Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (23312)
- Law (19165)
- Arts and Humanities (17484)
- Physical Sciences and Mathematics (12021)
- Medicine and Health Sciences (10507)
-
- Education (10427)
- Life Sciences (9361)
- Engineering (8994)
- Business (5798)
- History (4266)
- Sociology (3363)
- Library and Information Science (3304)
- Religion (3159)
- Psychology (2795)
- Public Affairs, Public Policy and Public Administration (2599)
- Economics (2524)
- Higher Education (2413)
- Computer Sciences (2317)
- Communication (2246)
- Electrical and Computer Engineering (1881)
- Physics (1832)
- Medical Specialties (1822)
- Public Health (1784)
- Environmental Sciences (1713)
- United States History (1688)
- Political Science (1595)
- English Language and Literature (1550)
- Animal Sciences (1536)
- Christianity (1529)
- Music (1519)
- Institution
-
- Selected Works (18998)
- SelectedWorks (4254)
- University of Nebraska - Lincoln (4126)
- St. John's University School of Law (3309)
- University of Wollongong (2320)
-
- Purdue University (2270)
- Pepperdine University (2242)
- University of South Florida (2232)
- Georgia Southern University (1999)
- Utah State University (1840)
- Villanova University Charles Widger School of Law (1792)
- Western Kentucky University (1615)
- University of New Mexico (1601)
- Brigham Young University (1591)
- California Polytechnic State University, San Luis Obispo (1559)
- University of New Hampshire (1428)
- University of Mississippi (1381)
- UIdaho Law (1373)
- Louisiana State University (1346)
- University of Nevada, Las Vegas (1288)
- University of Tennessee, Knoxville (1268)
- Western University (1208)
- Eastern Illinois University (1205)
- University of Kentucky (1173)
- Clemson University (1100)
- University of Central Florida (1078)
- TÜBİTAK (980)
- Wayne State University (932)
- University of Dayton (896)
- Singapore Management University (889)
- Keyword
-
- Education (1063)
- Athletics (946)
- United States (840)
- 2012 (677)
- Georgia Southern University (656)
-
- Humans (645)
- Kentucky (594)
- Armstrong State University (583)
- Higher education (538)
- History (537)
- Era2012 (510)
- Women (507)
- Journal Articles (484)
- Politics (481)
- Poetry (473)
- Articles (472)
- Gender (461)
- Newspaper (451)
- EIU (448)
- Latin America (432)
- English (422)
- Female (407)
- Cedarville (401)
- International Law (401)
- Law and Society (397)
- Research (384)
- Student newspaper (383)
- Immigration (376)
- Religion (374)
- News Releases (362)
- Publication
-
- St. John's Law Review (2609)
- Theses and Dissertations (2336)
- Electronic Theses and Dissertations (1927)
- 2012 Decisions (1648)
- Faculty Publications (1429)
-
- Leaven (1092)
- Faculty Scholarship (910)
- Idaho Supreme Court Records & Briefs, All (846)
- Dissertations (794)
- Electronic Thesis and Dissertation Repository (711)
- MSS Finding Aids (711)
- Pepperdine Law Review (689)
- University of Mississippi News (676)
- Masters Theses (668)
- Master's Theses (652)
- Journal of Civil Rights and Economic Development (644)
- Articles (642)
- Honors Theses (615)
- Theses (583)
- Doctoral Dissertations (566)
- Canadian Military History (554)
- Not Reported (506)
- Documents (486)
- Open Access Publications (478)
- THE BARK ARCHIVE 2012 (475)
- USF Tampa Graduate Theses and Dissertations (462)
- Publications and Research (443)
- Press Releases (436)
- Notre Dame Journal of Law, Ethics & Public Policy (431)
- Georgia State University Law Review (430)
- Publication Type
Articles 361 - 390 of 147239
Full-Text Articles in Entire DC Network
Render Less Unto Caesar?: Denying Communion To Catholic Judges, Dermot Lynch
Render Less Unto Caesar?: Denying Communion To Catholic Judges, Dermot Lynch
Dermot Lynch
A conservative group of Catholic bishops who seek to deny communion to those who support abortion rights has thus far only targeted pro-choice Catholic public officials and the Catholic voters who have supported them electorally. Yet the movement could as easily act against Catholic judges, including at least three prominent Catholics on the Supreme Court. Yet judges should not be denied communion for the same reason that the sacrament should not be denied to voters or legislators, namely because the standard that the communion denial movement uses in applying this grave sanction is deeply problematic as it invites arbitrary enforcement …
Political Embeddedness And Academic Corruption In Chinese Universities, Qian Forrest Zhang
Political Embeddedness And Academic Corruption In Chinese Universities, Qian Forrest Zhang
Qian Forrest ZHANG
No abstract provided.
