• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 735
Next 10 →

Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,

by ] Richard Hackman , Grec R Oldham , 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract - Cited by 622 (2 self) - Add to MetaCart
of conceptual tools that are directly useful in guiding the implementation and evaluation of work redesign projects. In the paragraphs to follow, we examine several existing theoretical approaches to work redesign, with a special eye toward the measurability of the concepts employed and the action implications

Learning from imbalanced data

by Haibo He, Edwardo A. Garcia - IEEE Trans. on Knowledge and Data Engineering , 2009
"... Abstract—With the continuous expansion of data availability in many large-scale, complex, and networked systems, such as surveillance, security, Internet, and finance, it becomes critical to advance the fundamental understanding of knowledge discovery and analysis from raw data to support decision-m ..."
Abstract - Cited by 260 (6 self) - Add to MetaCart
of the problem, the state-of-the-art technologies, and the current assessment metrics used to evaluate learning performance under the imbalanced learning scenario. Furthermore, in order to stimulate future research in this field, we also highlight the major opportunities and challenges, as well as potential

ProfileDroid: Multi-layer Profiling of Android Applications

by Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos
"... The Android platform lacks tools for assessing and monitoring apps in a systematic way. This lack of tools is particularly problematic when combined with the open nature of Google Play, the main app distribution channel. As our key contribution, we design and implement ProfileDroid, a comprehensive, ..."
Abstract - Cited by 31 (4 self) - Add to MetaCart
The Android platform lacks tools for assessing and monitoring apps in a systematic way. This lack of tools is particularly problematic when combined with the open nature of Google Play, the main app distribution channel. As our key contribution, we design and implement ProfileDroid, a comprehensive

1 PainDroid: An Android-based Virtual Reality Application for Pain Assessment

by Fotios Spyridonisª, Jarle Hansenª, Tor-morten Grønli ᵇ, Gheorghita Ghineaª
"... Abstract—Earlier studies in the field of pain research suggest that little efficient intervention currently exists in response to the exponential increase in the prevalence of pain. In this paper, we present an Android application (PainDroid) with multimodal functionality that could be enhanced with ..."
Abstract - Add to MetaCart
that it can be an effective and usable tool for improving the assessment of pain. Participant experiences indicated that the application was easy to use and the potential of the application was similarly appreciated by the clinicians involved in the evaluation. Our findings may be of considerable interest

On the Effectiveness of API-Level Access Control Using Bytecode Rewriting in Android

by Hao Hao, Vicky Singh, Wenliang Du
"... Bytecode rewriting on Android applications has been widely adopted to implement fine-grained access control. It endows more flexibility and convenience without modifying the Android platform. Bytecode rewriting uses static analysis to identify the usage of security-sensitive API methods, before it i ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
Bytecode rewriting on Android applications has been widely adopted to implement fine-grained access control. It endows more flexibility and convenience without modifying the Android platform. Bytecode rewriting uses static analysis to identify the usage of security-sensitive API methods, before

A Machinelearning Approach for Classifying and Categorizing Android Sources and Sinks

by Siegfried Rasthofer , Steven Arzt , Eric Bodden - In: The 2014 Network and Distributed System Security Symposium (NDSS , 2014
"... Abstract-Today's smartphone users face a security dilemma: many apps they install operate on privacy-sensitive data, although they might originate from developers whose trustworthiness is hard to judge. Researchers have addressed the problem with more and more sophisticated static and dynamic ..."
Abstract - Cited by 26 (1 self) - Add to MetaCart
analysis tools as an aid to assess how apps use private user data. Those tools, however, rely on the manual configuration of lists of sources of sensitive data as well as sinks which might leak data to untrusted observers. Such lists are hard to come by. We thus propose SUSI, a novel machine

Exploring Reverse Engineering Symptoms in Android apps

by Hugo Gonzalez , Andi A Kadir , Natalia Stakhanova , Abdullah J Alzahrani , Ali A Ghorbani
"... ABSTRACT The appearance of the Android platform and its popularity has resulted in a sharp rise in the number of reported vulnerabilities and consequently in the number of mobile threats. Leveraging openness of Android app markets and the lack of security testing, malware authors commonly plagiariz ..."
Abstract - Add to MetaCart
and explore novel and easily extractable attribute called String Offset Order. Extractable from string identifiers list in the .dex file, the method is able to pinpoint symptoms of reverse engineered Android apps without the need for complex further analysis. We performed extensive evaluation of String Order

Visualizing geospatial information uncertainty: What we know and what we need to know. Cartography and Geographic

by Alan M. Maceachren, Anthony Robinson, Steven Gardner, Robert Murray, Mark Gahegan, Elisabeth Hetzler - Information Science , 2005
"... ABSTRACT: Developing reliable methods for representing and managing information uncertainty remains a persistent and relevant challenge to GIScience. Information uncertainty is an intricate idea, and recent examinations of this concept have generated many perspectives on its representation and visua ..."
Abstract - Cited by 101 (2 self) - Add to MetaCart
and visualization, with perspectives emerging from a wide range of disciplines and application contexts. In this paper, we review and assess progress toward visual tools and methods to help analysts manage and understand information uncertainty. Specifically, we report on efforts to conceptualize uncertainty

Activities as instructional tools: a framework for analysis and evaluation

by Jere Brophy, Janet Alleman - Educational researcher (Washington, DC , 1991
"... Issues relating to the design, selection, and evaluation of learning activities have been relatively neglected in educational research and scholarship. This article identifies some fundamental questions in need of scholarly attention, reviews recent research findings, and then offers a conceptual an ..."
Abstract - Cited by 16 (2 self) - Add to MetaCart
analysis and a list of principles that might be used as a tool for designing, selecting, or assessing activities. Educational Researcher, Vol. 20, No. 4, pp. 9-23 C ertain roles and functions are basic to teaching, whatever the grade level or subject matter: manag-ing the classroom and motivating students

Application of covariance structure modeling in psychology: cause for concern? Psychol

by Steven J. Breckler - Bull , 1990
"... Methods of covariance structure modeling are frequently applied in psychological research. These methods merge the logic of confirmatory factor analysis, multiple regression, and path analysis within a single data analytic framework. Among the many applications are estimation of disattenu-ated corre ..."
Abstract - Cited by 75 (0 self) - Add to MetaCart
correlation and regression coefficients, evaluation of multitrait-multimethod matrices, and as-sessment of hypothesized causal structures. Shortcomings of these methods are commonly acknowl-edged in the mathematical literature and in textbooks. Nevertheless, serious flaws remain in many published applications
Next 10 →
Results 1 - 10 of 735
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University