• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,761
Next 10 →

Formalising trust as a computational concept

by Stephen Paul Marsh , 1994
"... Trust is a judgement of unquestionable utility — as humans we use it every day of our lives. However, trust has suffered from an imperfect understanding, a plethora of definitions, and informal use in the literature and in everyday life. It is common to say “I trust you, ” but what does that mean? T ..."
Abstract - Cited by 529 (6 self) - Add to MetaCart
exploration of the possibilities of future work in the area. Summary 1. Overview This thesis presents an overview of trust as a social phenomenon and discusses it formally. It argues that trust is: • A means for understanding and adapting to the complexity of the environment. • A means of providing added

Framing: toward clarification of a fractured paradigm’’,

by Robert M Entman - Journal of Communication , 1993
"... In response to the proposition that communication lacks disciplinary status because of deficient core knowledge, I propose that we turn an ostensible weakness into a strength. We should identify our mission as bringing together insights and theories that would otherwise remain scattered in other di ..."
Abstract - Cited by 620 (1 self) - Add to MetaCart
disciplines. Because of the lack of interchange among the disciplines, hypotheses thoroughly discredited in one field may receive wide acceptance in another. Potential research paradigms remain fractured, with pieces here and there but no comprehensive statement to guide research. By bringing ideas together

RESEARCH ARTICLE A Parallel Implementation of the Wuchty Algorithm with Additional Experimental Filters to More Thoroughly Explore RNA Conformational Space

by Jonathanw Stone, Samuel Bleckley, Sean Lavelle, Susan J. Schroeder
"... We present newmodifications to theWuchty algorithm in order to better define and explore possible conformations for an RNA sequence. The new features, including parallelization, energy-independent lonely pair constraints, context-dependent chemical probing constraints, helix filters, and optional mu ..."
Abstract - Add to MetaCart
We present newmodifications to theWuchty algorithm in order to better define and explore possible conformations for an RNA sequence. The new features, including parallelization, energy-independent lonely pair constraints, context-dependent chemical probing constraints, helix filters, and optional

To parcel or not to parcel: Exploring the question, weighing the merits. Structural Equation Modeling

by Todd D. Little, William A. Cunningham, Golan Shahar, Keith F. Widaman , 2002
"... We examine the controversial practice of using parcels of items as manifest variables in structural equation modeling (SEM) procedures. After detailing arguments pro and con, we conclude that the unconsidered use of parcels is never warranted, while, at the same time, the considered use of parcels c ..."
Abstract - Cited by 286 (14 self) - Add to MetaCart
of constructs). Prior to creating parcels, however, we recommend strongly that investigators acquire a thorough understanding of the nature and dimensionality of the items to be parceled. With this knowledge in hand, various techniques for creating parcels can be utilized to minimize potential pitfalls

Transforming Data to Satisfy Privacy Constraints

by Vijay S. Iyengar , 2002
"... Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can also contain other kinds of personal information (e.g., date of birth, zip code, gender) that are potentially identifying ..."
Abstract - Cited by 250 (0 self) - Add to MetaCart
, this is combined with a more thorough exploration of the solution space using the genetic algorithm framework. These extensions allow us to transform the data so that they are more useful for their intended purpose while satisfying the privacy constraints.

Characterizing the Effects of Transient Faults on a High-Performance Processor Pipeline

by Nicholas J. Wang, Justin Quek, Todd M. Rafacz, Sanjay J. Patel , 2004
"... The progression of implementation technologies into the sub-100 nanometer lithographies renew the importance of understanding and protecting against single-event upsets in digital systems. In this work, the effects of transient faults on high performance microprocessors is explored. To perform a tho ..."
Abstract - Cited by 132 (4 self) - Add to MetaCart
thorough exploration, a highly detailed register transfer level model of a deeply pipelined, out-of-order microprocessor was created. Using fault injection, we determined that fewer than 15% of single bit corruptions in processor state result in software visible errors. These failures were analyzed

An Evaluation of Naive Bayesian Anti-Spam Filtering

by Ion Androutsopoulos, John Koutsias, Konstantinos V. Chandrinos, Konstantinos V. Ch, George Paliouras, Constantine D. Spyropoulos , 2000
"... It has recently been argued that a Naive Bayesian classifier can be used to filter unsolicited bulk e-mail ("spam"). We conduct a thorough evaluation of this proposal on a corpus that we make publicly available, contributing towards standard benchmarks. At the same time we investigate the ..."
Abstract - Cited by 165 (1 self) - Add to MetaCart
It has recently been argued that a Naive Bayesian classifier can be used to filter unsolicited bulk e-mail ("spam"). We conduct a thorough evaluation of this proposal on a corpus that we make publicly available, contributing towards standard benchmarks. At the same time we investigate

Self-determination and persistence in a real-life setting: Toward a motivational model of high school dropout.

by Robert J Vallerand , Michelle S Fbrtier , Frederic Guay - Journal of Personality and Social Psychology, , 1997
"... The purpose of this study was to propose and test a motivational model of high school dropout. The model posits that teachers, parents, and the school administration's behaviors toward students influence students' perceptions of competence and autonomy. The less autonomy supportive the so ..."
Abstract - Cited by 183 (19 self) - Add to MetaCart
of high school. However, the Vallerand and Bissonnette study did not provide a complete assessment of the motivational model and did not deal with dropping out from high school as such. The purpose of the present study, therefore, was to provide a more thorough test of the motivational model of high

Understanding the capacity region of the greedy maximal scheduling algorithm in multi-hop wireless networks

by Changhee Joo, Xiaojun Lin, Ness B. Shroff - Proc. of IEEE INFOCOM , 2008
"... Abstract—In this paper, we characterize the performance of an important class of scheduling schemes, called Greedy Maximal Scheduling (GMS), for multi-hop wireless networks. While a lower bound on the throughput performance of GMS is relatively well-known in the simple node-exclusive interference mo ..."
Abstract - Cited by 125 (9 self) - Add to MetaCart
model, it has not been thoroughly explored in the more general K-hop interference model. Moreover, empirical observations suggest that the known bounds are quite loose, and that the performance of GMS is often close to optimal. In this paper, we provide a number of new analytic results characterizing

Value Based Requirements Engineering: Exploring Innovative e-Commerce Ideas

by Jaap Gordijn, Hans Akkermans - REQUIREMENTS ENGINEERING JOURNAL , 2002
"... Innovative e-commerce ideas are characterized by commercial products yet unknown to the market, enabled by information technology such as the Internet and technologies on top of it. How to develop such products is hardly known. We propose a interdisciplinary approach, e -value , to explore an ..."
Abstract - Cited by 99 (35 self) - Add to MetaCart
Innovative e-commerce ideas are characterized by commercial products yet unknown to the market, enabled by information technology such as the Internet and technologies on top of it. How to develop such products is hardly known. We propose a interdisciplinary approach, e -value , to explore
Next 10 →
Results 1 - 10 of 1,761
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University