Results 1 - 10
of
1,761
Formalising trust as a computational concept
, 1994
"... Trust is a judgement of unquestionable utility — as humans we use it every day of our lives. However, trust has suffered from an imperfect understanding, a plethora of definitions, and informal use in the literature and in everyday life. It is common to say “I trust you, ” but what does that mean? T ..."
Abstract
-
Cited by 529 (6 self)
- Add to MetaCart
exploration of the possibilities of future work in the area. Summary 1. Overview This thesis presents an overview of trust as a social phenomenon and discusses it formally. It argues that trust is: • A means for understanding and adapting to the complexity of the environment. • A means of providing added
Framing: toward clarification of a fractured paradigm’’,
- Journal of Communication
, 1993
"... In response to the proposition that communication lacks disciplinary status because of deficient core knowledge, I propose that we turn an ostensible weakness into a strength. We should identify our mission as bringing together insights and theories that would otherwise remain scattered in other di ..."
Abstract
-
Cited by 620 (1 self)
- Add to MetaCart
disciplines. Because of the lack of interchange among the disciplines, hypotheses thoroughly discredited in one field may receive wide acceptance in another. Potential research paradigms remain fractured, with pieces here and there but no comprehensive statement to guide research. By bringing ideas together
RESEARCH ARTICLE A Parallel Implementation of the Wuchty Algorithm with Additional Experimental Filters to More Thoroughly Explore RNA Conformational Space
"... We present newmodifications to theWuchty algorithm in order to better define and explore possible conformations for an RNA sequence. The new features, including parallelization, energy-independent lonely pair constraints, context-dependent chemical probing constraints, helix filters, and optional mu ..."
Abstract
- Add to MetaCart
We present newmodifications to theWuchty algorithm in order to better define and explore possible conformations for an RNA sequence. The new features, including parallelization, energy-independent lonely pair constraints, context-dependent chemical probing constraints, helix filters, and optional
To parcel or not to parcel: Exploring the question, weighing the merits. Structural Equation Modeling
, 2002
"... We examine the controversial practice of using parcels of items as manifest variables in structural equation modeling (SEM) procedures. After detailing arguments pro and con, we conclude that the unconsidered use of parcels is never warranted, while, at the same time, the considered use of parcels c ..."
Abstract
-
Cited by 286 (14 self)
- Add to MetaCart
of constructs). Prior to creating parcels, however, we recommend strongly that investigators acquire a thorough understanding of the nature and dimensionality of the items to be parceled. With this knowledge in hand, various techniques for creating parcels can be utilized to minimize potential pitfalls
Transforming Data to Satisfy Privacy Constraints
, 2002
"... Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can also contain other kinds of personal information (e.g., date of birth, zip code, gender) that are potentially identifying ..."
Abstract
-
Cited by 250 (0 self)
- Add to MetaCart
, this is combined with a more thorough exploration of the solution space using the genetic algorithm framework. These extensions allow us to transform the data so that they are more useful for their intended purpose while satisfying the privacy constraints.
Characterizing the Effects of Transient Faults on a High-Performance Processor Pipeline
, 2004
"... The progression of implementation technologies into the sub-100 nanometer lithographies renew the importance of understanding and protecting against single-event upsets in digital systems. In this work, the effects of transient faults on high performance microprocessors is explored. To perform a tho ..."
Abstract
-
Cited by 132 (4 self)
- Add to MetaCart
thorough exploration, a highly detailed register transfer level model of a deeply pipelined, out-of-order microprocessor was created. Using fault injection, we determined that fewer than 15% of single bit corruptions in processor state result in software visible errors. These failures were analyzed
An Evaluation of Naive Bayesian Anti-Spam Filtering
, 2000
"... It has recently been argued that a Naive Bayesian classifier can be used to filter unsolicited bulk e-mail ("spam"). We conduct a thorough evaluation of this proposal on a corpus that we make publicly available, contributing towards standard benchmarks. At the same time we investigate the ..."
Abstract
-
Cited by 165 (1 self)
- Add to MetaCart
It has recently been argued that a Naive Bayesian classifier can be used to filter unsolicited bulk e-mail ("spam"). We conduct a thorough evaluation of this proposal on a corpus that we make publicly available, contributing towards standard benchmarks. At the same time we investigate
Self-determination and persistence in a real-life setting: Toward a motivational model of high school dropout.
- Journal of Personality and Social Psychology,
, 1997
"... The purpose of this study was to propose and test a motivational model of high school dropout. The model posits that teachers, parents, and the school administration's behaviors toward students influence students' perceptions of competence and autonomy. The less autonomy supportive the so ..."
Abstract
-
Cited by 183 (19 self)
- Add to MetaCart
of high school. However, the Vallerand and Bissonnette study did not provide a complete assessment of the motivational model and did not deal with dropping out from high school as such. The purpose of the present study, therefore, was to provide a more thorough test of the motivational model of high
Understanding the capacity region of the greedy maximal scheduling algorithm in multi-hop wireless networks
- Proc. of IEEE INFOCOM
, 2008
"... Abstract—In this paper, we characterize the performance of an important class of scheduling schemes, called Greedy Maximal Scheduling (GMS), for multi-hop wireless networks. While a lower bound on the throughput performance of GMS is relatively well-known in the simple node-exclusive interference mo ..."
Abstract
-
Cited by 125 (9 self)
- Add to MetaCart
model, it has not been thoroughly explored in the more general K-hop interference model. Moreover, empirical observations suggest that the known bounds are quite loose, and that the performance of GMS is often close to optimal. In this paper, we provide a number of new analytic results characterizing
Value Based Requirements Engineering: Exploring Innovative e-Commerce Ideas
- REQUIREMENTS ENGINEERING JOURNAL
, 2002
"... Innovative e-commerce ideas are characterized by commercial products yet unknown to the market, enabled by information technology such as the Internet and technologies on top of it. How to develop such products is hardly known. We propose a interdisciplinary approach, e -value , to explore an ..."
Abstract
-
Cited by 99 (35 self)
- Add to MetaCart
Innovative e-commerce ideas are characterized by commercial products yet unknown to the market, enabled by information technology such as the Internet and technologies on top of it. How to develop such products is hardly known. We propose a interdisciplinary approach, e -value , to explore
Results 1 - 10
of
1,761