University of Southern California  HYPERLINK "mailto:Oleary@usc.edu" Oleary@usc.edu - Words = ~ 5850 Abstract This paper summarizes the most downloaded papers from the years 2000 2002 and traces the number of citations from Google Scholar (beta) for those papers at the beginning of 2008. It is found that the number of downloads and citations are highly correlated, suggesting that downloads is a leading indicator of citations, even years into the future. In addition, this paper assesses which of the papers from the journal have been the most cited papers over the history of the journal, using both ISI/Social Science Citation Index and Google Scholar. It is found that the numbers of citations using both approaches are highly correlated. Keywords: Downloads, Citations, H-index 1. Introduction In 2007, the John Wiley journal, Intelligent Systems in Accounting, Finance and Management (ISAFM) published its 15th volume. At such points in a journals history it is time to provide an historical analysis as to where the journal has been. One approach is to determine those papers that have garnered more attention, either by being frequently cited by other research papers or frequently downloaded for potential future use. Citations Diamond (1986) and others have noted that citations have economic benefit for those being cited. Accordingly, citation studies can be important to those identified as among the most cited. In addition, citation studies are important to those who are being considered for tenure, promotion or chaired positions. As noted by Smith (2004), ultimately, an individuals citation list may be more important than their publication list. Perhaps the two leading sources for citation research are ISIs World of Knowledge (Social Science Citation Network - SSCI) and Google Scholar (beta). Historically, citation analyses most frequently have employed data generated from Thompsons ISI World of Knowledge (e.g., Howitt 1998), also known as the Social Science Citation Index a source of ISIs World of Knowledge. ISI limits its search for citations to a set of journals from which it indexes each of the reference citations, even if the journal being cited is not indexed. However, ISI is not the only source of citation information. In addition, this paper also analyzed the most cited papers using Google Scholar (Beta). Although Google is still only in beta form, it increasingly is being used to assess citations of scholarly papers. Unlike ISI, Google Scholar indexes virtually all papers on the Internet. Further, unlike ISI, Google Scholar is provided as a free service. As a result, we have two citation sources, one that does not index ISAFM (ISI) and one that does index ISAFM (Google Scholar). Given such different sources of citations, it is not clear, a priori, how the number of citations from each would be related Downloads of Research Papers Digital downloads are a relatively new occurrence, deriving from the evolution toward an increasingly digital world. In some cases download information is now available as journals increasingly move on-line. For example, download information about their 25 most downloaded papers for various journals is provided by Elsevier. In other settings, the download information is kept as proprietary information. Download information may be viewed as proprietary, since publishers digital economic models are increasingly predicated based on downloads. To disclose too much about paper downloads is to disclose a journals economic model, potentially to competition. However, there is interest in downloads, since there are a number of reasons to expect that downloads of a paper might ultimately manifest themselves as citations. First, in order to know what a paper says, typically, it needs to be downloaded and read. Second, if a paper is downloaded, generally it is downloaded for a reason, such as citation. Third, if a user downloads a paper, then the user has direct local access to the paper and can cite it if they need it. Fourth, a researcher may have downloaded a paper because they were requested to examine and cite the paper. For example, a referee may have recommended that the paper be cited. Publicly Available vs. Proprietary Download Information If the download list is public, then the fact that a paper is among the more frequently downloaded, may cast additional attention to it, ultimately, resulting in additional citations. However, with a proprietary list, the extent to which a paper was downloaded is not known to others. As a result, if a paper is downloaded or ultimately is cited then it is not because of any publicity or issues relating to the paper being a frequently downloaded paper. Thus, in the case of proprietary download information there is no possibility of feedback from a download list that can result in additional downloads or citations. Purpose of this Paper The purpose of this paper is three-fold. First, this paper investigates the relationship between paper downloads and citations in Intelligent Systems in Accounting, Finance and Management. Proprietary download information is found to be statistically significantly correlated with citations for the 50 most downloaded papers from 2000-2002. Second, this paper investigates the most cited papers in IJAFM, finding the H-Index of the most cited papers for the journal. Third, this paper also compares the number of citations found using two different sources, and finds the number of citations in those two sources to be highly correlated, in spite of the fact that only one of the citation sources indexes ISAFM. Outline of This Paper This paper proceeds in the following manner. Section 2 summarizes the approach used to study the paper downloads and citations. Section 3 and 4 discuss the findings. Section 5 briefly summarizes the paper and discusses some contributions and extensions. 