49,400 research outputs found
Essential guidelines for computational method benchmarking
In computational biology and other sciences, researchers are frequently faced
with a choice between several computational methods for performing data
analyses. Benchmarking studies aim to rigorously compare the performance of
different methods using well-characterized benchmark datasets, to determine the
strengths of each method or to provide recommendations regarding suitable
choices of methods for an analysis. However, benchmarking studies must be
carefully designed and implemented to provide accurate, unbiased, and
informative results. Here, we summarize key practical guidelines and
recommendations for performing high-quality benchmarking analyses, based on our
experiences in computational biology.Comment: Minor update
Electronic Medical Record Adoption in New Zealand Primary Care Physician Offices
Describes EMR adoption in New Zealand's primary healthcare system, including how government investment was secured and data protection laws, unique patient identifiers, and standards and certification were established, with lessons for the United States
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
Security of computers and the networks that connect them is increasingly
becoming of great significance. Computer security is defined as the protection
of computing systems against threats to confidentiality, integrity, and
availability. There are two types of intruders: the external intruders who are
unauthorized users of the machines they attack, and internal intruders, who
have permission to access the system with some restrictions. Due to the fact
that it is more and more improbable to a system administrator to recognize and
manually intervene to stop an attack, there is an increasing recognition that
ID systems should have a lot to earn on following its basic principles on the
behavior of complex natural systems, namely in what refers to
self-organization, allowing for a real distributed and collective perception of
this phenomena. With that aim in mind, the present work presents a
self-organized ant colony based intrusion detection system (ANTIDS) to detect
intrusions in a network infrastructure. The performance is compared among
conventional soft computing paradigms like Decision Trees, Support Vector
Machines and Linear Genetic Programming to model fast, online and efficient
intrusion detection systems.Comment: 13 pages, 3 figures, Swarm Intelligence and Patterns (SIP)- special
track at WSTST 2005, Muroran, JAPA
Essential guidelines for computational method benchmarking
In computational biology and other sciences, researchers are frequently faced with a choice between several computational methods for performing data analyses. Benchmarking studies aim to rigorously compare the performance of different methods using well-characterized benchmark datasets, to determine the strengths of each method or to provide recommendations regarding suitable choices of methods for an analysis. However, benchmarking studies must be carefully designed and implemented to provide accurate, unbiased, and informative results. Here, we summarize key practical guidelines and recommendations for performing high-quality benchmarking analyses, based on our experiences in computational biology
Understanding new venture market application search processes: A propositional model.
Technology-based ventures are confronted with complex decisions on how to apply their technology platform in highly uncertain and ambiguous market environments. Based on four case studies, a dynamic decision model is developed in which we highlight the similarities between the search and learning processes in venture development contexts and in new product development contexts. This entrepreneurial search and learning process is understood as consisting of sequences of episodes – characterized by uncertainty and ambiguity - and scripts – i.e. approaches to market application search. The model implies that a venture's adaptability - i.e. its ability to move efficiently and effectively between these episodes and their related scripts - influences its survival.Case studies; Decision; Decisions; Learning; Market; Model; Processes; Product; Product development; Research; Sequences; Similarity; Studies; Technology; Uncertainty;
Networks in Entrepreneurship
The value of networks as integral part of the explanation of entrepreneurial success is widely acknowledged. However, the network perspective lacks specification of the various dimensions of a network and their impact on the early development of a venture. We make a distinction between a Schumpeterian start-up pursuing a radical innovation and a Kirznerian venture on basis of an incremental innovation. This distinction is introduced as a contingency in the way networks contribute to the ability of the entrepreneur to discover opportunities, to get resources, and to gain legitimacy. In this explorative study three cases on high technology firms in The Netherlands provide empirical material to develop a number of propositions on the network effect on the survival or performance of start-ups.networks;discovering opportunities;entrepreneurial processes;high-tech entrepreneurship;start-up firms
The Mirroring Hypothesis: Theory, Evidence and Exceptions
The mirroring hypothesis predicts that the organizational patterns of a development project (e.g. communication links, geographic collocation, team and firm co-membership) will correspond to the technical patterns of dependency in the system under development. Scholars in a range of disciplines have argued that mirroring is either necessary or a highly desirable feature of development projects, but evidence pertaining to the hypothesis is widely scattered across fields, research sites, and methodologies. In this paper, we formally define the mirroring hypothesis and review 102 empirical studies spanning three levels of organization: within a single firm, across firms, and in open community-based development projects. The hypothesis was supported in 69% of the cases. Support for the hypothesis was strongest in the within-firm sample, less strong in the across-firm sample, and relatively weak in the open collaborative sample. Based on a detailed analysis of the cases in which the mirroring hypothesis was not supported, we introduce the concept of actionable transparency as a means of achieving coordination without mirroring. We present examples from practice and describe the more complex organizational patterns that emerge when actionable transparency allows designers to 'break the mirror.'Modularity, innovation, product and process development, organization design, design structure, organizational structure, organizational ties
The influence of classical-conditioning procedures on subsequent attention to the conditioned brand.
Three experiments are used to investigate the influence of conditioning procedures on attention to a conditioned stimulus. In experiment 1, scenes presented in a sequence that is consistent with prescribed conditioning procedures are shown to encourage attention to the advertised brands in subsequent product displays. Experiment 2 suggests that differential attention to conditioned brands can be attributed to the signaling properties the brand acquires as a consequence of conditioning. Evidence from a third experiment raises the possibility that semantic conditioning may be responsible for the effects observed in experiments 1 and 2. The findings suggest that current prescriptions on the use of conditioning procedures may need to be updated.contingency awareness; orienting response; external validity; consumer research; context; stimulus; recall;
- …