Results 1 - 10
of
1,483
Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,
, 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract
-
Cited by 622 (2 self)
- Add to MetaCart
different tasks and rest periods are cycled, then the long-term usefulness of the technique would seem to be limited. In either case, the potential for applying activation theory to the design of jobs may be limited mainly to those cases in which there are actively dysfunctional affective and behavioral
A Cooperative Intrusion Detection System for Ad Hoc Networks
, 2003
"... Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years because of the rapid proliferation of wireless devices. MANETs are highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, lack of centralized ..."
Abstract
-
Cited by 193 (3 self)
- Add to MetaCart
on attack types and sources. For several well-known attacks, we can apply a simple rule to identify the attack type when an anomaly is reported. In some cases, these rules can also help identify the attackers. We address the run-time resource constraint problem using a cluster-based detection scheme where
Behavioral theories and the neurophysiology of reward,
- Annu. Rev. Psychol.
, 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract
-
Cited by 187 (0 self)
- Add to MetaCart
that can conceptualize the different effects of rewards on behavior. The scientific investigation of behavioral processes by animal learning theory and economic utility theory has produced a theoretical framework that can help to elucidate the neural correlates for reward functions in learning, goal
A critical role for the right fronto-insular cortex in switching between central-executive and default-mode networks.
- Proc Natl Acad Sci USA
, 2008
"... Cognitively demanding tasks that evoke activation in the brain's central-executive network (CEN) have been consistently shown to evoke decreased activation (deactivation) in the default-mode network (DMN). The neural mechanisms underlying this switch between activation and deactivation of larg ..."
Abstract
-
Cited by 178 (1 self)
- Add to MetaCart
of large-scale brain networks remain completely unknown. Here, we use functional magnetic resonance imaging (fMRI) to investigate the mechanisms underlying switching of brain networks in three different experiments. We first examined this switching process in an auditory event segmentation task. We
A Review of Conflict Detection and Resolution Modeling Methods
- IEEE Transactions on Intelligent Transportation Systems
, 2000
"... A number of methods have been proposed to automate air traffic conflict detection and resolution (CD&R), but there has been little cohesive discussion or comparative evaluation of approaches. This paper presents a survey of 68 recent CD&R modeling methods, several of which are currently in u ..."
Abstract
-
Cited by 111 (2 self)
- Add to MetaCart
A number of methods have been proposed to automate air traffic conflict detection and resolution (CD&R), but there has been little cohesive discussion or comparative evaluation of approaches. This paper presents a survey of 68 recent CD&R modeling methods, several of which are currently
Combining filtering and statistical methods for anomaly detection
- In Proceedings of IMC
, 2005
"... In this work we develop an approach for anomaly detection for large scale networks such as that of an enterprize or an ISP. The traffic patterns we focus on for analysis are that of a network-wide view of the traffic state, called the traffic matrix. In the first step a Kalman filter is used to filt ..."
Abstract
-
Cited by 83 (15 self)
- Add to MetaCart
on instantaneous behavior, another focuses on changes in the mean of the residual process, a third on changes in the variance behavior, and a fourth examines variance changes over multiple timescales. We evaluate and compare all of these methods using ROC curves that illustrate the full tradeoff between false
Whom You Know Matters: Venture Capital Networks and Investment Performance,
- Journal of Finance
, 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract
-
Cited by 138 (8 self)
- Add to MetaCart
investments, using a comprehensive sample of U.S. based VCs over the period 1980 to 2003. VC funds whose parent firms enjoy more influential network positions have significantly better performance, as measured by the proportion of portfolio company investments that are successfully exited through an initial
A Comparative Analysis of Process Instance Cluster Techniques
"... Abstract. The application of process mining and analysis techniques to the process logs of information systems often leads to highly complex results, e.g. in terms of a high number of elements in the mined model. Thus, clustering corresponding log files is mandatory in the context of an expedient a ..."
Abstract
- Add to MetaCart
, as well as a comparative analysis of their capabilities in realistic contexts. Within the theoretical analytical investigation, existing process instance cluster techniques are characterized by process mining specific and cluster theoretical aspects. In the practical empirical analysis, two areas of major
Anomaly Analysis using Host-behavior Clustering
, 2007
"... In today’s networks we are permanently confronted with huge amount of data. Monitoring such a network can not done by humans anymore. We need efficient and autonomous algorithms which investigate the data and probably raise an alarm if something abnormal is detected. In this thesis we use a specific ..."
Abstract
- Add to MetaCart
. The third step is the actual clustering process. In this step, we try to extract a behavior for every found cluster. Our findings show, that the distribution of the features are heavy-tailed. That makes it hard for the cluster algorithm to find well separated clusters. We could not achieve a reliable
Automated classification and analysis of internet malware
- In Proceedings of Recent Advances in Intrusion Detection (RAID’07
, 2007
"... Abstract. Numerous attacks, such as worms, phishing, and botnets, threaten the availability of the Internet, the integrity of its hosts, and the privacy of its users. A core element of defense against these attacks is anti-virus (AV) software—a service that detects, removes, and characterizes these ..."
Abstract
-
Cited by 105 (5 self)
- Add to MetaCart
malware in ways that are inconsistent across AV products, incomplete across malware, and that fail to be concise in their semantics. To address these limitations, we propose a new classification technique that describes malware behavior in terms of system state changes (e.g., files written, processes
Results 1 - 10
of
1,483