Sciweavers

196 search results - page 39 / 40
» Examining risk attitudes
Sort
View
CORR
2007
Springer
89views Education» more  CORR 2007»
14 years 9 months ago
Evaluating Personal Archiving Strategies for Internet-based Information
Internet-based personal digital belongings present different vulnerabilities than locally stored materials. We use responses to a survey of people who have recovered lost websites...
Catherine C. Marshall, Frank McCown, Michael L. Ne...
BMCBI
2005
157views more  BMCBI 2005»
14 years 9 months ago
Decision Forest Analysis of 61 Single Nucleotide Polymorphisms in a Case-Control Study of Esophageal Cancer; a novel method
Background: Systematic evaluation and study of single nucleotide polymorphisms (SNPs) made possible by high throughput genotyping technologies and bioinformatics promises to provi...
Qian Xie, Luke D. Ratnasinghe, Huixiao Hong, Roger...
JOT
2007
170views more  JOT 2007»
14 years 9 months ago
Enough of Processes - Lets do Practices
All modern software development processes try to help project teams conduct their work. While there are some important differences between them, the commonalities are far greater ...
Ivar Jacobson, Pan Wei Ng, Ian Spence
CSCW
2002
ACM
14 years 9 months ago
Work rhythms: analyzing visualizations of awareness histories of distributed groups
We examined records of minute-by-minute computer activity coupled with information about the location of the activity, online calendar appointments, and e-mail activity. We presen...
James Begole, John C. Tang, Randall B. Smith, Nico...
MOBISYS
2011
ACM
14 years 11 days ago
Analyzing inter-application communication in Android
Modern smartphone operating systems support the development of third-party applications with open system APIs. In addition to an open API, the Android operating system also provid...
Erika Chin, Adrienne Porter Felt, Kate Greenwood, ...