• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 5,089
Next 10 →

Three approaches to qualitative content analysis.

by Hsiu-Fang Hsieh , Sarah E Shannon , 2005
"... Content analysis is a widely used qualitative Researchers regard content analysis as a flexible method for analyzing text data The differentiation of content analysis is usually limited to classifying it as primarily a qualitative versus quantitative research method. A more thorough analysis of th ..."
Abstract - Cited by 729 (0 self) - Add to MetaCart
of approaches categorized as qualitative content analysis. We have identified three distinct approaches: conventional, directed, and summative. All three approaches are used to interpret text data from a predominately naturalistic paradigm. We begin with a brief review of the history and definitions of content

A Brief History of Generative Models for Power Law and Lognormal Distributions

by Michael Mitzenmacher - INTERNET MATHEMATICS
"... Recently, I became interested in a current debate over whether file size distributions are best modelled by a power law distribution or a a lognormal distribution. In trying ..."
Abstract - Cited by 414 (7 self) - Add to MetaCart
Recently, I became interested in a current debate over whether file size distributions are best modelled by a power law distribution or a a lognormal distribution. In trying

Why Johnny can’t encrypt: A usability evaluation of PGP 5.0

by Alma Whitten, J. D. Tygar , 1999
"... User errors cause or contribute to most computer security failures, yet user interfaces for security still tend to be clumsy, confusing, or near-nonexistent. Is this simply due to a failure to apply standard user interface design techniques to security? We argue that, on the contrary, effective secu ..."
Abstract - Cited by 479 (4 self) - Add to MetaCart
standards: PGP 5.0. Our case study used a cognitive walkthrough analysis together with a laboratory user test to evaluate whether PGP 5.0 can be successfully used by cryptography novices to achieve effective electronic mail security. The analysis found a number of user interface design flaws that may

A survey of industrial model predictive control technology

by S. Joe Qin , Thomas A. Badgwell , 2003
"... This paper provides an overview of commercially available model predictive control (MPC) technology, both linear and nonlinear, based primarily on data provided by MPC vendors. A brief history of industrial MPC technology is presented first, followed by results of our vendor survey of MPC control an ..."
Abstract - Cited by 460 (4 self) - Add to MetaCart
This paper provides an overview of commercially available model predictive control (MPC) technology, both linear and nonlinear, based primarily on data provided by MPC vendors. A brief history of industrial MPC technology is presented first, followed by results of our vendor survey of MPC control

– Defined Public-Key Cryptography

by Shafi Goldwasser, Silvio Micali (s
"... This section comprises of an introduction to cryptography, the various problems and cryp-tographic primitives. 1.1 Brief History Cryptography is a science with a long history. Although it has recently been transformed to conform to the rigorousness of a science, its applications can be traced back t ..."
Abstract - Add to MetaCart
This section comprises of an introduction to cryptography, the various problems and cryp-tographic primitives. 1.1 Brief History Cryptography is a science with a long history. Although it has recently been transformed to conform to the rigorousness of a science, its applications can be traced back

Media will never influence learning.

by Richard E Clark - Educational Technology Research and Development, , 1994
"... The purpose of this discussion is to explain and sharpen different points of view about the impact of media and attributes of media on learning, motivation and efficiency gains from instruction. This paper is an attempt to INTRODUCTION A Brief History of Media Research The claim of "no learnin ..."
Abstract - Cited by 333 (7 self) - Add to MetaCart
The purpose of this discussion is to explain and sharpen different points of view about the impact of media and attributes of media on learning, motivation and efficiency gains from instruction. This paper is an attempt to INTRODUCTION A Brief History of Media Research The claim of "

Evolutionary computation: Comments on the history and current state

by Thomas Bäck, Ulrich Hammel, Hans-paul Schwefel - IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION , 1997
"... Evolutionary computation has started to receive significant attention during the last decade, although the origins can be traced back to the late 1950’s. This article surveys the history as well as the current state of this rapidly growing field. We describe the purpose, the general structure, and ..."
Abstract - Cited by 280 (0 self) - Add to MetaCart
Evolutionary computation has started to receive significant attention during the last decade, although the origins can be traced back to the late 1950’s. This article surveys the history as well as the current state of this rapidly growing field. We describe the purpose, the general structure

Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems

by Marc Langheinrich
"... This paper tries to serve as an introductory reading to privacy issues in the field of ubiquitous computing. It develops six principles for guiding system design, based on a set of fair information practices common in most privacy legislation in use today: notice, choice and consent, proximity and l ..."
Abstract - Cited by 288 (4 self) - Add to MetaCart
and locality, anonymity and pseudonymity, security, and access and recourse. A brief look at the history of privacy protection, its legal status, and its expected utility is provided as a background.

Data Clustering: 50 Years Beyond K-Means

by Anil K. Jain , 2008
"... Organizing data into sensible groupings is one of the most fundamental modes of understanding and learning. As an example, a common scheme of scientific classification puts organisms into taxonomic ranks: domain, kingdom, phylum, class, etc.). Cluster analysis is the formal study of algorithms and m ..."
Abstract - Cited by 294 (7 self) - Add to MetaCart
(unsupervised learning) from classification or discriminant analysis (supervised learning). The aim of clustering is exploratory in nature to find structure in data. Clustering has a long and rich history in a variety of scientific fields. One of the most popular and simple clustering algorithms, K

Iterative and Incremental Development: A Brief History

by Craig Larman, Victor R. Basili , 2003
"... ..."
Abstract - Cited by 201 (0 self) - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 5,089
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University