Results 1 - 10
of
5,089
Three approaches to qualitative content analysis.
, 2005
"... Content analysis is a widely used qualitative Researchers regard content analysis as a flexible method for analyzing text data The differentiation of content analysis is usually limited to classifying it as primarily a qualitative versus quantitative research method. A more thorough analysis of th ..."
Abstract
-
Cited by 729 (0 self)
- Add to MetaCart
of approaches categorized as qualitative content analysis. We have identified three distinct approaches: conventional, directed, and summative. All three approaches are used to interpret text data from a predominately naturalistic paradigm. We begin with a brief review of the history and definitions of content
A Brief History of Generative Models for Power Law and Lognormal Distributions
- INTERNET MATHEMATICS
"... Recently, I became interested in a current debate over whether file size distributions are best modelled by a power law distribution or a a lognormal distribution. In trying ..."
Abstract
-
Cited by 414 (7 self)
- Add to MetaCart
Recently, I became interested in a current debate over whether file size distributions are best modelled by a power law distribution or a a lognormal distribution. In trying
Why Johnny can’t encrypt: A usability evaluation of PGP 5.0
, 1999
"... User errors cause or contribute to most computer security failures, yet user interfaces for security still tend to be clumsy, confusing, or near-nonexistent. Is this simply due to a failure to apply standard user interface design techniques to security? We argue that, on the contrary, effective secu ..."
Abstract
-
Cited by 479 (4 self)
- Add to MetaCart
standards: PGP 5.0. Our case study used a cognitive walkthrough analysis together with a laboratory user test to evaluate whether PGP 5.0 can be successfully used by cryptography novices to achieve effective electronic mail security. The analysis found a number of user interface design flaws that may
A survey of industrial model predictive control technology
, 2003
"... This paper provides an overview of commercially available model predictive control (MPC) technology, both linear and nonlinear, based primarily on data provided by MPC vendors. A brief history of industrial MPC technology is presented first, followed by results of our vendor survey of MPC control an ..."
Abstract
-
Cited by 460 (4 self)
- Add to MetaCart
This paper provides an overview of commercially available model predictive control (MPC) technology, both linear and nonlinear, based primarily on data provided by MPC vendors. A brief history of industrial MPC technology is presented first, followed by results of our vendor survey of MPC control
– Defined Public-Key Cryptography
"... This section comprises of an introduction to cryptography, the various problems and cryp-tographic primitives. 1.1 Brief History Cryptography is a science with a long history. Although it has recently been transformed to conform to the rigorousness of a science, its applications can be traced back t ..."
Abstract
- Add to MetaCart
This section comprises of an introduction to cryptography, the various problems and cryp-tographic primitives. 1.1 Brief History Cryptography is a science with a long history. Although it has recently been transformed to conform to the rigorousness of a science, its applications can be traced back
Media will never influence learning.
- Educational Technology Research and Development,
, 1994
"... The purpose of this discussion is to explain and sharpen different points of view about the impact of media and attributes of media on learning, motivation and efficiency gains from instruction. This paper is an attempt to INTRODUCTION A Brief History of Media Research The claim of "no learnin ..."
Abstract
-
Cited by 333 (7 self)
- Add to MetaCart
The purpose of this discussion is to explain and sharpen different points of view about the impact of media and attributes of media on learning, motivation and efficiency gains from instruction. This paper is an attempt to INTRODUCTION A Brief History of Media Research The claim of "
Evolutionary computation: Comments on the history and current state
- IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION
, 1997
"... Evolutionary computation has started to receive significant attention during the last decade, although the origins can be traced back to the late 1950’s. This article surveys the history as well as the current state of this rapidly growing field. We describe the purpose, the general structure, and ..."
Abstract
-
Cited by 280 (0 self)
- Add to MetaCart
Evolutionary computation has started to receive significant attention during the last decade, although the origins can be traced back to the late 1950’s. This article surveys the history as well as the current state of this rapidly growing field. We describe the purpose, the general structure
Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems
"... This paper tries to serve as an introductory reading to privacy issues in the field of ubiquitous computing. It develops six principles for guiding system design, based on a set of fair information practices common in most privacy legislation in use today: notice, choice and consent, proximity and l ..."
Abstract
-
Cited by 288 (4 self)
- Add to MetaCart
and locality, anonymity and pseudonymity, security, and access and recourse. A brief look at the history of privacy protection, its legal status, and its expected utility is provided as a background.
Data Clustering: 50 Years Beyond K-Means
, 2008
"... Organizing data into sensible groupings is one of the most fundamental modes of understanding and learning. As an example, a common scheme of scientific classification puts organisms into taxonomic ranks: domain, kingdom, phylum, class, etc.). Cluster analysis is the formal study of algorithms and m ..."
Abstract
-
Cited by 294 (7 self)
- Add to MetaCart
(unsupervised learning) from classification or discriminant analysis (supervised learning). The aim of clustering is exploratory in nature to find structure in data. Clustering has a long and rich history in a variety of scientific fields. One of the most popular and simple clustering algorithms, K
Results 1 - 10
of
5,089