2. Approach This paper uses proprietary download data available to the author when he was editor of the International Journal of Intelligent Systems in Accounting, Finance and Management that was not, in general, publicly available. Information was gathered regarding the fifty most downloaded papers across the time frame January 2000 to December 2002. At that time, and to this day, only papers from 1996 were available in a digital format. As a result, only those papers published from 1996 through 2002 could have been in that sample. In addition, citation information was then gathered for each of the individual items in March 2008. In order to generate a list of the most cited papers, Google Scholar was used, in March 2008, where all of the papers and their citations listed under the following names were gathered: Intelligent Systems in Accounting, Finance and Management International Journal of Intelligent Systems in Accounting, Finance and Management Int. J. Intell. Sys. Acc. Fin. The results were then examined and duplicate entries were removed. This resulted in a substantial list of papers that was later pruned to consider only those with 10 or more citations. For each of these most cited Google papers, ISI SSCI citations were also found in March 2008. Unfortunately, ISAFM is not indexed by ISI SSCI, and the journal name that is used appears to overlap with the Wiley Journal International Journal of Intelligent Systems. As a result, the search for the number of ISAFM citations in ISI was based on a search of specific authors and papers, and their individual citations. 3. Findings Most Downloaded Papers A list of the 50 most downloaded papers between January 2000 and December 2002 is summarized in Table 1. In addition, the number of Google citations for those papers as of March 2008, five years after the data was compiled, is also provided. As a result, there was five to eight years between when the papers were downloaded and when the papers were cited and that citation information was gathered by Google Scholar. This is a substantial lag and there is question as to whether the number of downloads is related to the number of citations over such a long time period. Relationship Between Downloads and Citations Only two of the 50 have a number of citations that is greater than two standard deviations from the mean: Herst and Karagiannis (2000) and Fanning and Cogger (1998). If those two (relatively anomalous) observations are removed, then the correlation of the number of downloads and the number of Google citations is 0.437, which is statistically significantly different than 0 at better than the .05 level. Further, the correlation is 0.331, which also is statistically significantly different than 0 at better than the .05 level, when only the only entry more than five standard deviations from the mean is removed. 4. Findings Most Cited Papers A list of the 40 most cited papers is summarized in table 2. The data is sorted based on Google citations, and then by ISI citations. Relationship Between Citation Sources As noted earlier ISI does not index ISAFM, however, Google Scholar indexes virtually all materials available on the web. As a result, a priori, it is not clear if the number of citations to ISAFM between those two sources would be related. For the 40 most cited papers, the correlation between the number of citations for those two sources was 0.792, which is statistically significantly different than 0 at better than .01. Relationship to Citations and Publication Year Given that the number of citations should only increase over time, we generally would expect the number of citations to be negatively related to publication years. For the 40 most cited papers, we find that both Google Citations (- 0.169) and ISI Citations (- 0.294) are negatively correlated with publication year. However, only the second is statistically significantly different than 0 at the .05 level or better. H Index Using Google Citations An emerging issue in citation analysis is the use of the so-called H Index (Hirsch 2005). Let C(m,n) = k, be the number of citations of publications of source m, with n or more citations. When n=k, the index is referred to as the H-index. Informally, the H-Index for an individual or journal etc., would be computed using the following approach. First, the number of citations would be gathered for each document. Second, the appropriate set of documents would be ranked starting with the most citations being ranked first, the second most being ranked second, etc. Third, the highest rank, at which that rank is greater than or equal to the number of citations, is determined. Then, that rank is called the H-Index. Using Google citations, ISAFM has an H-Index of 20. Using ISI citations, the H-Index would be 9, based on the data in table 2. Why 40 Most Cited? I focused on the 40 most cited papers for two reasons. First, 40 is simply double the H-Index for the Google citations. This illustrates a generalization of the H-Index, where rather than just use the H-Index we use some general version of k*H for k an arbitrary parameter. Second, the 40 most cited each have 10 or more citations at the time that the data was gathered. As a result, by focusing on those papers with citations in so-called double digits we focus on the more cited papers. In many settings the movement from single to double digits is an important psychological barrier. Digital vs. Non-Digital If a paper is in digital format, compared to paper only, is it more likely to result in citations? One approach is to analyze the 40 most cited papers for whether or not the paper was digitally available. Out of the 40 most cited papers, which resulted in 47 different papers because of ties, 12 were from the four year time period 1992 -1995 and were not digitally available from Wiley. The average number of papers among those 47 papers, per year, for 1992-1995 was 3, and the average number of papers, per year, from 1996 2003 was 3.889. Unfortunately, this is not convincing evidence that that digitally available papers garner more citations, particularly since two of the four years from 1992 -1995 had 4 papers among those 47. 