49,400 research outputs found

    Essential guidelines for computational method benchmarking

    Get PDF
    In computational biology and other sciences, researchers are frequently faced with a choice between several computational methods for performing data analyses. Benchmarking studies aim to rigorously compare the performance of different methods using well-characterized benchmark datasets, to determine the strengths of each method or to provide recommendations regarding suitable choices of methods for an analysis. However, benchmarking studies must be carefully designed and implemented to provide accurate, unbiased, and informative results. Here, we summarize key practical guidelines and recommendations for performing high-quality benchmarking analyses, based on our experiences in computational biology.Comment: Minor update

    Electronic Medical Record Adoption in New Zealand Primary Care Physician Offices

    Get PDF
    Describes EMR adoption in New Zealand's primary healthcare system, including how government investment was secured and data protection laws, unique patient identifiers, and standards and certification were established, with lessons for the United States

    ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System

    Full text link
    Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems against threats to confidentiality, integrity, and availability. There are two types of intruders: the external intruders who are unauthorized users of the machines they attack, and internal intruders, who have permission to access the system with some restrictions. Due to the fact that it is more and more improbable to a system administrator to recognize and manually intervene to stop an attack, there is an increasing recognition that ID systems should have a lot to earn on following its basic principles on the behavior of complex natural systems, namely in what refers to self-organization, allowing for a real distributed and collective perception of this phenomena. With that aim in mind, the present work presents a self-organized ant colony based intrusion detection system (ANTIDS) to detect intrusions in a network infrastructure. The performance is compared among conventional soft computing paradigms like Decision Trees, Support Vector Machines and Linear Genetic Programming to model fast, online and efficient intrusion detection systems.Comment: 13 pages, 3 figures, Swarm Intelligence and Patterns (SIP)- special track at WSTST 2005, Muroran, JAPA

    Essential guidelines for computational method benchmarking

    Get PDF
    In computational biology and other sciences, researchers are frequently faced with a choice between several computational methods for performing data analyses. Benchmarking studies aim to rigorously compare the performance of different methods using well-characterized benchmark datasets, to determine the strengths of each method or to provide recommendations regarding suitable choices of methods for an analysis. However, benchmarking studies must be carefully designed and implemented to provide accurate, unbiased, and informative results. Here, we summarize key practical guidelines and recommendations for performing high-quality benchmarking analyses, based on our experiences in computational biology

    Understanding new venture market application search processes: A propositional model.

    Get PDF
    Technology-based ventures are confronted with complex decisions on how to apply their technology platform in highly uncertain and ambiguous market environments. Based on four case studies, a dynamic decision model is developed in which we highlight the similarities between the search and learning processes in venture development contexts and in new product development contexts. This entrepreneurial search and learning process is understood as consisting of sequences of episodes – characterized by uncertainty and ambiguity - and scripts – i.e. approaches to market application search. The model implies that a venture's adaptability - i.e. its ability to move efficiently and effectively between these episodes and their related scripts - influences its survival.Case studies; Decision; Decisions; Learning; Market; Model; Processes; Product; Product development; Research; Sequences; Similarity; Studies; Technology; Uncertainty;

    Networks in Entrepreneurship

    Get PDF
    The value of networks as integral part of the explanation of entrepreneurial success is widely acknowledged. However, the network perspective lacks specification of the various dimensions of a network and their impact on the early development of a venture. We make a distinction between a Schumpeterian start-up pursuing a radical innovation and a Kirznerian venture on basis of an incremental innovation. This distinction is introduced as a contingency in the way networks contribute to the ability of the entrepreneur to discover opportunities, to get resources, and to gain legitimacy. In this explorative study three cases on high technology firms in The Netherlands provide empirical material to develop a number of propositions on the network effect on the survival or performance of start-ups.networks;discovering opportunities;entrepreneurial processes;high-tech entrepreneurship;start-up firms

    The Mirroring Hypothesis: Theory, Evidence and Exceptions

    Get PDF
    The mirroring hypothesis predicts that the organizational patterns of a development project (e.g. communication links, geographic collocation, team and firm co-membership) will correspond to the technical patterns of dependency in the system under development. Scholars in a range of disciplines have argued that mirroring is either necessary or a highly desirable feature of development projects, but evidence pertaining to the hypothesis is widely scattered across fields, research sites, and methodologies. In this paper, we formally define the mirroring hypothesis and review 102 empirical studies spanning three levels of organization: within a single firm, across firms, and in open community-based development projects. The hypothesis was supported in 69% of the cases. Support for the hypothesis was strongest in the within-firm sample, less strong in the across-firm sample, and relatively weak in the open collaborative sample. Based on a detailed analysis of the cases in which the mirroring hypothesis was not supported, we introduce the concept of actionable transparency as a means of achieving coordination without mirroring. We present examples from practice and describe the more complex organizational patterns that emerge when actionable transparency allows designers to 'break the mirror.'Modularity, innovation, product and process development, organization design, design structure, organizational structure, organizational ties

    The influence of classical-conditioning procedures on subsequent attention to the conditioned brand.

    Get PDF
    Three experiments are used to investigate the influence of conditioning procedures on attention to a conditioned stimulus. In experiment 1, scenes presented in a sequence that is consistent with prescribed conditioning procedures are shown to encourage attention to the advertised brands in subsequent product displays. Experiment 2 suggests that differential attention to conditioned brands can be attributed to the signaling properties the brand acquires as a consequence of conditioning. Evidence from a third experiment raises the possibility that semantic conditioning may be responsible for the effects observed in experiments 1 and 2. The findings suggest that current prescriptions on the use of conditioning procedures may need to be updated.contingency awareness; orienting response; external validity; consumer research; context; stimulus; recall;

    Special Session on Industry 4.0

    Get PDF
    No abstract available
    corecore