Agricultural Modernization In China And Its Impact On Cities: From The Perspective Of Rural-Urban Linkage, Qian Forrest Zhang
Agricultural Modernization In China And Its Impact On Cities: From The Perspective Of Rural-Urban Linkage, Qian Forrest Zhang
Qian Forrest ZHANG
No abstract provided.
Private Exchanges Of Agricultural Land In Zhejiang, China: A Road To Agrarian Capitalism Or Path-Dependent Transformation?, Qian Forrest Zhang
Private Exchanges Of Agricultural Land In Zhejiang, China: A Road To Agrarian Capitalism Or Path-Dependent Transformation?, Qian Forrest Zhang
Qian Forrest ZHANG
No abstract provided.
Computing Immutable Regions For Subspace Top-K Queries, Kyriakos Mouratidis, Hwee Hwa Pang
Computing Immutable Regions For Subspace Top-K Queries, Kyriakos Mouratidis, Hwee Hwa Pang
Kyriakos MOURATIDIS
Given a high-dimensional dataset, a top-k query can be used to shortlist the k tuples that best match the user’s preferences. Typically, these preferences regard a subset of the available dimensions (i.e., attributes) whose relative significance is expressed by user-specified weights. Along with the query result, we propose to compute for each involved dimension the maximal deviation to the corresponding weight for which the query result remains valid. The derived weight ranges, called immutable regions, are useful for performing sensitivity analysis, for finetuning the query weights, etc. In this paper, we focus on top-k queries with linear preference functions over …
Semantically Related Software Terms And Their Taxonomy By Leveraging Collaborative Tagging, Shaowei Wang, David Lo, Lingxiao Jiang
Semantically Related Software Terms And Their Taxonomy By Leveraging Collaborative Tagging, Shaowei Wang, David Lo, Lingxiao Jiang
David LO
Millions of people, including those in the software engineering communities have turned to microblogging services, such as Twitter, as a means to quickly disseminate information. A number of past studies by Treude et al., Storey, and Yuan et al. have shown that a wealth of interesting information is stored in these microblogs. However, microblogs also contain a large amount of noisy content that are less relevant to software developers in engineering software systems. In this work, we perform a preliminary study to investigate the feasibility of automatic classification of microblogs into two categories: relevant and irrelevant to engineering software systems. …
When Would This Bug Get Reported?, Ferdian Thung, David Lo, Lingxiao Jiang, Lucia Lucia, Foyzur Rahman, Premkumar Devanbu
When Would This Bug Get Reported?, Ferdian Thung, David Lo, Lingxiao Jiang, Lucia Lucia, Foyzur Rahman, Premkumar Devanbu
David LO
Millions of people, including those in the software engineering communities have turned to microblogging services, such as Twitter, as a means to quickly disseminate information. A number of past studies by Treude et al., Storey, and Yuan et al. have shown that a wealth of interesting information is stored in these microblogs. However, microblogs also contain a large amount of noisy content that are less relevant to software developers in engineering software systems. In this work, we perform a preliminary study to investigate the feasibility of automatic classification of microblogs into two categories: relevant and irrelevant to engineering software systems. …
Mining Indirect Antagonistic Communities From Social Interactions, Kuan Zhang, David Lo, Ee Peng Lim, Philips Kokoh Prasetyo
Mining Indirect Antagonistic Communities From Social Interactions, Kuan Zhang, David Lo, Ee Peng Lim, Philips Kokoh Prasetyo
David LO
Antagonistic communities refer to groups of people with opposite tastes, opinions, and factions within a community. Given a set of interactions among people in a community, we develop a novel pattern mining approach to mine a set of antagonistic communities. In particular, based on a set of user-specified thresholds, we extract a set of pairs of communities that behave in opposite ways with one another. We focus on extracting a compact lossless representation based on the concept of closed patterns to prevent exploding the number of mined antagonistic communities. We also present a variation of the algorithm using a divide …
Searching Connected Api Subgraph Via Text Phrases, Wing-Kwan Chan, Hong Cheng, David Lo
Searching Connected Api Subgraph Via Text Phrases, Wing-Kwan Chan, Hong Cheng, David Lo
David LO
Reusing APIs of existing libraries is a common practice during software development, but searching suitable APIs and their usages can be time-consuming [6]. In this paper, we study a new and more practical approach to help users find usages of APIs given only simple text phrases, when users have limited knowledge about an API library. We model API invocations as an API graph and aim to find an optimum connected subgraph that meets users' search needs. The problem is challenging since the search space in an API graph is very huge. We start with a greedy subgraph search algorithm which …
