Results 1 - 10
of
36
Compacting Large and Loose Communities
"... Abstract—Detecting compact overlapping communities in large networks is an important pattern recognition problem with applications in many domains. Most community detection algorithms trade-off between community sizes, their compactness and the scalability of finding communities. Clique Percolation ..."
Abstract
- Add to MetaCart
Abstract—Detecting compact overlapping communities in large networks is an important pattern recognition problem with applications in many domains. Most community detection algorithms trade-off between community sizes, their compactness and the scalability of finding communities. Clique Percolation
Analysis of Adult Female Clothing Made with Adapted Patterns and Free Hand Cutting: Constraints and Prospects
"... Abstract The main purpose of this study was to analyse adult female gown made with adapted patterns and free hand cutting. The specific objectives are to determine whether bodice part of a female gown, skirt part of a female gown and a female gown made with adapted patterns fit better than the ones ..."
Abstract
- Add to MetaCart
to establish industries where they can make patterns according to contemporary fashion in sizes for sale. There should be an awareness programme organized by Home Economists to dressmakers who uses free hand cutting to make use of adapted patterns in sewing. Seminars/workshops should be organized by Home
Realizing the Promise: Government Information Systems and the Fourth Generation of Information Technology
- Public Administration Review
, 2001
"... Interoperability is more than "digital plumbing"-making sure that computers talk so that bits of data flow properly. Fundamentally, interoperability is people talking and sharing information. Sharing information reduces the "paperwork burden" on the citizen, streamlines work pro ..."
Abstract
-
Cited by 7 (0 self)
- Add to MetaCart
the literature review, the methodology section discusses several phases in the research design. A key element in obtaining rigorous results was the use of a "tight" learning loop-every new insight or practical recommendation learned was immediately included in the set of working findings
unknown title
, 2011
"... Corporate Governance determinants of voluntary disclosure and its effects on information asymmetry: an analysis for Iberian Peninsula listed companies. ..."
Abstract
- Add to MetaCart
Corporate Governance determinants of voluntary disclosure and its effects on information asymmetry: an analysis for Iberian Peninsula listed companies.
The flexibility of models of recognition memory: An analysis by the minimum description length principle
- Journal of Mathematical Psychology
, 2011
"... a b s t r a c t Ten continuous, discrete, and hybrid models of recognition memory are considered in the traditional paradigm with manipulation of response bias via baserates or payoff schedules. We present an efficient method for computing the Fisher information approximation (FIA) to the normalize ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
and sample size into account in a fashion almost identical to that involved in BIC. The second term is given by: Although more sophisticated than AIC and BIC, more widespread use of FIA and NML has been hampered by the difficulty of computing the indices. Computing NML involves processing all data patterns
Running Head: WHAT WORKS IN SECONDARY SCHOOLS? 1
"... Abstract Governments, schools, and curriculum authorities are increasingly recognizing that body image during adolescence is a public health issue that warrants attention in the school setting. After 30 years of eating disorder prevention research, and given the current interest in this area, it se ..."
Abstract
- Add to MetaCart
in improving body image on at least one measure, from pre to post test, though effect sizes were small (d = 0.22-0.48). These effective programs were conducted among younger adolescents 12.33-13.62 years, and included activities focusing on media literacy, self esteem, and the influence of peers. Implications
A Note on the Specification of Error Structures in Latent Interaction Models
, 2015
"... Abstract Latent interaction models have motivated a great deal of methodological research, mainly in the area of estimating such models. Product-indicator methods have been shown to be competitive with other methods of estimation in terms of parameter bias and standard error accuracy, and their con ..."
Abstract
- Add to MetaCart
for the unconstrained product-indicator approach. Recommendations to practitioners based on these results are discussed. Keywords error structures, latent interaction models, unconstrained method, model misspecification A latent interaction model is a type of nonlinear structural equation model in which at least one
De-indirection for Flash-based Solid State Drives
, 2013
"... ii iv vTo my parents vi vii Acknowledgements I would first and foremost extend my whole-hearted gratitude to my advisors, An-drea Arpaci-Dusseau and Remzi Arpaci-Dusseau. Andrea and Remzi are the reason that I had the opportunity for this exceptional Ph.D. journey. To this day, I still re-member the ..."
Abstract
- Add to MetaCart
ii iv vTo my parents vi vii Acknowledgements I would first and foremost extend my whole-hearted gratitude to my advisors, An-drea Arpaci-Dusseau and Remzi Arpaci-Dusseau. Andrea and Remzi are the reason that I had the opportunity for this exceptional Ph.D. journey. To this day, I still re-member the moment when they took me as their student and the joy and hope in my heart. Andrea and Remzi have showed me what systems research is like and how much fun and challenging it can be. Before this journey with them, I had always liked and believed in the beauty of mathematics and theory. My initial interest in systems research happened when I took Remzi’s Advanced Operating Systems
unknown title
"... The authors examine the National Early Literacy Panel (NELP; report from two complementary vantage points: (a) the historical tradition of research syntheses in reading research, beginning with Chall and extending through the NELP report, and (b) other recent attempts to examine or synthesize early ..."
Abstract
- Add to MetaCart
, 2008, p. 118). Size of group "When children were taught PA in small groups, their learning was greater than when they were taught individually or in classrooms" (NICHD, 2000, pp. 2-4). "The majority of the code-focused interventions summarized by this meta-analysis were conducted
DOI 10.1007/s00778-012-0302-x SPECIAL ISSUE PAPER Automating the database schema evolution process
"... Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy applicati ..."
Abstract
- Add to MetaCart
Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy applications. In addition to labor saving, the ben-efits delivered by these advances are many and include reliable prediction of outcome, minimization of downtime, system-produced documentation, and support for archiving, historical queries, and provenance. The PRISM/PRISM++ system delivers these benefits, by solving the difficult prob-lem of automating the migration of databases and the rewrit-ing of queries and updates. In this paper, we present the PRISM/PRISM++ system and the novel technology that made it possible. In particular, we focus on the difficult and previously unsolved problem of supporting legacy queries and updates under schema and integrity constraints evolution. The PRISM/PRISM++ approach consists in providing the users with a set of SQL-based Schema Modification Opera-tors (SMOs), which describe how the tables in the old schema are modified into those in the new schema. In order to sup-port updates, SMOs are extended with integrity constraints
Results 1 - 10
of
36