Results 1 - 10
of
7,442
Application of Phylogenetic Networks in Evolutionary Studies
- SUBMITTED TO MBE 2005
, 2005
"... The evolutionary history of a set of taxa is usually represented by a phylogenetic tree, and this model has greatly facilitated the discussion and testing of hypotheses. However, it is well known that more complex evolutionary scenarios are poorly described by such models. Further, even when evoluti ..."
Abstract
-
Cited by 887 (15 self)
- Add to MetaCart
evolution proceeds in a tree-like manner, analysis of the data may not be best served by using methods that enforce a tree structure, but rather by a richer visualization of the data to evaluate its properties, at least as an essential first step. Thus, phylogenetic networks should be employed when
Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,
, 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract
-
Cited by 622 (2 self)
- Add to MetaCart
in seven organizations, and results support its validity. A number of special features of the model are discussed (including its use as a basis for the diagnosis of jobs and the evaluation of job redesign projects), and the model is compared to other theories of job design. Work redesign is becoming
Security-control methods for statistical databases: a comparative study
- ACM Computing Surveys
, 1989
"... This paper considers the problem of providing security to statistical databases against disclosure of confidential information. Security-control methods suggested in the literature are classified into four general approaches: conceptual, query restriction, data perturbation, and output perturbation. ..."
Abstract
-
Cited by 416 (0 self)
- Add to MetaCart
. Criteria for evaluating the performance of the various security-control methods are identified. Security-control methods that are based on each of the four approaches are discussed, together with their performance with respect to the identified evaluation criteria. A detailed comparative analysis
Toward reference models for requirements traceability
- IEEE Trans. Softw. Eng. 2001
"... Requirements traceability is intended to ensure continued alignment between stakeholder requirements and system evolution. To be useful, traces must be organized according to some modeling framework. Indeed, several such frameworks have been proposed, mostly based on theoretical considerations or an ..."
Abstract
-
Cited by 272 (5 self)
- Add to MetaCart
, reference models comprising the most important kinds of traceability links for various development tasks have been synthesized. The resulting models have been validated in case studies and are incorporated in a number of commercial traceability tools. The discussion of the link types and their usage
A COMPREHENSIVE SENSITIVITY ANALYSIS FRAMEWORK FOR MODEL EVALUATION AND IMPROVEMENT USING A CASE STUDY OF THE RANGELAND HYDROLOGY AND EROSION MODEL
"... ABSTRACT. The complexity of numerical models and the large numbers of input factors result in complex interdependencies of sensitivities to input parameter values, and high risk of having problematic or nonsensical model responses in localized regions of the input parameter space. Sensitivity analys ..."
Abstract
-
Cited by 4 (1 self)
- Add to MetaCart
localized sensitivity indices over the entire parameter space. This article further describes how to use this framework to identify model deficiencies and improve model function. The method was applied to the Rangeland Hydrology and Erosion Model (RHEM) using soil erosion response as a case study
Developments in the Measurement of Subjective Well-Being
- Psychological Science.
, 1993
"... F or good reasons, economists have had a long-standing preference for studying peoples' revealed preferences; that is, looking at individuals' actual choices and decisions rather than their stated intentions or subjective reports of likes and dislikes. Yet people often make choices that b ..."
Abstract
-
Cited by 284 (7 self)
- Add to MetaCart
momentary utilities over time that Edgeworth had in mind. This is not the case, however. Numerous studies have related individuals' retrospective evaluations of an experience to their record of real-time reports. Although retrospective evaluations are related to the real-time reports
Classification in Networked Data: A toolkit and a univariate case study
, 2006
"... This paper is about classifying entities that are interlinked with entities for which the class is known. After surveying prior work, we present NetKit, a modular toolkit for classification in networked data, and a case-study of its application to networked data used in prior machine learning resear ..."
Abstract
-
Cited by 200 (10 self)
- Add to MetaCart
This paper is about classifying entities that are interlinked with entities for which the class is known. After surveying prior work, we present NetKit, a modular toolkit for classification in networked data, and a case-study of its application to networked data used in prior machine learning
DT: GenTHREADER: an efficient and reliable protein fold recognition method for genomic sequences
- J Mol Biol
, 1999
"... A new protein fold recognition method is described which is both fast and reliable. The method uses a traditional sequence alignment algorithm to generate alignments which are then evaluated by a method derived from threading techniques. As a ®nal step, each threaded model is evaluated by a neural n ..."
Abstract
-
Cited by 214 (10 self)
- Add to MetaCart
A new protein fold recognition method is described which is both fast and reliable. The method uses a traditional sequence alignment algorithm to generate alignments which are then evaluated by a method derived from threading techniques. As a ®nal step, each threaded model is evaluated by a neural
Validation of the Lagrangian particle dispersion model FLEXPART against large scale tracer experiment data
- ENVIRON
, 1998
"... A comprehensive validation of FLEXPART, a recently developed Lagrangian particle dispersion model based on meteorological data from the European Centre for Medium-Range Weather Forecasts, is described in this paper. Measurement data from three large-scale tracer experiments, the Cross-Appalachian T ..."
Abstract
-
Cited by 199 (56 self)
- Add to MetaCart
parameters often used for model validation are extremely sensitive to small measurement errors and should not be used in future studies. 40 cases of tracer dispersion are studied, allowing a validation of the model performance under a variety of di¤erent meteorological conditions. The model usually performs
Modeling of species distributions with Maxent: new extensions and a comprehensive evaluation
"... Accurate modeling of geographic distributions of species is crucial to various applications in ecology and conservation. The best performing techniques often require some parameter tuning, which may be prohibitively time-consuming to do separately for each species, or unreliable for small or biased ..."
Abstract
-
Cited by 131 (2 self)
- Add to MetaCart
datasets. Additionally, even with the abundance of good quality data, users interested in the application of species models need not have the statistical knowledge required for detailed tuning. In such cases, it is desirable to use ‘‘default settings’’, tuned and validated on diverse datasets. Maxent is a
Results 1 - 10
of
7,442