Learning Extended Fsa From Software: An Empirical Assessment, David Lo, Leonardo Mariani, Mauro Santoro
Learning Extended Fsa From Software: An Empirical Assessment, David Lo, Leonardo Mariani, Mauro Santoro
David LO
A number of techniques that infer finite state automata from execution traces have been used to support test and analysis activities. Some of these techniques can produce automata that integrate information about the data-flow, that is, they also represent how data values affect the operations executed by programs. The integration of information about operation sequences and data values into a unique model is indeed conceptually useful to accurately represent the behavior of a program. However, it is still unclear whether handling heterogeneous types of information, such as operation sequences and data values, necessarily produces higher quality models or not. In …
Scenario-Based And Value-Based Specification Mining: Better Together, David Lo, Shahar Maoz
Scenario-Based And Value-Based Specification Mining: Better Together, David Lo, Shahar Maoz
David LO
Specification mining takes execution traces as input and extracts likely program invariants, which can be used for comprehension, verification, and evolution related tasks. In this work we integrate scenario-based specification mining, which uses a data-mining algorithm to suggest ordering constraints in the form of live sequence charts, an inter-object, visual, modal, scenario-based specification language, with mining of value-based invariants, which detects likely invariants holding at specific program points. The key to the integration is a technique we call scenario-based slicing, running on top of the mining algorithms to distinguish the scenario-specific invariants from the general ones. The resulting suggested specifications …
Observatory Of Trends In Software Related Microblogs, Achananuparp Palakorn, Nelman Lubis Ibrahim, Yuan Tian, David Lo, Ee Peng Lim
Observatory Of Trends In Software Related Microblogs, Achananuparp Palakorn, Nelman Lubis Ibrahim, Yuan Tian, David Lo, Ee Peng Lim
David LO
Microblogging has recently become a popular means to disseminate information among millions of people. Interestingly, software developers also use microblog to communicate with one another. Different from traditional media, microblog users tend to focus on recency and informality of content. Many tweet contents are relatively more personal and Opinionated, compared to that of traditional news report. Thus, by analyzing microblogs, one could get the up-to-date information about what people are interested in or feel toward a particular topic. In this paper, we describe our microblog observatory that aggregates more than 70,000 Twitter feeds, captures software-related tweets, and computes trends from …
Kbe-Anonymity: Test Data Anonymization For Evolving Programs, - Lucia, David Lo, Lingxiao Jiang, Aditya Budi
Kbe-Anonymity: Test Data Anonymization For Evolving Programs, - Lucia, David Lo, Lingxiao Jiang, Aditya Budi
David LO
High-quality test data that is useful for effective testing is often available on users’ site. However, sharing data owned by users with software vendors may raise privacy concerns. Techniques are needed to enable data sharing among data owners and the vendors without leaking data privacy. Evolving programs bring additional challenges because data may be shared multiple times for every version of a program. When multiple versions of the data are cross-referenced, private information could be inferred. Although there are studies addressing the privacy issue of data sharing for testing and debugging, little work has explicitly addressed the challenges when programs …
To What Extent Could We Detect Field Defects? —An Empirical Study Of False Negatives In Static Bug Finding Tools, Ferdian Thung, - Lucia, David Lo, Lingxiao Jiang, Premkumar Devanbu, Foyzur Rahman
To What Extent Could We Detect Field Defects? —An Empirical Study Of False Negatives In Static Bug Finding Tools, Ferdian Thung, - Lucia, David Lo, Lingxiao Jiang, Premkumar Devanbu, Foyzur Rahman
David LO
Software defects can cause much loss. Static bug-finding tools are believed to help detect and remove defects. These tools are designed to find programming errors; but, do they in fact help prevent actual defects that occur in the field and reported by users? If these tools had been used, would they have detected these field defects, and generated warnings that would direct programmers to fix them? To answer these questions, we perform an empirical study that investigates the effectiveness of state-of-the-art static bug finding tools on hundreds of reported and fixed defects extracted from three open source programs: Lucene, Rhino, …
