Results 1 - 10
of
735
Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,
, 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract
-
Cited by 622 (2 self)
- Add to MetaCart
of conceptual tools that are directly useful in guiding the implementation and evaluation of work redesign projects. In the paragraphs to follow, we examine several existing theoretical approaches to work redesign, with a special eye toward the measurability of the concepts employed and the action implications
Learning from imbalanced data
- IEEE Trans. on Knowledge and Data Engineering
, 2009
"... Abstract—With the continuous expansion of data availability in many large-scale, complex, and networked systems, such as surveillance, security, Internet, and finance, it becomes critical to advance the fundamental understanding of knowledge discovery and analysis from raw data to support decision-m ..."
Abstract
-
Cited by 260 (6 self)
- Add to MetaCart
of the problem, the state-of-the-art technologies, and the current assessment metrics used to evaluate learning performance under the imbalanced learning scenario. Furthermore, in order to stimulate future research in this field, we also highlight the major opportunities and challenges, as well as potential
ProfileDroid: Multi-layer Profiling of Android Applications
"... The Android platform lacks tools for assessing and monitoring apps in a systematic way. This lack of tools is particularly problematic when combined with the open nature of Google Play, the main app distribution channel. As our key contribution, we design and implement ProfileDroid, a comprehensive, ..."
Abstract
-
Cited by 31 (4 self)
- Add to MetaCart
The Android platform lacks tools for assessing and monitoring apps in a systematic way. This lack of tools is particularly problematic when combined with the open nature of Google Play, the main app distribution channel. As our key contribution, we design and implement ProfileDroid, a comprehensive
1 PainDroid: An Android-based Virtual Reality Application for Pain Assessment
"... Abstract—Earlier studies in the field of pain research suggest that little efficient intervention currently exists in response to the exponential increase in the prevalence of pain. In this paper, we present an Android application (PainDroid) with multimodal functionality that could be enhanced with ..."
Abstract
- Add to MetaCart
that it can be an effective and usable tool for improving the assessment of pain. Participant experiences indicated that the application was easy to use and the potential of the application was similarly appreciated by the clinicians involved in the evaluation. Our findings may be of considerable interest
On the Effectiveness of API-Level Access Control Using Bytecode Rewriting in Android
"... Bytecode rewriting on Android applications has been widely adopted to implement fine-grained access control. It endows more flexibility and convenience without modifying the Android platform. Bytecode rewriting uses static analysis to identify the usage of security-sensitive API methods, before it i ..."
Abstract
-
Cited by 7 (1 self)
- Add to MetaCart
Bytecode rewriting on Android applications has been widely adopted to implement fine-grained access control. It endows more flexibility and convenience without modifying the Android platform. Bytecode rewriting uses static analysis to identify the usage of security-sensitive API methods, before
A Machinelearning Approach for Classifying and Categorizing Android Sources and Sinks
- In: The 2014 Network and Distributed System Security Symposium (NDSS
, 2014
"... Abstract-Today's smartphone users face a security dilemma: many apps they install operate on privacy-sensitive data, although they might originate from developers whose trustworthiness is hard to judge. Researchers have addressed the problem with more and more sophisticated static and dynamic ..."
Abstract
-
Cited by 26 (1 self)
- Add to MetaCart
analysis tools as an aid to assess how apps use private user data. Those tools, however, rely on the manual configuration of lists of sources of sensitive data as well as sinks which might leak data to untrusted observers. Such lists are hard to come by. We thus propose SUSI, a novel machine
Exploring Reverse Engineering Symptoms in Android apps
"... ABSTRACT The appearance of the Android platform and its popularity has resulted in a sharp rise in the number of reported vulnerabilities and consequently in the number of mobile threats. Leveraging openness of Android app markets and the lack of security testing, malware authors commonly plagiariz ..."
Abstract
- Add to MetaCart
and explore novel and easily extractable attribute called String Offset Order. Extractable from string identifiers list in the .dex file, the method is able to pinpoint symptoms of reverse engineered Android apps without the need for complex further analysis. We performed extensive evaluation of String Order
Visualizing geospatial information uncertainty: What we know and what we need to know. Cartography and Geographic
- Information Science
, 2005
"... ABSTRACT: Developing reliable methods for representing and managing information uncertainty remains a persistent and relevant challenge to GIScience. Information uncertainty is an intricate idea, and recent examinations of this concept have generated many perspectives on its representation and visua ..."
Abstract
-
Cited by 101 (2 self)
- Add to MetaCart
and visualization, with perspectives emerging from a wide range of disciplines and application contexts. In this paper, we review and assess progress toward visual tools and methods to help analysts manage and understand information uncertainty. Specifically, we report on efforts to conceptualize uncertainty
Activities as instructional tools: a framework for analysis and evaluation
- Educational researcher (Washington, DC
, 1991
"... Issues relating to the design, selection, and evaluation of learning activities have been relatively neglected in educational research and scholarship. This article identifies some fundamental questions in need of scholarly attention, reviews recent research findings, and then offers a conceptual an ..."
Abstract
-
Cited by 16 (2 self)
- Add to MetaCart
analysis and a list of principles that might be used as a tool for designing, selecting, or assessing activities. Educational Researcher, Vol. 20, No. 4, pp. 9-23 C ertain roles and functions are basic to teaching, whatever the grade level or subject matter: manag-ing the classroom and motivating students
Application of covariance structure modeling in psychology: cause for concern? Psychol
- Bull
, 1990
"... Methods of covariance structure modeling are frequently applied in psychological research. These methods merge the logic of confirmatory factor analysis, multiple regression, and path analysis within a single data analytic framework. Among the many applications are estimation of disattenu-ated corre ..."
Abstract
-
Cited by 75 (0 self)
- Add to MetaCart
correlation and regression coefficients, evaluation of multitrait-multimethod matrices, and as-sessment of hypothesized causal structures. Shortcomings of these methods are commonly acknowl-edged in the mathematical literature and in textbooks. Nevertheless, serious flaws remain in many published applications
Results 1 - 10
of
735