5. Summary, Contributions and Extensions This final section of the paper briefly summarizes the paper and its contributions, and discusses some extensions. Summary This research has investigated both downloads and citations for Intelligent Systems in Accounting, Finance and Management. The 50 most downloaded papers from 2000-2002 were investigated and the number of downloads were found to be highly correlated with the number of citations to those papers, up to eight years after the original downloads may have occurred. In addition, for the most cited papers over the first 15 volumes it was found that the number of citations in ISI and Google Scholar are highly correlated. Limitations Perhaps the primary limitation to this study is that Google Scholar is in beta format. As a result, citations may not be as stable as with alternative more established sources, such as ISI. On the other hand, as of October 12, 2008, Google Scholar had 24,000,000 page references, suggesting quite a strong presence. In addition, Google Scholar has been compared favorably to ISI (http://www.harzing.com/resources.htm#/pop_gs.htm). Contributions First, this paper found that even after five to eight years, the number of downloads is highly correlated with the number of citations. Second, this set of downloads information is unique in that it was proprietary. As a result, there was no possibility of feedback from the download list to the citations generated by a paper, yet citations were still statistically significantly correlated with number of downloads. Third, this is one of the first papers to compute an H-Index for a journal, and used both ISI and Google Scholar to compute the index. Fourth, this paper found that the number of citations from an emerging source, Google Scholar, and an established source, ISI/SSCI, are highly correlated for the most cited papers from ISAFM, in spite of the fact that one indexes ISAFM and the other does not. Extensions Future work could investigate the relationship between number of downloads and citations over even longer time periods than 5 years, or analyze more recent download lists. Further, future work could examine alternative citation sources, such as Scopus. In addition, future work could identify the sources of publication of the citing literature, focusing on some subset of the most cited papers, such as the top 40 or the H-Index set. Further, this paper provides a benchmark so that future research could track the extent of change of the number of citations or H-Index over time. Finally, perhaps the most important issue to explore is to what extent does the posting most downloaded lists for public consumption ultimately influence the number of citations. Does posting provide additional incentive, opportunity, etc. for papers to be cited? Table 1 50 Most Downloaded Papers 2000-2002 and Google Citations RankAuthorsDownloadsGoogle Citations1Coakley and Brown (2000)854312Nissen (2000)49783Anandarajan et al. (2001)37564Jung (1999)369165Yu et al. (2000)36046Ramamoorti et al. (1999)349117Kauffman et al. (2000)333108McKee (2000)286149Stefanowski and Wilk (2001)2821010Baestaens (1999)279411Feelders (2000)2672812Abdolmohammadi and Usof (2001)262913Kim et al. (2000)257314Lenard et al. (2001)2431015Fritz and Hosemann (2000)236816Bruno (2002)233317Yu et al. (2001)223018Herbst and Karagiannis (2000)2227819Lee et al. (2000)218219Yeo et al. (2001)218321Yager (1999)214522Kim (1999)206023Chen et al. (1999)2011023Nanda and Pendharkar (2001)201523O'Leary (1998)2013126Singh and Huhns (1999)1962827Huh and Bae (1999)192128Lanquillon (1998)191329Feroz et. (2000)180930Swicegood and Clark (2001)178331Spangler and Peters (2000)176031Davis et al. (2001)176433O'Leary (2000)172334Yan et al. (2001)1691835Vojinovic et al. (2001)168836Poh et al. 19981631637Wu (2000)160338Hellstrm and Holmstrm (2000)1581039Zacharia et al. (2000)154440Ong et al. (2002)151241Milani and Marcugini (1999)147542Collier et al. (1999)145942Bons et al. (1999)1451044Fanning and Cogger (1998)1444445Deshmukh and Talluru (1998)142646Wang (2001)141447Heatley and Otto (1998)129148Binbasioglu and Zychowicz (1998)128649Taudes et al. (1998)126450Haefke et al. (1998)1250 Table 2 - 40 Most Cited Papers (Ranked by Google Citations, Then ISI Citations) RankAuthorGoogle CitationsISI Citations1Decker (1994)93202Slowinski and Zopounidis (1995)88473Herbst and Karagiannis (2000)78194Fanning and Cogger (1998)4495Fanning and Cogger (1994)3526Kohara et al. (1997)34167Lee and Kim (2000)3308Bryant (1997)3299O'Leary (1998)31129Coakley and Brown (2000)31611Boritz et al.(1995)291112Singh and Huhns (1999)28612Feelders (2000)28514Barniv et al. (1997)26614Foster (1995)26016Maher and Sen (1997)25817Chung and Tam (1993)21817Coakley and Brown (1993)21519Kwon et al. (1997)20819Scacchi and Mi (1997)20319Fortin and Kuzmics (2002)20122Jhee and Lee (1993)18622Fu et al. 2002)18222Antoniou and Arief (2001)18122Yan et al. (2001)18026Etheridge and Sriram (1997)17627Brown and Gupta (1994)16827Srivastava et al. (1996)16627Poh et al. (1998)16427Jung et al.(1999)16431McKee (2000)14831Wuthrich (1997)14133Bell (1997)13433Lee and Lee (1998)13435Lin and Carley (1993)11935Morris (1994)11435Rockwell and McCarthy (1999)11135Ramamoorti et al. (1999)11135Kloptchenko et al. (2004)11040Stefanowski and Wilk (2001)10640Kauffman et al. (2000)10440O'Leary and Watkins (1992)10340Chen et al. (1999)10240Bons et al. (1999)10240Charitou et al. (1996)10240Hellstrom and Holmstrom (2000)10140Lenard et al. (2001)101 References Mohammad Abdolmohammadi, Catherine Usoff, A longitudinal study of applicable decision aids for detailed tasks in a financial audit, International Journal of Intelligent Systems in Accounting, Finance and Management, Volume 10, Number 3, pp. 139-154, 2001. Murugan Anandarajan, Picheng Lee, Asokan Anandarajan, Bankruptcy prediction of financially stressed firms: an examination of the predictive accuracy of artificial neural networks, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 10, number 2, pp. 69-81, 2001. G. Antoniou and M. Arief, Executable Declarative Business Rules and Their Use in Electronic Commerce, International Journal of Intelligent Systems in Accounting, Finance and Management, 2001, Volume 10, number 4, pp. 211-223. Dirk-Emma Baestaens, Credit risk modeling strategies: the road to serfdom?, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 8, Number 4, pp. 225-235, 1999. R Barniv, A Agarwal, R Leach, "Predicting the outcome following bankruptcy filing: A three-state classification using neural nets, International Journal of Intelligent Systems in Accounting, Finance and Management 1997, Volume 6, Number 3, pp. 177-194. Timothy B. Bell Neural nets or the logit model? A comparison of each models ability to predict commercial bank failures, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 6, Number 3, pp. 249-264, 1997 Meral Binbasioglu, Edward J. Zychowicz, Knowledge-based management support: an application of diagnostic reasoning to