Information Retrieval Based Nearest Neighbor Classification For Fine-Grained Bug Severity Prediction, Yuan Tian, David Lo, Chengnian Sun
Information Retrieval Based Nearest Neighbor Classification For Fine-Grained Bug Severity Prediction, Yuan Tian, David Lo, Chengnian Sun
David LO
Bugs are prevalent in software systems. Some bugs are critical and need to be fixed right away, whereas others are minor and their fixes could be postponed until resources are available. In this work, we propose a new approach leveraging information retrieval, in particular BM25-based document similarity function, to automatically predict the severity of bug reports. Our approach automatically analyzes bug reports reported in the past along with their assigned severity labels, and recommends severity labels to newly reported bug reports. Duplicate bug reports are utilized to determine what bug report features, be it textual, ordinal, or categorical, are important. …
Semantic Patch Inference, Jesper Abdersen, Anh Cuong Nguyen, David Lo, Julia Lawall, Siau-Cheng Khoo
Semantic Patch Inference, Jesper Abdersen, Anh Cuong Nguyen, David Lo, Julia Lawall, Siau-Cheng Khoo
David LO
We propose a tool for inferring transformation specifications from a few examples of original and updated code. These transformation specifications may contain multiple code fragments from within a single function, all of which must be present for the transformation to apply. This makes the inferred transformations context sensitive. Our algorithm is based on depth-first search, with pruning. Because it is applied locally to a collection of functions that contain related changes, it is efficient in practice. We illustrate the approach on an example drawn from recent changes to the Linux kernel.
An Empirical Study Of Bugs In Machine Learning Systems, Ferdian Thung, Shaowei Wang, David Lo, Lingxiao Jiang
An Empirical Study Of Bugs In Machine Learning Systems, Ferdian Thung, Shaowei Wang, David Lo, Lingxiao Jiang
David LO
Many machine learning systems that include various data mining, information retrieval, and natural language processing code and libraries have being used in real world applications. Search engines, internet advertising systems, product recommendation systems are sample users of these algorithm intensive code and libraries. Machine learning code and toolkits have also been used in many recent studies on software mining and analytics that aim to automate various software engineering tasks. With the increasing number of important applications of machine learning systems, the reliability of such systems is also becoming increasingly important. A necessary step for ensuring reliability of such systems is …
Duplicate Bug Report Detection With A Combination Of Information Retrieval And Topic Modeling, Anh Tuan Nguyen, Tung Nguyen, Tien Nguyen, David Lo, Chengnian Sun
Duplicate Bug Report Detection With A Combination Of Information Retrieval And Topic Modeling, Anh Tuan Nguyen, Tung Nguyen, Tien Nguyen, David Lo, Chengnian Sun
David LO
Detecting duplicate bug reports helps reduce triaging efforts and save time for developers in fixing the same issues. Among several automated detection approaches, text-based information retrieval (IR) approaches have been shown to outperform others in term of both accuracy and time efficiency. However, those IR-based approaches do not detect well the duplicate reports on the same technical issues written in different descriptive terms. This paper introduces DBTM, a duplicate bug report detection approach that takes advantage of both IR-based features and topic-based features. DBTM models a bug report as a textual document describing certain technical issue(s), and models duplicate bug …
Automatic Classification Of Software Related Microblogs, Philips Kokoh Prasetyo, David Lo, Achananuparp Palakorn, Yuan Tian, Ee Peng Lim
Automatic Classification Of Software Related Microblogs, Philips Kokoh Prasetyo, David Lo, Achananuparp Palakorn, Yuan Tian, Ee Peng Lim
David LO
Millions of people, including those in the software engineering communities have turned to microblogging services, such as Twitter, as a means to quickly disseminate information. A number of past studies by Treude et al., Storey, and Yuan et al. have shown that a wealth of interesting information is stored in these microblogs. However, microblogs also contain a large amount of noisy content that are less relevant to software developers in engineering software systems. In this work, we perform a preliminary study to investigate the feasibility of automatic classification of microblogs into two categories: relevant and irrelevant to engineering software systems. …
