• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 13,662
Next 10 →

LONG TRADITION OF MAINTAINING REGISTERS

by Mika Gissler, Jari Haukka
"... Finland introduced a personal identification number system in 1964, and since then practically all admini-strative registers have included this unique identification code. Currently Finland has strict data protection laws, which prohibit the collection of sensitive health and social information. Hea ..."
Abstract - Add to MetaCart
Finland introduced a personal identification number system in 1964, and since then practically all admini-strative registers have included this unique identification code. Currently Finland has strict data protection laws, which prohibit the collection of sensitive health and social information. Health data that includes identifiers can be gathered by obtaining informed consent from the patients or clients, or under special legislation. An important exemption of this general principle, however, is the collection and use of such data for statistical and scientific purposes, for example in epidemiological studies. Thus, these registers can be used as a basis when trying to improve health, welfare, health services, and social welfare services. This article describes the health and social welfare register system and data protection legislation in Finland, and gives some examples on epidemiological register studies. This article also presents methods for promoting

A Fast File System for UNIX

by Marshall Kirk Mckusick, William N. Joy, Samuel J. Leffler, Robert S. Fabry - ACM Transactions on Computer Systems , 1984
"... A reimplementation of the UNIX file system is described. The reimplementation provides substantially higher throughput rates by using more flexible allocation policies that allow better locality of reference and can be adapted to a wide range of peripheral and processor characteristics. The new file ..."
Abstract - Cited by 565 (6 self) - Add to MetaCart
file system clusters data that is sequentially accessed and provides two block sizes to allow fast access to large files while not wasting large amounts of space for small files. File access rates of up to ten times faster than the traditional UNIX file system are experienced. Long needed enhancements

Sequential data assimilation with a nonlinear quasi-geostrophic model using Monte Carlo methods to forecast error statistics

by Geir Evensen - J. Geophys. Res , 1994
"... . A new sequential data assimilation method is discussed. It is based on forecasting the error statistics using Monte Carlo methods, a better alternative than solving the traditional and computationally extremely demanding approximate error covariance equation used in the extended Kalman filter. The ..."
Abstract - Cited by 800 (23 self) - Add to MetaCart
. A new sequential data assimilation method is discussed. It is based on forecasting the error statistics using Monte Carlo methods, a better alternative than solving the traditional and computationally extremely demanding approximate error covariance equation used in the extended Kalman filter

Semantic Similarity in a Taxonomy: An Information-Based Measure and its Application to Problems of Ambiguity in Natural Language

by Philip Resnik , 1999
"... This article presents a measure of semantic similarityinanis-a taxonomy based on the notion of shared information content. Experimental evaluation against a benchmark set of human similarity judgments demonstrates that the measure performs better than the traditional edge-counting approach. The a ..."
Abstract - Cited by 609 (9 self) - Add to MetaCart
This article presents a measure of semantic similarityinanis-a taxonomy based on the notion of shared information content. Experimental evaluation against a benchmark set of human similarity judgments demonstrates that the measure performs better than the traditional edge-counting approach

Investor psychology and security market under- and overreactions

by Kent Daniel, David Hirshleifer - Journal of Finance , 1998
"... We propose a theory of securities market under- and overreactions based on two well-known psychological biases: investor overconfidence about the precision of private information; and biased self-attribution, which causes asymmetric shifts in investors ’ confidence as a function of their investment ..."
Abstract - Cited by 698 (43 self) - Add to MetaCart
outcomes. We show that overconfidence implies negative long-lag autocorrelations, excess volatility, and, when managerial actions are correlated with stock mispricing, public-event-based return predictability. Biased self-attribution adds positive short-lag autocorrela-tions ~“momentum”!, short

A Meta-Analytic Review of Experiments Examining the Effects of Extrinsic Rewards on Intrinsic Motivation

by Edward L. Deci, Richard Koestner, Richard M. Ryan
"... A meta-analysis of 128 studies examined the effects of extrinsic rewards on intrinsic motivation. As predicted, engagement-contingent, completion-contingent, and performance-contingent rewards signifi-cantly undermined free-choice intrinsic motivation (d =-0.40,-0.36, and-0.28, respectively), as did ..."
Abstract - Cited by 664 (18 self) - Add to MetaCart
this study's methods, analyses, and results differed from the previous ones. By 1971, hundreds of studies within the operant tradition (Skin-ner, 1953) had established that extrinsic rewards can control be-havior. When administered closely subsequent to a behavior, re-wards were reliably found

Fuzzy extractors: How to generate strong keys from biometrics and other noisy data

by Yevgeniy Dodis, Rafail Ostrovsky, Leonid Reyzin, Adam Smith , 2008
"... We provide formal definitions and efficient secure techniques for • turning noisy information into keys usable for any cryptographic application, and, in particular, • reliably and securely authenticating biometric data. Our techniques apply not just to biometric information, but to any keying mater ..."
Abstract - Cited by 535 (38 self) - Add to MetaCart
material that, unlike traditional cryptographic keys, is (1) not reproducible precisely and (2) not distributed uniformly. We propose two primitives: a fuzzy extractor reliably extracts nearly uniform randomness R from its input; the extraction is error-tolerant in the sense that R will be the same even

The Role of Emotion in Believable Agents

by Joseph Bates - Communications of the ACM , 1994
"... Articial intelligence researchers attempting to create engaging apparently living creatures may nd important insight in the work of artists who have explored the idea of believable character In particular appropriately timed and clearly expressed emotion is a central requirement for believable ch ..."
Abstract - Cited by 557 (1 self) - Add to MetaCart
It does not mean an honest or reliable character but one that provides the illusion of life and thus permits the audience s suspension of disbelief The idea of believability has long been studied and explored in literature theater lm radio drama and other media Traditional character animators

Estimating Wealth Effects without Expenditure Data— or Tears

by Deon Filmer, Lant Pritchett - Policy Research Working Paper 1980, The World , 1998
"... Abstract: We use the National Family Health Survey (NFHS) data collected in Indian states in 1992 and 1993 to estimate the relationship between household wealth and the probability a child (aged 6 to 14) is enrolled in school. A methodological difficulty to overcome is that the NFHS, modeled closely ..."
Abstract - Cited by 871 (16 self) - Add to MetaCart
closely on the Demographic and Health Surveys (DHS), measures neither household income nor consumption expenditures. As a proxy for long-run household wealth we construct a linear index from a set of asset indicators using principal components analysis to derive the weights. This “asset index ” is robust

An Energy-Efficient MAC Protocol for Wireless Sensor Networks

by Wei Ye, John Heidemann, Deborah Estrin , 2002
"... This paper proposes S-MAC, a medium-access control (MAC) protocol designed for wireless sensor networks. Wireless sensor networks use battery-operated computing and sensing devices. A network of these devices will collaborate for a common application such as environmental monitoring. We expect senso ..."
Abstract - Cited by 1517 (36 self) - Add to MetaCart
sensor networks to be deployed in an ad hoc fashion, with individual nodes remaining largely inactive for long periods of time, but then becoming suddenly active when something is detected. These characteristics of sensor networks and applications motivate a MAC that is different from traditional
Next 10 →
Results 1 - 10 of 13,662
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University