corporate financing decisions, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 7, Number 4, pp. 199-211, 1998. R.W.H. Bons, R.M. Lee and R.W Wagenaar Computer-aided auditing of inter-organizational trade procedures, International Journal of Intelligent Systems in Accounting, Finance and Management. Volume 8, Number 1, pp. 25-44, 1999. JE Boritz, DB Kennedy, A Albuquerque, Predicting corporate failure using a neural network approach. International Journal of Intelligent Systems in Accounting, Finance and Management 1995, Volume 4, Number 2, pp. 95-109. CE Brown, UG Gupta, Applying case-based reasoning to the accounting domain, International Journal of Intelligent Systems in Accounting, Finance and Management, 1994, Volume 3, Number 3, pp. 205-117. Jeanette Bruno, Facilitating knowledge flow through the enterprise, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 11, Number 1, pp. 1-8, 2002. S. M. Bryant, A Case-based Reasoning Approach to Bankruptcy Prediction, International Journal of Intelligent Systems in Accounting, Finance and Management 1997, Volume 6, Number 3, pp. 195-214. A Charitou and C Charalambous, The Prediction of Earnings Using Financial Statement Information: Empirical Evidence With Logit, International Journal of Intelligent Systems in Accounting, Finance and Management ,1996, Volume 5, Number 2, pp. 199-215. Shu-Heng Chen, Wo-Chiang Lee, Chia-Hsuan Yeh, Hedging derivative securities with genetic programming, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 8, number 4, pp. 237-251, 1999. (23) HMM Chung, KY Tam, A comparative analysis of inductive-learning algorithms, International Journal of Intelligent Systems in Accounting, Finance and Management 1993, Volume 2, Number 1, p. 3-19. JR Coakley, CE Brown, Artificial neural networks applied to ratio analysis in the analytical review process, International Journal of Intelligent Systems in Accounting, Finance and Management 1993, Volume 2, Number 1, pp. 19-39. James R. Coakley, Carol E. Brown, Artificial neural networks in accounting and finance: modeling issues, International Journal of Intelligent Systems in Accounting, Finance and Management volume 9, number 2, pp. 119 144, 2000. (1) Philip A Collier, Stewart A Leech, Nicole Clark, A validated expert system for decision making in corporate recovery, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 8, Number 2, pp. 75-88, 1999. (44) Jefferson T. Davis, Athanasios Episcopos 2, Sannaka Wettimuny, Predicting direction shifts on Canadian-US exchange rates with artificial neural networks, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 10, Number 2, pp. 83-96, 2001. (32) Keith Decker, Quantitative Modeling of Complex Environments, International Journal of Intelligent Systems in Accounting, Finance and Management International of Intelligent Systems in Accounting, Finance and Management, 1994, Volume 2, number 4, pp. 215-235. Ashutosh Deshmukh and Lakshminarayana Talluru 2 A rule-based fuzzy reasoning system for assessing the risk of management fraud, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 7, number 4, pp. 223-241, 1998. Diamond, A., What is a Citation Worth? Journal of Human Resources, Volume 21, pp. 200-215, 1986. HL Etheridge and RS Sriram, A comparison of the relative costs of financial distress models: artificial neural networks, logit, and Multivariate discriminant Analysis, International Journal of Intelligent Systems in Accounting, Finance and Management 1997, Volume 6, Number 3, pp. 235-248. Kurt M. Fanning and K. O. Cogger, A Comparative Analysis of Artificial neural Networks using Financial Distress Prediction, International Journal of Intelligent Systems in Accounting, Finance and Management, 1994, Volume 3, Number 4, pp. 241-252. Kurt M. Fanning and Kenneth O. Cogger, Neural network detection of management fraud using published financial data, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 7, Number 1, pp. 21-41, 1998. A.J. Feelders, Credit scoring and reject inference with mixture models, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 9, Number 1, pp. 1-8, 2000. Ehsan Habib Feroz, Taek Mu Kwon, Victor S. Pastena, Kyungjoo Park, The efficacy of red flags in predicting the SEC's targets: an artificial neural networks approach, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 9, Number 3, pp. 145 157, 2000. I Fortin and C Kuzmics, Tail-Dependence in Stock-Return Pairs International Journal of Intelligent Systems in Accounting, Finance and Management , 2002, Volume 11, Number 2, pp. 89-107. DA Foster, FRA: Teaching Financial Accounting with a Goal-Based Scenario International Journal of Intelligent Systems in Accounting, Finance and Management 1995. Volume 4, Number 3, pp. 173-195. Sebastian Fritz and Detlef Hosemann, Restructuring the credit process: behaviour scoring for german corporates, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 9, Number 1, pp. 9 21, 2000. Y Fu, MY Shih, M Creado,"Reorganizing Web Sites Based on User Access Patterns, International Journal of Intelligent Systems in Accounting, Finance and Management 2002, Volume 11, Number 1, pp. 39-53. CHRISTIAN HAEFKE, MARTIN NATTER, TARUN SONI, HEINRICH OTRUBA, Adaptive Methods in Macroeconomic Forecasting, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 6, Number 1, pp. 1-10, 1998. Sharon Kay Heatley, James R. Otto, Data mining computer audit logs to detect computer misuse, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 7, Number 3, pp. 125-134, 1998. Thomas Hellstrm and Kenneth Holmstrm, The relevance of trends for predictions of stock returns, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 9, number 1, 2000, pp. 23-34. Joachim Herbst and Dimitris Karagiannis, Integrating machine learning and workflow management to support acquisition and adaptation of workflow models International Journal of Intelligent Systems in Accounting, Finance and Management Volume 9, Number 2, pp. 67-92, 2000. Hirsch, J.E., An Index to quantify an Individuals Scientific Research Output, available at  HYPERLINK "http://www.cs.ucla.edu/~palsberg/hirsch05.pdf" http://www.cs.ucla.edu/~palsberg/hirsch05.pdf, 29 September 2005. Howitt, M., ISI Spins a Web of Science, Database, April/May, 1998, pp. 37-40. Soon-Young Huh and Kyoung-Ll Bae, Dynamic web server construction on the intranet using a change management