Search Results

You are looking at 1 - 10 of 15 items for :

  • "elicitation" x
  • Mathematics and Statistics x
  • Refine by Access: All Content x
Clear All

Summary Parallel mappings of the intellectual and cognitive structure of Software Engineering (SE) were conducted using Author Cocitation Analysis (ACA), PFNet Analysis, and card sorting, a Knowledge Elicitation (KE) method. Cocitation counts for 60 prominent SE authors over the period 1990 - 1997 were gathered from SCISEARCH. Forty-six software engineers provided similar data by sorting authors’ names into labeled piles. At the 8 cluster level, ACA and KE identified similar author clusters representing key areas of SE research and application, though the KE labels suggested some differences between the way that the authors’ works were used and how they were perceived by respondents. In both maps, the clusters were arranged along a horizontal axis moving from “micro” to “macro” level R&D activities (correlation of X axis coordinates = 0.73). The vertical axis of the two maps differed (correlation of Y axis coordinates = -0.08). The Y axis of the ACA map pointed to a continuum of high to low formal content in published work, whereas the Y axis of the KE map was anchored at the bottom by “generalist” authors and at the top by authors identified with a single, highly specific and consistent specialty. The PFNet of the raw ACA counts identified Boehm, Basili, and Booch as central figures in subregions of the network with Boehm being connected directly or through a single intervening author with just over 50% of the author set. The ACA and KE combination provides a richer picture of the knowledge domain and provide useful cross-validation.

Restricted access
Studia Scientiarum Mathematicarum Hungarica
Authors: Morad Alizadeh, Saeid Tahmasebi, Mohammad Reza Kazemi, Hamideh Siyamar Arabi Nejad, and G. Hossein G. Hamedani

), 241 – 260 . [32] Willemse , W. and Koppelaar , H. , Knowledge elicitation of gompertz'law of mortality , Scandinavian Actuarial

Restricted access

threads (or the ability for threads to elicit response), subdivided by initiation message type. As might be expected, requests for feedback are over twice as prevalent in the subgroup of messages that received a response as they are in the entire

Restricted access

JIFs. Journals with very different JIFs should be studied in more detail to elicit common characteristics that lead to the differences. The identified characteristics can give hints for possible changes to the JIF calculation by Thomson Reuters

Restricted access

characteristics that can influence research productivity. Responses were elicited as text, numeric, binary (Yes/No), or 5 point Likert-type (1 = strongly agree, 2 = somewhat agree, 3 = neither agree nor disagree, 4 = somewhat disagree, and 5 = strongly disagree

Restricted access

usually elicit comments only from the designated referees. Why would scientists invest effort and time commenting on papers which they find interesting but non controversial?” (Pöschl 2010 , p. 300). We would like to mention as a limitation of our

Restricted access

researchers. Conversely, colorectal, lung, pancreatic, prostate and stomach cancers are relatively less burdensome in India than they are worldwide and so do not elicit so much Indian research. However, liver cancer, melanomas and uterine cancer appear to be

Restricted access

prove to be a rigorous method of collecting the needed information. (5) Personal contacts (see acknowledgements) also elicited pointers to databases, as well as some lists that are not available electronically. (6) A search query was placed on several

Restricted access
Scientometrics
Authors: Jun-Ying Fu, Xu Zhang, Yun-Hua Zhao, He-Feng Tong, Dar-Zen Chen, and Mu-Hsuan Huang

scientific community, and also compare the bibliometric impacts among different types of collaborations in different countries/regions. Collaboration network will be further observed on the basis of the result elicited in this paper, but is not the focus

Restricted access

; (8) thoughts of death or suicide; attempted suicide (American Psychiatric Association 1980 ). The DSM-I, published in 1952, and the DSM-II, in 1968, did not elicit much response since psychoanalytic theory, preeminent at the

Restricted access