Interactive Fault Localization Leveraging Simple User Feedbacks, Liang Gong, David Lo, Lingxiao Jiang, Hongyu Zhang
Interactive Fault Localization Leveraging Simple User Feedbacks, Liang Gong, David Lo, Lingxiao Jiang, Hongyu Zhang
David LO
Millions of people, including those in the software engineering communities have turned to microblogging services, such as Twitter, as a means to quickly disseminate information. A number of past studies by Treude et al., Storey, and Yuan et al. have shown that a wealth of interesting information is stored in these microblogs. However, microblogs also contain a large amount of noisy content that are less relevant to software developers in engineering software systems. In this work, we perform a preliminary study to investigate the feasibility of automatic classification of microblogs into two categories: relevant and irrelevant to engineering software systems. …
Diversity Maximization Speedup For Fault Localization, Liang Gong, David Lo, Lingxiao Jiang, Hongyu Zhang
Diversity Maximization Speedup For Fault Localization, Liang Gong, David Lo, Lingxiao Jiang, Hongyu Zhang
David LO
Fault localization is useful for reducing debugging effort. However, many fault localization techniques require non-trivial number of test cases with oracles, which can determine whether a program behaves correctly for every test input. Test oracle creation is expensive because it can take much manual labeling effort. Given a number of test cases to be executed, it is challenging to minimize the number of test cases requiring manual labeling and in the meantime achieve good fault localization accuracy. To address this challenge, this paper presents a novel test case selection strategy based on Diversity Maximization Speedup (DMS). DMS orders a set …
International Terrorism And Television Channels:Operation And Regulation Of Tv News Channel During Coverage Of Terrorism, Ratnesh Dwivedi Mr
International Terrorism And Television Channels:Operation And Regulation Of Tv News Channel During Coverage Of Terrorism, Ratnesh Dwivedi Mr
Ratnesh Dwivedi
The concept of globalization or internationalization of certain wars, which were result of terrorist activities worldwide , as well as the high attention of terrorism coverage broadcast worldwide might open up better opportunities to journalists – particularly to those who work in democratic countries like U.S.A and India – to improve their coverage. The context is the key: the context of the operation methodology, follow of guidelines of regulatory bodies,and of the journalistic culture and of the global environment. It is very important how media presents consequences of terrorist acts, how information is transmitted to public. Television and press have …
Successfully Climbing The "Stairs": Surmounting Failed Translation Of Experimental Ischemic Stroke Treatments, Michael Kahle, Gregory J. Bix
Successfully Climbing The "Stairs": Surmounting Failed Translation Of Experimental Ischemic Stroke Treatments, Michael Kahle, Gregory J. Bix
Sanders-Brown Center on Aging Faculty Publications
The Stroke Therapy Academic Industry Roundtable (STAIR) provided initial (in 1999) and updated (in 2009) recommendations with the goal of improving preclinical stroke therapy assessment and to increase the translational potential of experimental stroke treatments. It is important for preclinical stroke researchers to frequently consider and revisit these concepts, especially since promising experimental stroke treatments continue to fail in human clinical trials. Therefore, this paper will focus on considerations for several key aspects of preclinical stroke studies including the selection and execution of the animal stroke model, drug/experimental treatment administration, and outcome measures to improve experimental validity and translation potential. …
Participatory Budgeting: Diffusion And Outcomes Across The World, Brian Wampler, Janette Hartz-Karp
Participatory Budgeting: Diffusion And Outcomes Across The World, Brian Wampler, Janette Hartz-Karp
Political Science Faculty Publications and Presentations
In this special issue of the Journal of Public Deliberation, multiple faces of Participatory Budgeting programs are revealed. The articles demonstrate that there is no standardized set of “best practices” that governments are adopting, but there are a broader set of principles that are adapted by local governments to meet local circumstances. Adopt and adapt appears to be the logic behind many PB programs.