framework, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 8, Number 1, pp. 45-60, 1999. Changduk Jung, Ingoo Han, Bomil Suh, Risk analysis for electronic commerce using case-based reasoning, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 8, Number 1, pp. 61-73, 1999. C Jung, I Han, and B Suh, Risk Analysis for Electronic Commerce Using Case-Based Reasoning, International Journal of Intelligent Systems in Accounting, Finance and Management 1999, Volume 8, Number 1, pp. 61-73. WC Jhee and JK Lee, Performance of neural networks in managerial forecasting International Journal of Intelligent Systems in Accounting, Finance and Management (1993), Volume 2, number 1, pp. 55-70. Robert J. Kauffman, Salvatore T. March, Charles A. Wood, Design principles for long-lived Internet agents, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 9, number 4, pp. 217-236, 2000. Sang-Ii Kim, Jae Kyeong Kim 2, Soung Hie Kim 1Development of a case-based decision support system for process modeling in BPR, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 9, Number 2, pp. 93-105, 2000. Steven Kim, Learning agent architecture for design and manufacturing knowledge on the Web: an extension of enterprise resource planning capabilities, Volume 8, Number 1, pp. 15 24, International Journal of Intelligent Systems in Accounting, Finance and Management 1999. K Kohara, T Ishikawa, Y Fukuhara, Y Nakamura, Stock price prediction using prior knowledge and neural networks, International Journal of Intelligent Systems in Accounting, Finance and Management 1998, Volume 6, Number 1, pp. 11-22. A Kloptchenko, T Eklund, J Karlsson and B Back, Combining data and text mining techniques for analysing financial reports International Journal of Intelligent Systems in Accounting, Finance and Management (2004), Volume 12, Number 1, pp. 29-45. YS Kwon, IG Han, KC Lee, Ordinal pairwise partitioning (OPP) approach to neural networks training in bond rating International Journal of Intelligent Systems in Accounting, Finance and Management 1997, Volume 6, Number 1, pp. 23-40. Carsten Lanquillon, Dynamic aspects in neural classification, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 8, Number 4, pp. 281-296, 1998. Jae Kwang Lee, Jae Kyeong Kim and Soung Hie Kim, A methodology for modeling influence diagrams: a case-based reasoning approach, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 9, Number 1, pp. 55-63, 2000. Jae Kyu Lee and Woongkyu Lee, An intelligent agent-based competitive contract process: UNIK-AGENT, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 7, Number 2, pp. 91-105. Mary Jane Lenard, Pervaiz Alam, David Booth and Gregory Madey, Decision-making capabilities of a hybrid system applied to the auditor's going-concern assessment, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 10, number 1, pp. 1-23, 2001. Z Lin and K Carley, Proactive or reactive: An analysis of the effect of agent style on organizational decision making International Journal of Intelligent Systems in Accounting, Finance and Management 1993, Volume 2, number 4, pp. 271-287. J. J. Maher and T.K. Sen, Predicting Bond Rating Using Neural Netowrks: A Comparison with Logistic Regression, International Journal of Intelligent Systems in Accounting, Finance and Management, 1997, Volume 6, Number 1, pp. 59-72. Thomas E. Mckee, Developing a bankruptcy prediction model via rough sets theory, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 9, Number 3, pp. 159-173, 2000. Alfredo Milani and Stefano Marcugini Stockbot: a monitoring and acting software agent for stock markets, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 8, Number 1, pp. 3-14, 1999. BW Morris, SCAN: a case-based reasoning model for generating information system control recommendations International Journal of Intelligent Systems in Accounting, Finance and Management 1994, Volume 3, Number 1, pp. 47-65. Mark Nissen, Agent-based supply chain disintermediation versus re-intermediation: economic and technological perspectives, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 9, Number 4, pp. 237-256, 2000. Sudhir Nanda and Parag Pendharkar, Linear models for minimizing misclassification costs in bankruptcy prediction, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 10, Number 3, pp. 155-168, 2001. Daniel E. OLeary, Using neural networks to predict corporate failure, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 7, Number 3, pp. 187-197, 1998. Daniel E. OLeary, Management of reengineering knowledge: AI-based approaches, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 9, Number 2, pp. 107-118, 2000. Daniel E. OLeary and Paul Watkins, Integration of Intelligent Systems and Conventional Systems, International Journal of Intelligent Systems in Accounting, Finance and Management 1992, Volume 1, Number 2, pp. 135-145. Hwee-Leng Ong, Ah-Hwee Tan, Jamie Ng, Hong Pan, Qiu-Xiang Li Organizing and personalizing intelligence gathering from the web, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 11, Number 1, pp. 9-21, 2002 Hean-Lee Poh, Jingtao Yao, Teo Ja INCLUDEPICTURE "http://www3.interscience.wiley.com/giflibrary/12/scaron.gif" \* MERGEFORMATINET ic Neural networks for the analysis and forecasting of advertising and promotion impact, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 7, Number 4, 1998, pp. 253-268. Sridhar Ramamoorti, Andrew D. Bailey Jr., Richard O. Traver, Risk assessment in internal auditing: a neural network approach, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 8, Number 3, pp. 159-180, 1999. Stephen R. Rockwell and William E. McCarthy, REACH: automated database design integrating first-order theories, reconstructive expertise, and implementation heuristics for accounting information systems, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 8, Number 3, pp. 181-197, 1999. Schacchi, W., and Mi, P. Process Life Cycle Engineering: A Knowledge-based Approach and Environment, International Journal of Intelligent Systems in Accounting, Finance and Management 1997, Volume 6, Number 2, pp. 83-107. Munindar P. Singh , Michael N. Huhns, Multiagent systems for workflow, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 8, Number 2, pp. 105-117, 1999. R. Slowinski and C. Zopounidis, Application of the Rough Set approach to evaluation of bankruptcy risk, International Journal