• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 8,993
Next 10 →

Three approaches to qualitative content analysis.

by Hsiu-Fang Hsieh , Sarah E Shannon , 2005
"... Content analysis is a widely used qualitative Researchers regard content analysis as a flexible method for analyzing text data The differentiation of content analysis is usually limited to classifying it as primarily a qualitative versus quantitative research method. A more thorough analysis of th ..."
Abstract - Cited by 729 (0 self) - Add to MetaCart
and support in writing this article. QUALITATIVE HEALTH RESEARCH, Vol. 15 No. 9, November 2005 1277-1288 DOI: 10.1177/1049732305276687 © 2005 use content analysis and the analytic procedures employed in such studies, thus avoiding a muddling of methods Our purpose in this article is to present the breadth

The Skill Content of Recent Technological Change: An Empirical Exploration

by David H. Autor, Frank Levy, Richard J. Murnane , 2000
"... Recent empirical and case study evidence documents a strong association between the adoption of computers and increased use of college educated or non-production workers. With few exceptions, the conceptual link explaining how computer technology complements skilled labor or substitutes for unskille ..."
Abstract - Cited by 643 (28 self) - Add to MetaCart
for unskilled labor is less well developed. In this paper, we apply an understanding of what computers do – the execution of procedural or rules-based logic – to develop a simple model of how the widespread adoption of computers in the workplace might alter workplace skill demands. An essential contention

Wrapper Induction for Information Extraction

by Nicholas Kushmerick , 1997
"... The Internet presents numerous sources of useful information---telephone directories, product catalogs, stock quotes, weather forecasts, etc. Recently, many systems have been built that automatically gather and manipulate such information on a user's behalf. However, these resources are usually ..."
Abstract - Cited by 624 (30 self) - Add to MetaCart
are usually formatted for use by people (e.g., the relevant content is embedded in HTML pages), so extracting their content is difficult. Wrappers are often used for this purpose. A wrapper is a procedure for extracting a particular resource's content. Unfortunately, hand-coding wrappers is tedious. We

Term-weighting approaches in automatic text retrieval

by Gerard Salton, Christopher Buckley - INFORMATION PROCESSING AND MANAGEMENT , 1988
"... The experimental evidence accumulated over the past 20 years indicates that text indexing systems based on the assignment of appropriately weighted single terms produce retrieval results that are superior to those obtainable with other more elaborate text representations. These results depend crucia ..."
Abstract - Cited by 2189 (10 self) - Add to MetaCart
crucially on the choice of effective term-weighting systems. This article summarizes the insights gained in automatic term weighting, and provides baseline single-term-indexing models with which other more elaborate content analysis procedures can be compared.

Learnability in Optimality Theory

by Bruce Tesar, Paul Smolensky , 1995
"... In this article we show how Optimality Theory yields a highly general Constraint Demotion principle for grammar learning. The resulting learning procedure specifically exploits the grammatical structure of Optimality Theory, independent of the content of substantive constraints defining any given gr ..."
Abstract - Cited by 529 (35 self) - Add to MetaCart
In this article we show how Optimality Theory yields a highly general Constraint Demotion principle for grammar learning. The resulting learning procedure specifically exploits the grammatical structure of Optimality Theory, independent of the content of substantive constraints defining any given

Automaticity of social behavior: Direct effects of trait construct and stereotype activation on action

by John A. Bargh, Mark Chen, Lara Burrows - Journal of Personality and Social Psychology , 1996
"... Previous research has shown that trait concepts and stereotypes become active automatically in the presence of relevant behavior or stereotyped-group features. Through the use of the same priming procedures as in previous impression formation research, Experiment l showed that participants whose con ..."
Abstract - Cited by 584 (18 self) - Add to MetaCart
Previous research has shown that trait concepts and stereotypes become active automatically in the presence of relevant behavior or stereotyped-group features. Through the use of the same priming procedures as in previous impression formation research, Experiment l showed that participants whose

The Foundation of a Generic Theorem Prover

by Lawrence C. Paulson - Journal of Automated Reasoning , 1989
"... Isabelle [28, 30] is an interactive theorem prover that supports a variety of logics. It represents rules as propositions (not as functions) and builds proofs by combining rules. These operations constitute a meta-logic (or `logical framework') in which the object-logics are formalized. Isabell ..."
Abstract - Cited by 471 (48 self) - Add to MetaCart
. Higher-order logic has several practical advantages over other meta-logics. Many proof techniques are known, such as Huet's higher-order unification procedure. Key words: higher-order logic, higher-order unification, Isabelle, LCF, logical frameworks, meta-reasoning, natural deduction Contents 1

Automatic Image Annotation and Retrieval using Cross-Media Relevance Models

by J. Jeon, V. Lavrenko, R. Manmatha , 2003
"... Libraries have traditionally used manual image annotation for indexing and then later retrieving their image collections. However, manual image annotation is an expensive and labor intensive procedure and hence there has been great interest in coming up with automatic ways to retrieve images based o ..."
Abstract - Cited by 431 (14 self) - Add to MetaCart
Libraries have traditionally used manual image annotation for indexing and then later retrieving their image collections. However, manual image annotation is an expensive and labor intensive procedure and hence there has been great interest in coming up with automatic ways to retrieve images based

Principal Curves

by TREVOR HASTIE , WERNER STUETZLE , 1989
"... Principal curves are smooth one-dimensional curves that pass through the middle of a p-dimensional data set, providing a nonlinear summary of the data. They are nonparametric, and their shape is suggested by the data. The algorithm for constructing principal curve starts with some prior summary, suc ..."
Abstract - Cited by 394 (1 self) - Add to MetaCart
curves are defined, an algorithm for their construction is given, some theoretical results are presented, and the procedure is compared to other generalizations of principal components. Two applications illustrate the use of principal curves. The first describes how the principal-curve procedure was used

New methods in automatic extracting

by H. P. Edmundson - Journal of the Association for Computing Machinery , 1969
"... ABSTRACT. This paper describes new methods of automatically extracting documents for screening purposes, i.e. the computer selection of sentences having the greatest potential for conveying to the reader the substance of the document. While previous work has focused on one component of sentence sign ..."
Abstract - Cited by 372 (0 self) - Add to MetaCart
significance, namely, the presence of high-frequency content words (key words), the methods described here also treat three additional components: prag-matic words (cue words); title and heading words; and structural indicators (sentence loca-tion). The research has resulted in an operating system and a
Next 10 →
Results 1 - 10 of 8,993
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University