• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 291,275
Next 10 →

Table 2: Subject Privacy amp; Confidentiality Evaluation Privacy amp; Confidentiality Items Email Web-based

in Conducting Research on the Internet: Online Survey Design, Development and Implementation Guidelines
by Dorine Andrews D. C. D, Blair Nonnecke Ph. D
"... In PAGE 7: ...now you were a subject in the study), but not anonymity (i.e. the researchers will know who you are) and recommend explaining the method for keeping the confidentiality to the survey takers [Sheehan amp; Hoy, 1999]. In summary ( Table2 ), both email and Web-based surveys present issues of privacy and confidentiality infringement that must be addressed if researchers wish to collect personal information from respondents to ensure qualification to complete the survey. Collecting data through Web-based surveys provides improved opportunities to protect respondent confidentiality over email.... ..."

Table 1: Web-based popularity of sorts

in Bubble Sort: An Archaeological Algorithmic Analysis
by Owen Astrachan
"... In PAGE 3: ...ame with and without a space, e.g., bubblesort and bubble sort . Table1 shows the results.... ..."

Table 2. Comparison of the Time Constant of the Initial Folding Phase with Protein Size and Secondary Structure Type

in unknown title
by unknown authors
"... In PAGE 22: ... These early structural events can be attributed to accumulation of partially folded intermediates, which may act as stepping stones in finding the unique native conforma- tion. Table2 lists the time constants of the earliest folding phase measured by continuous-flow fluorescence for some of the proteins discussed in this review, along with their size and structural type. While the number of proteins studied is still too small to warrant general conclusions, it is interesting to note that the initial folding times vary by an order of magnitude but show no apparent correlation with protein size.... ..."

Table 2: Set of queries used for evaluation in WebBase.

in Incorporating Trust into Web Search
by Lan Nie, Baoning Wu, Brian D. Davison 2007
"... In PAGE 10: ... For the WebBase dataset, there is no labeled spam pages list. We chose 15 queries (shown in Table2 ) from the popular query list for evaluation of web pages in the WebBase dataset. 4.... ..."

Table 2: Web-based course management tools

in www.um.es/engphil/ijes Web-based Instructional Environments: Tools and Techniques for Effective Second Language Acquisition
by English Studies, Esperanza Román

Table 1: The Web-based DBMS-aglet Infrastructure

in Mobile Agents for WWW Distributed Database Access
by Stavros Papastavrou, George Samaras, Evaggelia Pitoura 1999
"... In PAGE 4: ... In turn, the mobile agent framework can exploit a standard networking infrastructure such as tools and services for web-based access. Table1 summarizes the complete Web-based DBMS-aglet infrastructure that consists of (a) the DBMS-aglets framework, (b) the aglets framework, and (c) the standard networking infrastructure. 3.... ..."
Cited by 41

Table 5 Flawless Design of Web-based Discussion Groups ___________________________________________________________________________________

in A Tour of Online Forums: Is there a Museum Community out there?
by Roxane Bernier, Jonathan P. Bowen
"... In PAGE 16: ... The secret depends on a well-designed museum forum, considering its originality and usefulness to augment participation. Inspired by the comments from users, we have identified five key elements that characterize an exemplary electronic mailing list; they are listed by order of priority (see Table5 ). For further outputs have a look at 13 hints for appealing web-based museum forums (Bernier and Bowen, 2003) Table 5 Flawless Design of Web-based Discussion Groups ___________________________________________________________________________________ ... ..."

Table 1: The Web-based DBMS-aglet Infrastructure

in
by Stavros Papastavrou
"... In PAGE 4: ... In turn, the mobile agent framework can exploit a standard networking infrastructure such as tools and services for web-based access. Table1 summarizes the complete Web-based DBMS-aglet infrastructure that consists of (a) the DBMS-aglets framework, (b) the aglets framework, and (c) the standard networking infrastructure. 3.... ..."

Table 1: Size of regions in both Altavista and WebBase crawl

in Large scale properties of the webgraph
by Debora Donato, Luigi Laura, Stefano Leonardi, Stefano Millozzi 2004
"... In PAGE 5: ... TENDRILS are either nodes that leave the IN without entering the SCC or enter the OUT without leaving the SCC. In Table1 we report the relative size of the 5 regions. We can still observe in the WebBase crawl a large SCC, however the biggest component is the OUT region, and both IN and TENDRILS have a reduced relative size if compared to the Altavista crawl.... ..."
Cited by 17

Table 1: Characteristics of Some Web-based Reference Services

in Digital divide: How can digital libraries bridge the gap
by Gobinda G. Chowdhury 2002
"... In PAGE 4: ... Most of these services are designed for registered users of the libraries concerned. Table1 provides a quick overview of some online reference and information services that are currently available. This is not an exhaustive list, but the table shows the different types of services that are now available, and also their major characteristics.... In PAGE 4: ... This is not an exhaustive list, but the table shows the different types of services that are now available, and also their major characteristics. In addition to those mentioned in Table1 , there are also some web-based reference services where users need to conduct search with a reference query. Such services provide free access to various online reference sources, and allow users to either select a specific source or conduct a search on a range, or all, of the reference sources.... ..."
Cited by 1
Next 10 →
Results 1 - 10 of 291,275
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University