• Documents
  • Authors
  • Tables

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 241
Next 10 →

MyLearningMentor: A Mobile App to Support Learners Participating in MOOCs

by Carlos Alario-Hoyos , Iria Estévez-Ayres , Mar Pérez Sanagustín , Derick Leony , Carlos Delgado Kloos
"... Abstract: MOOCs have brought a revolution to education. However, their impact is mainly benefiting people with Higher Education degrees. The lack of support and personalized advice in MOOCs is causing that many of the learners that have not developed work habits and selflearning skills give them up ..."
Abstract - Add to MetaCart
-server architecture that makes use of external services (MOOC platforms). The client is a mobile application. The server includes 5 services, 3 databases, and several processes (3 in this example) that collect information from the external services. Arrows pointing at the databases indicate services or processes

Materials for an exploratory theory of the network society.

by Manuel Castells , Anthony Giddens , Alain Touraine , Anthony Smith , Benjamin Barber , Peter Hall , Roger-Pol Droit , Sophie Watson , Frank Webster , Krishan Kumar , David Lyon , Craig Calhoun , Jeffrey Henderson , Ramon Ramos , Jose E Rodrigues-Ibanez , Jose F Tezanos , Mary Kaldor , Stephen Jones , Christopher Freeman - The British Journal of Sociology , 2000
"... ABSTRACT This article aims at proposing some elements for a grounded theor y of the network society. The network society is the social structure characteristic of the Information Age, as tentatively identi ed by empirical, cross-cultural investigation. It permeates most societies in the world, in v ..."
Abstract - Cited by 122 (0 self) - Add to MetaCart
the construction of an analytical framework that could inform, and better organize, further research. However, given the dif culty of the task, and the necessarily collective character of this endeavour, what is presented here should be considered, literally, as materials to be used in the building of a

Correcting for endogeneity in strategic management research”.

by Barton H Hamilton , John M Olin , Jack A Nickerson , John M Olin , Joel Baum , Janet Bercovitz , Kurt Dirks , Hideo Owan , Will Mitchell , Patrick Moreton , Ed Zajack - Strategic Organization, , 2003
"... The field of strategic management is predicated fundamentally on the idea that managements' decisions are endogenous to their expected performance implications. Yet, based on a review of more than a decade of empirical research in the SMJ, we find that few papers econometrically correct for su ..."
Abstract - Cited by 49 (0 self) - Add to MetaCart
, estimating unbiased coefficients for these problems requires econometric methods that account for omitted variables. Such methods statistically correct for management's self-selection of a particular strategy. Failure to account for endogeneity can have important consequences. For instance, 1

Self-concordance at work: Toward understanding the motivational effects of transformational leaders.

by Joyce E Bono , Timothy A Judge - Academy of Management Journal, , 2003
"... We extend existing theories by linking transformational leadership to "self-concordance" at work. In two studies using diverse samples and methods, leader behaviors were associated with follower tendencies to set self-concordant goals. In general, followers of transformational leaders vie ..."
Abstract - Cited by 113 (3 self) - Add to MetaCart
this goal because of the fun and enjoyment it provides you" (identified and intrinsic items represent autonomous motivation). Participants answered all four questions for each of their six goals using a ninepoint scale (1 ϭ "not at all for this reason," to 9, "completely for this reason

Collection Tree Protocol

by unknown authors
"... This paper presents and evaluates two principles for designing robust, reliable, and efficient collection protocols. These principles allow a protocol to benefit from accurate and agile link estimators by handling the dynamism such estimators introduce to routing tables. The first is datapath valida ..."
Abstract - Add to MetaCart
This paper presents and evaluates two principles for designing robust, reliable, and efficient collection protocols. These principles allow a protocol to benefit from accurate and agile link estimators by handling the dynamism such estimators introduce to routing tables. The first is datapath

USING JUDGMENT TO MEASURE THE ALLOWANCE FOR DOUBTFUL ACCOUNTS

by Catherine A. Finger
"... Practicing accountants commonly apply judgment when computing financial statement numbers. However, intermediate accounting textbooks rarely discuss judgment, leaving accounting students with the erroneous impression that accounting computations each have “one right answer. ” The purpose of this pap ..."
Abstract - Add to MetaCart
of this paper is to correct that impression with examples of how judgment is applied to the reporting of accounts receivable. The background reading describes factors affecting the collectibility of accounts receivable, and a group class exercise has students apply judgment to compute allowance account balances

See What You Want to See: Motivational Influences on Visual Perception,”

by Emily Balcetis , David Dunning - Journal of Personality and Social Psychology, , 2006
"... People's motivational states-their wishes and preferences-influence their processing of visual stimuli. In 5 studies, participants shown an ambiguous figure (e.g., one that could be seen either as the letter B or the number 13) tended to report seeing the interpretation that assigned them to o ..."
Abstract - Cited by 79 (1 self) - Add to MetaCart
an answer, the experimenter handed the participant a questionnaire to complete while she supposedly left to prepare the bever-1 Recipe available on request. BALCETIS AND DUNNING age. This questionnaire probed for suspicion of the purpose of the study, suspicion of the computer crash, and in a funneled

Magnet: Robust and Efficient Collection through Control and Data Plane Integration

by unknown authors
"... Despite being a core networking primitive, collection protocols today often suffer from poor reliability (e.g., 70%) in practice, and heavily used protocols have never been evaluated in terms of communication efficiency. Using detailed experimental studies, we describe three challenges that cause ex ..."
Abstract - Add to MetaCart
Despite being a core networking primitive, collection protocols today often suffer from poor reliability (e.g., 70%) in practice, and heavily used protocols have never been evaluated in terms of communication efficiency. Using detailed experimental studies, we describe three challenges that cause

An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes

by Pierre-louis Cayrel, Sidi Mohamed, El Yousfi Alaoui, Gerhrad Hoffmann, Pascal Véron
"... Abstract. The concept of threshold ring signature in code-based cryptography was introduced by Aguilar et al. in [1]. Their proposal uses Stern’s identification scheme as basis. In this paper we construct a novel threshold ring signature scheme built on the q-SD identification scheme recently propos ..."
Abstract - Add to MetaCart
Abstract. The concept of threshold ring signature in code-based cryptography was introduced by Aguilar et al. in [1]. Their proposal uses Stern’s identification scheme as basis. In this paper we construct a novel threshold ring signature scheme built on the q-SD identification scheme recently

Identifying and Accounting for Task-Dependent Bias in Crowdsourcing

by Ece Kamar, Ashish Kapoor, Eric Horvitz
"... Models for aggregating contributions by crowd workers have been shown to be challenged by the rise of task-specific biases or errors. Task-dependent errors in as-sessment may shift the majority opinion of even large numbers of workers to an incorrect answer. We intro-duce and evaluate probabilistic ..."
Abstract - Add to MetaCart
models that can detect and correct task-dependent bias automatically. First, we show how to build and use probabilistic graphical mod-els for jointly modeling task features, workers ’ biases, worker contributions and ground truth answers of tasks so that task-dependent bias can be corrected. Second, we
Next 10 →
Results 1 - 10 of 241
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University