of Intelligent Systems in Accounting, Finance and Management, 1995, Volume 4, Number 1, pp. 27-47. Smith, S., IS an Article in a Top Journal a Top Article, Financial Management, Winter 2004, pp. 133-149. William E. Spangler and James M. Peters, Management control of complex, mission-critical processes, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 9, number 3, 175-193, 2000. R. P. Srivastava, S.K. Dutta, R. W. Johns, An Expert System Approach to Audit Planning and Evaluation in the Belief Function Framework, International Journal of Intelligent Systems in Accounting, Finance and Management 1996, Volume 5, pp. 165. Jerzy Stefanowski and Szymon Wilk, Evaluating business credit risk by means of approach-integrating decision rules and case-based learning, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 10, number 2, pp. 97-114, 2001. Philip Swicegood and Jeffrey A. Clark, Off-site monitoring systems for predicting bank underperformance: a comparison of neural networks, discriminant analysis, and professional human judgment, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 10, number 3, pp. 169-186, 2001. Alfred Taudes, Martin Natter, Michael Trcka, Real option valuation with neural networks, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 7, Number 1, pp. 43-52, 1998. Zoran Vojinovic, Vojislav Kecman, Rainer Seidel A data mining approach to financial time series modelling and forecasting, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 10, Number 4, pp. 225-239, 2001. Shouhong Wang, Cluster a International Journal of Intelligent Systems in Accounting, Finance and Management nalysis using a validated self-organizing method: cases of problem identification, Volume 10, number 2, 2001, pp. 127-138. D. J. Wu, Agent-based stochastic production lines design, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 9, Number 4, 2000, pp. 257-270. B Wuthrich, Discovering Probabilistic Decision Rules International Journal of Intelligent Systems in Accounting, Finance and Management 1997, Volume 6, Number 4, pp. 269-277. R. Yager, A game-theoretic approach to decision making under uncertainty, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 8, Number 1, pp. 131-143, 1999. Yonghe Yan, Jerome Yen, Tung Bui, A multi-agent-based negotiation support system for distributed transmission cost allocation, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 10, Number 3, 2001, pp. 187-200. Ai Cheo Yeo, Kate A. Smith 1, Robert J. Willis 1, Malcolm Brooks 2 Clustering technique for risk classification and prediction of claim costs in the automobile insurance industry, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 10, Number 1, pp. 39-50, 2001. Chien-Chih Yu, Hung-Chao Yu, Chi-Chun Chou, The impacts of electronic commerce on auditing practices: an auditing process model for evidence collection and validation, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 9, Number 3, pp. 195-216, 2000. Song Jin Yu, Sang Chan Park, Jyun-Cheng Wang, Decision making using time-dependent knowledge: knowledge augmentation using qualitative reasoning, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 10, Number 1, pp. 51-66. Giorgos Zacharia, Theodoros Evgeniou, Pattie Maes, Dynamic pricing in a reputation-brokered agent-mediated marketplace, International Journal of Intelligent Systems in Accounting, Finance and Management Volume 9, Number 4, pp. 271-286, 2000.      PAGE \* MERGEFORMAT 5 UV  ! " L ` a h x y  ; < U   [ \ ^ _ ` ͹յձՠh4hGthOUhh1hhQh}z|hyr hyr5h+h2hx hgh h-h10Jjh1Ujh1Uh1hyrh5CJ\aJhyr5CJ\aJhyrhyr5CJ\aJ2VWi_ ` I J T U gd1gd[$hh]h^ha$gdOUgd}z|$a$gd1` v   $ I J S T  xyIJ<=lmtxիիէէէէգգ՛hochRdhShFZfh`gh9ghOhO5 hO5h~hGthGthGt5 h[5hUhOh&Z]h[H*h[h[6h1h15 h}z|h[hkgh[;yz<=2"3""gdW $a$gd-gd[gdFZfgdOgd[K i !!!!!!""0"3"i"w"""""""""""###F$ÿ˟˧hochtCJaJhVhADh'hth`ghNO6ht*h;ShNOhCh-h-5h&Z]hQhkhk5 hO5hkhvh[6h[h[5h[hFZfhoc8""+####\$]$&&+&,&k(l(((++%+&+++++---gdT$a$gdyr^gdocgdW F$L$[$o$z$$$$$$l%%%%%%%&&&&*&+&,&S&{&}&~&& ''3'6'L(i(j(l(((((((()>)¸ˋzsss hT0J\hThT0J\ hh0J\hThW 0J\ hAD0J\ ht*0J\ h&0J\ h1sZ0J\ hW 0J\hW hW 0J\h%x0J5\hW 0J5\hyrhyr0J5\hW h&hgh'ht*hthQhh->)N)e))))/*1*R**+++%+&+`+a+b++++++++,,,,,,,,,,4-~-------.U/V/W/`/ɿܵܵ܊܃|ܘܑ㘵 hV0J\ h`g0J\ hAD0J\ h~~0J\h hT0J\hT0J5\h^hT0J\h^h^0J\h^hW 0J\hW 0J5\hTh%A0J\ hT0J\ hLh0J\ ht0J\ ht*0J\ hh0J\/--V/W/x/y/2222<5=5U5V566=8>8g8h88888:::gdLh$a$gdyrgdmgdW gdT`/w/x/y//0T2l2r22222222222G3`3a3333_444;5=5U5V55%6666䳧ȗȐȉ}vohvha hGt0J\ h|0J\ h`g0J\ hb? 0J\hb? hb? 0J5\ hx 0J\ hP"N0J\ h'0J\hx 0J5\h}z|h}z|0J5\ h 0J\ hAD0J\ hT0J\ h}z|0J\ h^0J\ h40J\ hT0J\h^h^0J\hW 0J5\h^0J5\$6677,7.7R7]7{77<8=8>8h88888_9a9b99999 :2:]:a:::::::::;<ʭzpib h20J\ hS0J\hShS0J\hS0J5\ h)c0J\ h0J\ hLh0J\ h~~0J\ hg0J\ hW 0J\hW hW 0J\hLh0J5\hLhhLh0J\hW 0J5\h3e0J5\ hb? 0J\ h|0J\ h0J\ hm0J\ h2>0J\&::<<<<????XCCCCCCC $Ifgd`$a$gdni$a$gdyrgdW <6<y<<<<<<<<<<C=M=>^>h>>>>>???????@ @@@@@@@@@@AAAEBOCCCCüõyhFZf0J5\h`0J5\ hx 0J\ h0J\ h 0J\ h20J\ hG]l0J\ hv0J\ hW 0J\ h}z|0J\hW hW 0J\hW 0J5\hShS0J\ h)c0J\hD]hD]0J\ hD]0J\ h|7#0J\.CCCCCCCCCCCCCCCCCCDDDDD&D*D-D.D0DADEDGDHDJDcDgDjDkDmDDDDDDDDDDDDDDDDDDDDDDDDDDDE"EȳޥȳȳȳȳȳȳȳȳȳȳޥhF;CJOJQJ^JaJ)h`h`B*CJOJQJ^JaJphh`h`CJaJh`h`CJaJ h`h`CJOJQJ^JaJ hyr5hyrh`0J5\ACCCCCCh\S\G $$Ifa$gdF; $Ifgd` $$Ifa$gd`kd$$Ifl\gggg t644 lBalp(yt`CCCCCCh\S\\ $Ifgd` $$Ifa$gd`kd$$Ifl;\ggGg t644 lBalp(yt`CCCDDDh\S\\ $Ifgd` $$Ifa$gd`kd$$Ifl;\ggGg t644 lBalp(yt`DDD&D*D-Dh\S\\ $Ifgd` $$Ifa$gd`kd$$Ifl;\ggGg t644 lBalp(yt`-D.D0DADEDGDh\S\\ $Ifgd` $$Ifa$gd`kd%$$Ifl;\ggGg t644 lBalp(yt`GDHDJDcDgDjDh\S\\ $Ifgd` $$Ifa$gd`kdH$$Ifl;\ggGg t644 lBalp(yt`jDkDmDDDDh\S\\ $Ifgd` $$Ifa$gd`kdk$$Ifl;\ggGg t644 lBalp(yt`DDDDDDh\S\\ $Ifgd` $$Ifa$gd`kd$$Ifl;\ggGg t644 lBalp(yt`DDDDDDh\S\\ $Ifgd` $$Ifa$gd`kd $$Ifl;\ggGg t644 lBalp(yt`DDDDDDh\S\\ $Ifgd` $$Ifa$gd`kd $$Ifl;\ggGg t644 lBalp(yt`DDDDDDh\S\\ $Ifgd` $$Ifa$gd`kd $$Ifl;\ggGg t644 lBalp(yt`DDE"E&E(Eh\S\\ $Ifgd` $$Ifa$gd`kd $$Ifl;\ggGg t644 lBalp(yt`"E&E(E)E,E>EBEDEEEHE]EaEdEeEhEEEEEEEEEEEEEEEEEEEEEEEEEEEEFFFFFFFF,F0F2F3F6FAFEFGFHFKF^Fõ٧ΙhCJOJQJ^JaJhhCJOJQJ^JaJh`h`5CJ\aJh`h`CJaJh`h`CJaJ h`h`CJOJQJ^JaJ)h`h`B*CJOJQJ^JaJph<(E)E,E>EBEDEh\S\\ $Ifgd` $$Ifa$gd`kd=$$Ifl;\ggGg t644 lBalp(yt`DEEEHE]EaEdEh\S\\ $Ifgd` $$Ifa$gd`kd`$$Ifl;\ggGg t644 lBalp(yt`dEeEhEEEEh\S\\ $Ifgd` $$Ifa$gd`kd$$Ifl;\ggGg t644 lBalp(yt`EEEEEEh\S\\ $Ifgd` $$Ifa$gd`kd$$Ifl;\ggGg t644 lBalp(yt`EEEEEEh\S\\ $Ifgd` $$Ifa$gd`kd$$Ifl;\ggGg t644 lBalp(yt`EEEEEEh\S\G $$Ifa$gdh $Ifgd` $$Ifa$gd`kd$$Ifl;\ggGg t644 lBalp(yt`EEEEEEh\S\\ $Ifgd` $$Ifa$gd`kd$$Ifl;\ggGg t644 lBalp(yt`EFFFFFh\S\\ $Ifgd` $$Ifa$gd`kd2$$Ifl;\ggGg t644 lBalp(yt`FFF,F0F2Fh\S\\ $Ifgd` $$Ifa$gd`kdU$$Ifl;\ggGg t644 lBalp(yt`2F3F6FAFEFGFh\S\\ $Ifgd` $$Ifa$gd`kdx$$Ifl;\ggGg t644 lBalp(yt`GFHFKF^FbFeFh\S\\ $Ifgd` $$Ifa$gd`kd$$Ifl;\ggGg t644 lBalp(yt`^FbFeFfFgFhFiFFFFFFFFFFFFFFFFFFFFFFFFFFGGGGGGGG:G>G@GAGDG_GcGeGfGgGhGiG}GGGGGGGGGٵٵٵٵٵٵٵٵٙٵٵh^CJOJQJ^JaJhF;CJOJQJ^JaJh`h`CJaJhCJOJQJ^JaJh`h`CJaJ h`h`CJOJQJ^JaJ)h`h`B*CJOJQJ^JaJphG@Gh\S\\ $Ifgd` $$Ifa$gd`kd!