Results 1 - 10
of
8,367
Why Johnny can’t encrypt: A usability evaluation of PGP 5.0
, 1999
"... User errors cause or contribute to most computer security failures, yet user interfaces for security still tend to be clumsy, confusing, or near-nonexistent. Is this simply due to a failure to apply standard user interface design techniques to security? We argue that, on the contrary, effective secu ..."
Abstract
-
Cited by 479 (4 self)
- Add to MetaCart
standards: PGP 5.0. Our case study used a cognitive walkthrough analysis together with a laboratory user test to evaluate whether PGP 5.0 can be successfully used by cryptography novices to achieve effective electronic mail security. The analysis found a number of user interface design flaws that may
Developments in the Measurement of Subjective Well-Being
- Psychological Science.
, 1993
"... F or good reasons, economists have had a long-standing preference for studying peoples' revealed preferences; that is, looking at individuals' actual choices and decisions rather than their stated intentions or subjective reports of likes and dislikes. Yet people often make choices that b ..."
Abstract
-
Cited by 284 (7 self)
- Add to MetaCart
momentary utilities over time that Edgeworth had in mind. This is not the case, however. Numerous studies have related individuals' retrospective evaluations of an experience to their record of real-time reports. Although retrospective evaluations are related to the real-time reports
Lectures on special Lagrangian submanifolds
, 1999
"... Abstract. These notes consist of a study of special Lagrangian submanifolds of Calabi-Yau manifolds and their moduli spaces. The particular case of three dimensions, important in string theory, allows us to introduce the notion of gerbes. These offer an appropriate language for describing many signi ..."
Abstract
-
Cited by 185 (2 self)
- Add to MetaCart
Abstract. These notes consist of a study of special Lagrangian submanifolds of Calabi-Yau manifolds and their moduli spaces. The particular case of three dimensions, important in string theory, allows us to introduce the notion of gerbes. These offer an appropriate language for describing many
Motivation crowding theory
- Journal of Economic Surveys
, 2001
"... Abstract. The Motivation Crowding Effect suggests that external intervention via monetary incentives or punishments may undermine, and under different identifiable conditions strengthen, intrinsic motivation. As of today, the theoretical possibility of motivation crowding has been the main subject o ..."
Abstract
-
Cited by 203 (8 self)
- Add to MetaCart
of discussion among economists. This study demonstrates that the effect is also of empirical relevance. There exist a large number of studies, offering empirical evidence in support of the existence of crowding-out and crowding-in. The study is based on circumstantial evidence, laboratory studies by both
Modeling context-aware e-learning scenarios’, Paper presented
- in the Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, Kauai Island
, 2005
"... In the last decade, e-learning has been introduced to a variety of blended learning scenarios, such as life-long learning, University lectures, and game-based learning. In all these scenarios the learner’s situation or context is an essential asset in designing the learning process. Recent research ..."
Abstract
-
Cited by 18 (1 self)
- Add to MetaCart
including relationships between context and learning activities in the learning design models. The feasibility and applicability of our approach is demonstrated by a laboratory lecture case study, and respectively by a context-aware learning proto-type that was developed using RFID technology for sens
External validity of ‘‘trivial’’ experiments: The case of laboratory aggression.
- Review of General Psychology,
, 1997
"... The external validity of artificial "trivial" laboratory settings is examined. Past views emphasizing generalizability of relations among conceptual variables are reviewed and affirmed. One major implication of typical challenges to the external validity of laboratory research is tested w ..."
Abstract
-
Cited by 104 (26 self)
- Add to MetaCart
with aggression research: If laboratory research is low in external validity, then laboratory studies should fail to detect relations among variables that are correlated with aggression in "real-world" studies. Meta-analysis was used to examine 5 situational variables (provocation, violent media
Identification of regulatory regions which confer muscle-specific gene expression
- J. Mol. Biol
, 1998
"... For many newly sequenced genes, sequence analysis of the putative protein yields no clue on function. It would be bene®cial to be able to identify in the genome the regulatory regions that confer temporal and spatial expression patterns for the uncharacterized genes. Additionally, it would be advant ..."
Abstract
-
Cited by 181 (13 self)
- Add to MetaCart
be advantageous to identify regulatory regions within genes of known expression pattern without performing the costly and time consuming laboratory studies now required. To achieve these goals, the wealth of case studies performed over the past 15 years will have to be collected into predictive models
Should Computer Scientists Experiment More? - 16 Excuses to Avoid Experimentation
- IEEE Computer
, 1997
"... Computer scientists and practitioners defend the lack of experimentation with a wide range of arguments. Some arguments suggest that experimentation may be inappropriate, too difficult, useless, and even harmful. This article discusses several such arguments to illustrate the importance of experimen ..."
Abstract
-
Cited by 172 (1 self)
- Add to MetaCart
of experimentation for computer science. This is a preprint of an article with the same title that appeared in IEEE Computer, 31(5), May 1998, 32--40. Keywords: Empiricism, experiments, laboratory, scientific method. 1 Is computer science an experimental science? Do computer scientists need to experiment at all
Lecturer
, 2003
"... This paper introduces the concept of Networked Digital Libraries (NDLs). Discusses the important components of NDLs. Also presents case studies of a few NDLs. Summarizes the best practices for design and implementation effective NDLs. ..."
Abstract
- Add to MetaCart
This paper introduces the concept of Networked Digital Libraries (NDLs). Discusses the important components of NDLs. Also presents case studies of a few NDLs. Summarizes the best practices for design and implementation effective NDLs.
Behavioral theories and the neurophysiology of reward,
- Annu. Rev. Psychol.
, 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract
-
Cited by 187 (0 self)
- Add to MetaCart
-directed approach behavior, and decision making under uncertainty. Individual neurons can be studied in the reward systems of the brain, including dopamine neurons, orbitofrontal cortex, and striatum. The neural activity can be related to basic theoretical terms of reward and uncertainty, such as contiguity
Results 1 - 10
of
8,367