Uji Aktivitas Penghambatan Enzim Alfaglukosidase Pada Beberapa Tanaman Suku Euphorbiaceae, Berna Elya, Katrin Katrin, Anastasia Bangun
Uji Aktivitas Penghambatan Enzim Alfaglukosidase Pada Beberapa Tanaman Suku Euphorbiaceae, Berna Elya, Katrin Katrin, Anastasia Bangun
Majalah Ilmu Kefarmasian
Diabetes mellitus (types 1 and 2) is recognized as a serious global health problem that characterized by hyperglycemia. Type 2 diabetes is more common in diabetic populations. In type 2 diabetes mellitus, inhibition of α-glucosidase is a useful treatment to delay the absorption of glucose after meals. Avoiding the adverse effects of current agents, it is still necessary to search alternative for better options. Plants have been a rich source of α-glucosidase inhibitors. In this research, screenings based on chemotaxonomic approach to determine the class of chemical constituents and to know α-glucosidase inhibiting activity of some plants from Euphorbiaceae. The …
Preparasi, Karakterisasi Dan Evaluasi Pelepasan Obat Dari Beads Kalsium Alginat Deksametason Dengan Metode Gelasi Ionik, Christye Aulia, Joshita Djajadisastra
Preparasi, Karakterisasi Dan Evaluasi Pelepasan Obat Dari Beads Kalsium Alginat Deksametason Dengan Metode Gelasi Ionik, Christye Aulia, Joshita Djajadisastra
Majalah Ilmu Kefarmasian
Inflammatory Bowel Disease (IBD) is a disease of inflammation in the colon. Targeted delivery systems for the treatment of IBD is designed to increase the drug concentration in the local tissue. Dexamethasone is a drug having anti-inflammatory and antifibrosis effects which is used to repair scar tissue arising from postoperative IBD. This research purpose to create calciumalginate beads dexamethasone to be released only in the colon. Beads were made by using sodium-alginate and Ca2+ as crosslinker by ionic gelation method, with ratio between sodium alginate-dexamethasone (3:1). A concentration of solution sodium alginate 3 % b/v with variation concentration of crosslinker …
Participatory Budgeting: Core Principles And Key Impacts, Brian Wampler
Participatory Budgeting: Core Principles And Key Impacts, Brian Wampler
Political Science Faculty Publications and Presentations
This essay is a reflection piece. I identify key principles at the core of how PB functions and to discuss the scope of change we might expect to see generated by these institutions. I move beyond the idea that there is a specific model or set of “best practices” that define PB. Rather, it is most fruitful to conceptualize PB as a set of principles that can generate social change. The weaker the adherence to these principles, the less social change generated. The second purpose of the essay is to reflect on the impacts generated by PB. How do these …
February 18, 2010 - Healing Academy - Nurturing Transformation - Re-Visioning Christian Soul Care - Part 1b By David Benner, David Benner
February 18, 2010 - Healing Academy - Nurturing Transformation - Re-Visioning Christian Soul Care - Part 1b By David Benner, David Benner
ATS Conferences
No abstract provided.
Nbr2 Errata And Comments, Joseph Hilbe
Nbr2 Errata And Comments, Joseph Hilbe
Joseph M Hilbe
Errata and Comments for Negative Binomial Regression, 2nd edition
23andme Inc.: Patent Law And Lifestyle Genetics, Matthew Rimmer
23andme Inc.: Patent Law And Lifestyle Genetics, Matthew Rimmer
Matthew Rimmer
The venture, 23andMe Inc., raises a host of issues in respect of patent law, policy, and practice in respect of lifestyle genetics and personalised medicine. The company observes: ‘We recognize that the availability of personal genetic information raises important issues at the nexus of ethics, law, and public policy’. 23andMe Inc. has tested the boundaries of patent law, with its patent applications, which cut across information technology, medicine, and biotechnology. The company’s research raises fundamental issues about patentability, especially in light of the litigation in Bilski v. Kappos, Mayo Collaborative Services v. Prometheus Laboratories Inc. and Association for Molecular Pathology …