$$Ifl;\ggGg t644 lBalp(yt`@GAGDG_GcGeGh\S\\ $Ifgd` $$Ifa$gd`kd"$$Ifl;\ggGg t644 lBalp(yt`eGfGiG}GGGh\S\\ $Ifgd` $$Ifa$gd`kd#$$Ifl;\ggGg t644 lBalp(yt`GGGGGGh\S\\ $Ifgd` $$Ifa$gd`kd$$$Ifl;\ggGg t644 lBalp(yt`GGGGGGh\S\\ $Ifgd` $$Ifa$gd`kd&$$Ifl;\ggGg t644 lBalp(yt`GGGGGGGGGGGGGGGGHH H HH-H1H4H5H8HOHSHUHVHkHoHqHrHuHHHHHHHHHHHHHHHHHHHHHHHHII I!I$I0I4I6I7IϨhCJOJQJ^JaJh^CJOJQJ^JaJh`h`CJaJ)h`h`B*CJOJQJ^JaJphh`h`CJaJ h`h`CJOJQJ^JaJBGGGGGGh\S\\ $Ifgd` $$Ifa$gd`kd?'$$Ifl;\ggGg t644 lBalp(yt`GGGGGGh\S\\ $Ifgd` $$Ifa$gd`kdb($$Ifl;\ggGg t644 lBalp(yt`GGGHH Hh\S\\ $Ifgd` $$Ifa$gd`kd)$$Ifl;\ggGg t644 lBalp(yt` H HH-H1H4Hh\S\\ $Ifgd` $$Ifa$gd`kd*$$Ifl\ggGg t644 lBalp(yt`4H5H8HOHSHUHh\S\\ $Ifgd` $$Ifa$gd`kd+$$Ifl;\ggGg t644 lBalp(yt`UHVHYHkHoHqHh\S\\ $Ifgd` $$Ifa$gd`kd,$$Ifl;\ggGg t644 lBalp(yt`qHrHuHHHHh\S\\ $Ifgd` $$Ifa$gd`kd.$$Ifl\ggGg t644 lBalp(yt`HHHHHHh\S\\ $Ifgd` $$Ifa$gd`kd4/$$Ifl;\ggGg t644 lBalp(yt`HHHHHHh\S\\ $Ifgd` $$Ifa$gd`kdW0$$Ifl;\ggGg t644 lBalp(yt`HHHHHHh\S\\ $Ifgd` $$Ifa$gd`kdz1$$Ifl;\ggGg t644 lBalp(yt`HHHII Ih\S\\ $Ifgd` $$Ifa$gd`kd2$$Ifl;\ggGg t644 lBalp(yt` I!I$I0I4I6Ih\S\\ $Ifgd` $$Ifa$gd`kd3$$Ifl;\ggGg t644 lBalp(yt`6I7I:IRIVIXIh\S\\ $Ifgd` $$Ifa$gd`kd4$$Ifl;\ggGg t644 lBalp(yt`7I:IRIVIXIYI\I}IIIIIIIIIIIIIIIIIIIJJJ@JAJIJPJWJXJJJJJJJJJ K K$K%K:K;KRKSKTKsKĿhtCJOJQJ^JaJhthtCJaJ hthtCJOJQJ^JaJhnihFZfh^h` h`5h`h`CJaJ)h`h`B*CJOJQJ^JaJphh`h`CJaJ h`h`CJOJQJ^JaJ4XIYI\I}IIIh\S\\ $Ifgd` $$Ifa$gd`kd6$$Ifl;\ggGg t644 lBalp(yt`IIIIIIh\S\\ $Ifgd` $$Ifa$gd`kd)7$$Ifl;\ggGg t644 lBalp(yt`IIIIIIh\S\\ $Ifgd` $$Ifa$gd`kdL8$$Ifl;\ggGg t644 lBalp(yt`IIIJJ!J2J@Jh`XLLLL $$Ifa$gdt$a$gd`$a$gdnikdo9$$Ifl;\ggGg t644 lBalp(yt`@JAJCJQJTJWJdXXXX $$Ifa$gdtkd:$$IfTl\\jgpgH GG t8644 lBaXp(yttTWJXJZJzJ}JJdXXXX $$Ifa$gdtkdm;$$IfTl\\jgpgH gg t8644 lBaXp(yttTJJJJJJdXXXX $$Ifa$gdtkdH<$$IfTl\\jgpgH gg t8644 lBaXp(yttTJJJJJJdXXXX $$Ifa$gdtkd#=$$IfTl\\jgpgH gg t8644 lBaXp(yttTJJJJJJdXXXX $$Ifa$gdtkd=$$IfTl\\jgpgH gg t8644 lBaXp(yttTJJJKK KdXXXX $$Ifa$gdtkd>$$IfTl\\jgpgH gg t8644 lBaXp(yttT K K KK"K$KdXXXX $$Ifa$gdtkd?$$IfTl\\jgpgH gg t8644 lBaXp(yttT$K%K'K5K8K:KdXXXX $$Ifa$gdtkd@$$IfTl\\jgpgH gg t8644 lBaXp(yttT:K;K=KLKOKRKdXXXX $$Ifa$gdtkdjA$$IfTl\\jgpgH gg t8644 lBaXp(yttTRKSKUKnKqKsKdXXXX $$Ifa$gdtkdEB$$IfTl\\jgpgH gg t8644 lBaXp(yttTsKtKwKKKKdXXXX $$Ifa$gdtkd C$$IfTl\\jgpgH gg t8644 lBaXp(yttTsKtKKKKKKKKKKKKKKLLL;LL]L^LyLzL|LLLLLLLLLLLLLMMMM/M0MTMUMtMuMMMMMMMMMMMMMMMMNNNN,N-NKNLNMNNNbNcNdNeN{NNhtCJOJQJ^JaJh~~CJOJQJ^JaJ hthtCJOJQJ^JaJhthtCJaJOKKKKKKdXXXX $$Ifa$gdtkdC$$IfTl\\jgpgH gg t8644 lBaXp(yttTKKKKKKdXLLL $$Ifa$gdt $$Ifa$gd~~kdD$$IfTl\\jgpgH gg t8644 lBaXp(yttTKKKKKKdXXXX $$Ifa$gdtkdE$$IfTl\\jgpgH gg t8644 lBaXp(yttTKKKKKKdXLLL $$Ifa$gdt $$Ifa$gd~~kdF$$IfTl\\jgpgH gg t8644 lBaXp(yttTKLLLLLdXXXX $$Ifa$gdtkdgG$$IfTl\\jgpgH gg t8644 lBaXp(yttTLL!L6L9L;LdXXXX $$Ifa$gdtkdBH$$IfTl\\jgpgH gg t8644 lBaXp(yttT;L*\h*5h\ h*5hh hMf\ h`5h`hyph1hCJOJQJ^JaJh~~CJOJQJ^JaJhthtCJaJ hthtCJOJQJ^JaJ5NNNNNNdXLLL $$Ifa$gdt $$Ifa$gd~~kd9Z$$IfTl\\jgpgH gg t8644 lBaXp(yttTNNNNNNdXLLL $$Ifa$gdt $$Ifa$gd~~kd[$$IfTl\\jgpgH gg t8644 lBaXp(yttTNNNNNNdXXXX $$Ifa$gdtkd[$$IfTl\\jgpgH gg t8644 lBaXp(yttTNNN OOOdXLLL $$Ifa$gdt $$Ifa$gd~~kd\$$IfTl\\jgpgH gg t8644 lBaXp(yttTOOO1O4O6OdXLLL $$Ifa$gdt $$Ifa$gd~~kd]$$IfTl\\jgpgH gg t8644 lBaXp(yttT6O7O:OMOPOROdXLLL $$Ifa$gdt $$Ifa$gd~~kd^$$IfTl\\jgpgH gg t8644 lBaXp(yttTROSOVOiOlOnOdXLLL $$Ifa$gdt $$Ifa$gd~~kd[_$$IfTl\\jgpgH gg t8644 lBaXp(yttTnOoOrOOOOdXLLL $$Ifa$gdt $$Ifa$gd~~kd6`$$IfTl\\jgpgH gg t8644 lBaXp(yttTOOOOOOdXLLL $$Ifa$gdt $$Ifa$gd~~kda$$IfTl\\jgpgH gg t8644 lBaXp(yttTOOOOOOdXLLL $$Ifa$gdt $$Ifa$gd~~kda$$IfTl\\jgpgH gg t8644 lBaXp(yttTOOOOPPRRd\WOWGBgd=y & FgdT & FgdOgdMf$a$gd`kdb$$IfTl\\jgpgH gg t8644 lBaXp(yttTPPPQQQQ RRRRRRR"R%R+R,R-RwRyRRRRRRR SBSSSSSSSSSS:T@TATBTTTTTT֭΍|w h\ hd\ h*5hO h*5\h*5h]x\ h*5h]xhTshTshTs\ h]\ h^>*\h^h^\ hTs\ h^\h*5huV\h*5h\hh>*\h*5h=y\ h*5h=yh*5h\h*5hES\.RRRSSTTUUVVWWXXLYMYZ ZZgdES & Fgddh^hgdTsgd  & Fgdyrgd^ & Fgd^gdyp & Fgdyp & FgdOgdOgdTs & FgdTTTTUU7UUUUUUUUUFVVVVVVVVVVVVVVVV+W~WWWŽyri`ކWh*5h aJ$h*5h^aJ$h*5h^aJ h^h^h*5h aJhyr h*5h h*5h^ h^h^h^h\h^h\h^h\h^h>*\h^h^\ h*5h^ hyp\ h^\h*5h\hh>*\ htMU\h*5hyp\ h*5hyphTs!WWWWW X X]XbXXXXXXXX#Y)YKYLYMY]YYYYZZZ ZSZZZZZZZZZZZL[N[ûԻԌ}uql hU\hh&hh&hh&\ h\ hh&\ h\h*5h\h*5hES\ h*5hESh hTs>*\h]h]\ h}z|\h}z|h}z|\hTshTshTs\ h]\hh>*\ hTs\ h^\h^h^\ h*5h h*5h \)ZZ[[\\s]t]Y^Z^C_D_7`8`PaQaVbWbRcScccgdU & FgdUgdUgd%xgd]xgdgdTsgd%\gdyp & FgdOgdh&N[O[[[[[[[[[[1\\\\\\\\\\\\O]P]T]r]s]t]]]]]3^4^8^X^Y^Z^|^^__7_=_IJӥ搌搌}u}p h\h*5h\h*5hMf\ h*5hMfhTshTshTs\ hTs\h}z|h}z|\ h}z|\h*5h%\\h*5h(1aJ$h*5haJ$h*5h%\aJ$ h@&aJ h*5h%\hyphyphyp\ h\ h\hh>*\ ht\,=_>_B_C_u__ ` `*`0`1`6`8`J`L```b`w``$a%aCaJaOaPaQaaa3bTbWbhbibmbbbb)c*cQcRc|cccɺβɲ֧{wowh' chU>*hUh*5haJ$h*5h aJ$ haJh*5h aJ h*5h hh%x h*5h]xh*5hY\ h*5hYh*5h\ h\h*5h\hh>*\h*5h\ h*5hh*5hES\h*5hMf\+ccccc5d^d_ddddddeeeeeeeeeIfffffff g]g^gygggggggggggý̷祮̘爐{tptptphtMU h*5hOh*5hES\ h\h*5h\h*5h]x\ h*5h]x htMUaJ$h*5haJ$h*5h aJ$ hTaJ htMUaJh*5h aJ h*5h hph%Xh%xhyphhh>*\hhU hUhU*cddeeffgghhaibi%j&jkkkkllgdU & FgdUgdU & Fgdu)gd^gdTsgdgd]xgd  & FgdOgd%xgdyp & Fgd%xg)h{h|hhhhhhhhhhh7i8i:i>i`ibilimiiiiij$j%j&j9jIjKjjjjkkkkkk_kak剁yrnhd hdhdh*5h^\h*5hES\h*5h]x\ h*5h]xhtMUhTshTshTs\ h0\h0h0\ hTs\ hp\ h\ hT\hThT\ h*5hOh*5h\ h\h*5h\hh>*\h*5hO\+akbkkkkkkkkllIllllll mrmmmmmmmmmPnvnnnn ooaooooooooo!p#p$p%pRpSpܷܿ÷ܬܷܿܿܿܞ{h\hT0JjchTU h6]hTjhTUhTh*5hU5\ hUaJ hU\h*5hU\hUhhU>*\h*5hUaJ$ hUaJ h*5hUhphTshhh>*\ hdhd0lmmwnxnoohpppqqrr_s`s't(tuuv & FgdOgd]xgdTsgd`gdY & Fgd^^gdU & FgdU & FgdUgdpgdU & FgdUSpgppppppp0qqqqqqqqqqrcrdrrrrrrrrrrrrrr9s:s>s^s`sgsksrstssstt&t(t:tattttu u u uûʻ仳ìҝҝûʻ仳h@&hphTshh0 h0h0 h*5h`h*5h\h*5h=y\ h*5h=yh*5h\hh>*\h*5hY\ hu)\ h*5hYh`UhU>*hUhT9 uuuuu*u,u;uuuuuvvvv vvvwwwwwFwHwwwwwwwxxx&x4x}x~xxxxxxy뼳Ԫԑ{vԑqv ht\ hyp\h%Xh%Xh%X\ hkg\ h%X\ h\ h0\h0h0\ h*5h%\h*5haJ$h*5h%\aJ$h*5h%\\h*5h\h*5h\hh>*\h*5hO\ hu)\ h*5hO h*5h]x h*5h=y,v vwwxxxxyyzz{{q|r|}}~~~higd%x & Fgd^gd]xgd=y & Fgdypgdypgd^gdTsgdypgd%Xgd%\ & FgdOgdOyykyyyyyyyy"ztzuzzzzzzzzzzzz{q{r{{{{{{{{{{O|P|p|q|r||||||ƾ趾趩趈|uuu h*5h]x h*5h=y htMU\h*5hyp\ h*5hyphtMU h*5h h*5h^h*5h\ hE\h*5h\h*5h\ h*5hhTshTshTs\ hkg\ hTs\ h\hh>*\h0h0\ h0\-|}f}g}}}}}}}}}}}}~V~W~[~}~~Gghiz ,23456DEHZɿ؋{ulh*5h(1aJ$ htMUaJh*5h(1aJ h*5h(1h*5h=y\ h*5h=yh%xh%xh%x\ hp\ hh&\ hkg\ hyp\ h\ h2>\ h0\h0h0\ h*5h]xh*5h\ hE\h*5h\hh>*\h*5h]x\(i56ރ߃lmHI@Agd! & Fgd!gd! & Fgd%xgd%xgd%X & Fgd%Xgd^gdypgd(1gd=y & Fgd^!#~ҁӁׁtƂǂbՃۃ݃ރ߃&xyCþ͹ÖÖzvÖh%Xh%Xh%X\ h*5hh*5h\ hE\h*5h\h*5h^\ h*5h^hyphyphyp\ h\ h\hh>*\ hyp\ h0\h0h0\ h*5h(1h*5h(1\h*5h(1aJ$h*5haJ$-CDjkl΅ !%FGHIȆ?AbcćŇƇLJɇ rsÈňوlmƿ٦٦zvznzjzh.h*5h=y\htMU h*5h=y htMUaJ$h*5h!aJ$jdh*5h!Ujh*5h!Uh*5haJ$h*5h(1aJ$ h*5h(1 h*5h! h*5h%xhh0hhh>*\h%xh^ h*5h h*5h^ h*5h)݊ފefэҍgdT & FgdypgdypgdYgdGt & FgdGtgd%xgdMfgdTsgdTs & FgdTsgd]x & FgdOÉb܊݊DEЋӋXYx~Dcfҍ5Լȵ̭Ĝ|xԁh0 h0\h*5hO\ h*5hOhfBhGt>*hGth%xh*5h\ h.\h*5h-\ h*5h-hhh]hTsh*5h\hh>*\ htMU\h*5hTs\ h*5hTs h*5h]x h*5h=y/8ȏ1Ԑo‘EǵǭϦŸ躗{r{l h*5aJ$h*5haJ$h*5huVaJ$ h*5huV h*5hT hyp\h*5hyp\ h*5hyp hh&hyph*5h\ h.\h*5h\ h0\h*5hMf\ h*5hMf h*5hYh] hh&hhh>*\ hh&hh& h*5hO(UV˖̖Ǘȗ"#gdX  & Fgd gd.gdYgd=ygdTsgd!gd%\gduV & FgdO:œϓ"#ڔ,-STV`bݕޕPɖʖ֖ؖKŗƗӗ՗ǾݾǾݵή曟h*5h%\aJ hdaJh]hhTsh0 h0h0 h*5h!h*5h!aJ$h*5huVaJ$ h*5huVh*5h(1aJ$ h.aJ$h*5haJ$hh>*\h*5h%\aJ$ h*5h%\5 |ΘϘ$J!"35TVž䯾䍕vri_Vih]haJ$h]h>*\h]hYpaJ$htMUh]htMUaJ hYph. h.hYh*5h\h*5hY\ h*5hY h*5hh. h*5hh*5h=y\ h*5h=y h*5h%\h*5h(1aJ$ h.aJ$h*5haJ$hh>*\h*5h%\aJ$h*5h%\aJ  "()@ABCJKLh)cmHnHujhP"NUhP"NhwjjhwjU hX h !"#$%&'(DEFGHIJKL & Fgd $a$gdX ,1h/ =!"#$% DyK Oleary@usc.eduyK Dmailto:Oleary@usc.eduyX;H,]ą'c$$Ifl!vh55550#v#v#v#v0:V l t6,55559/ Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`!$$Ifl!vh55550#v#v#v#v0:V l; t6,555599/ /  / / / Balp(yt`$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttT$$IfX!vh5p5H 55#vp#vH #v:V l t86,5p5H 59/ BaXp(yttTEDyK .http://www.cs.ucla.edu/~palsberg/hirsch05.pdfyK thttp://www.cs.ucla.edu/~palsberg/hirsch05.pdfyX;H,]ą'cDd*R  S .Ascaronbq5b!_h4#+enq5b!_h4#PNG  IHDR O PLTE8~tRNS AbKGDH$tEXt Imported from GIF imagescaron.gif^v cmPPJCmp0712Om$IDATcXaÊ @ . 2\0aZ q IENDB`^ 2 0@P`p2( 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p 0@P`p8XV~_HmH nH sH tH @`@ NormalCJ_HaJmH sH tH DA`D Default Paragraph FontRi@R  Table Normal4 l4a (k (No List 6U@6 1 Hyperlink >*B*ph _l _mO! _a1 _w,B, *ygdd[$\$FVQF ;FollowedHyperlink >*B* ph@@b@ %\ List Paragraph ^4@r4 X Header  H$66 X Header CharCJaJ4 @4 X Footer  H$66 X 0 Footer CharCJaJ2B@2 T Body Textx<< TBody Text CharCJaJPK![Content_Types].xmlj0Eжr(΢Iw},-j4 wP-t#bΙ{UTU^hd}㨫)*1P' ^W0)T9<l#$yi};~@(Hu* Dנz/0ǰ $ X3aZ,D0j~3߶b~i>3\`?/[G\!-Rk.sԻ..a濭?PK!֧6 _rels/.relsj0 }Q%v/C/}(h"O = C?hv=Ʌ%[xp{۵_Pѣ<1H0ORBdJE4b$q_6LR7`0̞O,En7Lib/SeеPK!kytheme/theme/themeManager.xml M @}w7c(EbˮCAǠҟ7՛K Y, e.|,H,lxɴIsQ}#Ր ֵ+!,^$j=GW)E+& 8PK!Ptheme/theme/theme1.xmlYOo6w toc'vuر-MniP@I}úama[إ4:lЯGRX^6؊>$ !)O^rC$y@/yH*񄴽)޵߻UDb`}"qۋJחX^)I`nEp)liV[]1M<OP6r=zgbIguSebORD۫qu gZo~ٺlAplxpT0+[}`jzAV2Fi@qv֬5\|ʜ̭NleXdsjcs7f W+Ն7`g ȘJj|h(KD- dXiJ؇(x$( :;˹! I_TS 1?E??ZBΪmU/?~xY'y5g&΋/ɋ>GMGeD3Vq%'#q$8K)fw9:ĵ x}rxwr:\TZaG*y8IjbRc|XŻǿI u3KGnD1NIBs RuK>V.EL+M2#'fi ~V vl{u8zH *:(W☕ ~JTe\O*tHGHY}KNP*ݾ˦TѼ9/#A7qZ$*c?qUnwN%Oi4 =3ڗP 1Pm \\9Mؓ2aD];Yt\[x]}Wr|]g- eW )6-rCSj id DЇAΜIqbJ#x꺃 6k#ASh&ʌt(Q%p%m&]caSl=X\P1Mh9MVdDAaVB[݈fJíP|8 քAV^f Hn- "d>znNJ ة>b&2vKyϼD:,AGm\nziÙ.uχYC6OMf3or$5NHT[XF64T,ќM0E)`#5XY`פ;%1U٥m;R>QD DcpU'&LE/pm%]8firS4d 7y\`JnίI R3U~7+׸#m qBiDi*L69mY&iHE=(K&N!V.KeLDĕ{D vEꦚdeNƟe(MN9ߜR6&3(a/DUz<{ˊYȳV)9Z[4^n5!J?Q3eBoCM m<.vpIYfZY_p[=al-Y}Nc͙ŋ4vfavl'SA8|*u{-ߟ0%M07%<ҍPK! ѐ'theme/theme/_rels/themeManager.xml.relsM 0wooӺ&݈Э5 6?$Q ,.aic21h:qm@RN;d`o7gK(M&$R(.1r'JЊT8V"AȻHu}|$b{P8g/]QAsم(#L[PK-![Content_Types].xmlPK-!֧6 +_rels/.relsPK-!kytheme/theme/themeManager.xmlPK-!Ptheme/theme/theme1.xmlPK-! ѐ' theme/theme/_rels/themeManager.xml.relsPK] L 0247` F$>)`/6<C"E^FG7IsKNPTWN[=_cgakSp uy|CLOQSUVXY[\iu"-:CCCD-DGDjDDDDDD(EDEdEEEEEEF2FGFeFFFFFGG@GeGGGGGG H4HUHqHHHHH I6IXIIII@JWJJJJJ K$K:KRKsKKKKKKL;L]LyLLLLLM/MTMtMMMMMMN,NKNbNNNNNO6OROnOOOORZclviLPRTWZ]^_`abcdefghjklmnopqrstvwxyz{|}~g$hRhbLXXC*,7!@  @ 0(  B S  ?H0(  I3J3K3DiiwMsM9*urn:schemas-microsoft-com:office:smarttagsplace=*urn:schemas-microsoft-com:office:smarttags PlaceType=*urn:schemas-microsoft-com:office:smarttags PlaceName 0 "! !!!1!7!''22;;;;;<J<T<<<<<<<<<====r=z=====>>>$>s>}>>>>>>>? ??(?????@@@%@8@@@Y@\@u@{@@@@@@@@A AA:AAA\AgAlAuAAAAAZBcBhBrBBBBBBBBBBBUC\CwC}CCCCCCC DD?DFD}DDDDDDEEAEGExEEEEEE8F>FFFFFFFFFVGZGrGzGGGGGGGH HHHHHHII I II&J+JK KKKKKLLMMMMMMNNNNOORRRRGSLSSSSSSSSSwU~UcVjVLXVXWX`XdXkXlXuXWZ_Z`ZhZmZ|Z}ZZ[[0\5\H\T\\\]]^^____________``:b@bAbIbmbvbbbbb#c7cddeeeeffffffhhnhhhhhiiiiiiiijjckgk m&m.m3m4m7mo"o2o:oppppp&pbpkpq#qqqqqrrrrrrrrssssttttttuuvvvvswxw>xDxQxZx[xcxyzzz{{{{I~R~S~V~[~_~y~|~AEJMOV\_`bр׀ނǃރņʆ‡Ƈ7CĊŊΊيߊ(#*X` ̎ҎˏϏЏӏ9=#*+35>?GPT!"JM##''((AA)O9O-a9a΋ϋ!"JM3333333333 x y IJ$$V-%.....//,/./R/]/{//<0>022346^699E:O;JJ@LALLLbPP)QKQRRSSSSTUrU8VXV3ZTZ5\^\\\]]8a:a>a`ab$bccgggg>k^kl&lopppqq[v}vGwgwyy%~F~DDc!"JM x y IJ$$V-%.....//,/./R/]/{//<0>022346^699E:O;JJ@LALLLbPP)QKQRRSSSSTUrU8VXV3ZTZ5\^\\\]]8a:a>a`ab$bccgggg>k^kl&lopppqq[v}vGwgwyy%~F~DDc!"(CMh40{ xh ^`hH.h ^`hH.h pLp^p`LhH.h @ @ ^@ `hH.h ^`hH.h L^`LhH.h ^`hH.h ^`hH.h PLP^P`LhH.h ^`hH. ^`hH. pLp^p`LhH. @ @ ^@ `hH. ^`hH. L^`LhH. ^`hH. ^`hH. PLP^P`LhH.h{                  "g! \ ; .!hY^z 0&; eN2Y^BR4A'L'I>~~?A'L;Gq.!h\nz;GqeN2\nz'0& W(OMfX b? -xM,x0)cwjx D+"|7#h&oF)t**5 v5r*7;F;2>N@%AP"NONOES;STtMUuV Y^ Z1sZ%\D]&Z]^1U^``occRd3e8fFZf`g1hLhniG]lYpypyrTsGtt#v%x}z|u) k3 ^kgp_v=y*y[dTzW%@&%XTES0Og|hGt&1m2Ier4+yTNpUEKYth|~W V.P] ~~+2ADQ!TC]x(19g-|OUkk'@22822L8@UnknownG*Ax Times New Roman5Symbol3. *Cx ArialA BCambria Math"1hQʦi&i&}K }K 4d˓˓ 2qHX ?12!xxMOn the Relationship between the Undisclosed Number of Downloads and CitationsDataData  Oh+'0 ( 8D d p | POn the Relationship between the Undisclosed Number of Downloads and CitationsDataNormalData6Microsoft Office Word@2{@گ<-@N*@?C-}՜.+,D՜.+,x4 hp|   K˓ NOn the Relationship between the Undisclosed Number of Downloads and Citations Title< 8@ _PID_HLINKSA K.http://www.cs.ucla.edu/~palsberg/hirsch05.pdfMcmailto:Oleary@usc.edu  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./012345789:;<=?@ABCDEJRoot Entry F*C-LData f1Table<WordDocument.SummaryInformation(6DocumentSummaryInformation8>CompObjy  F'Microsoft Office Word 97-2003 Document MSWordDocWord.Document.89q