8,512 Hits in 5.7 sec

Circling the undefined—A grounded theory study of intercultural consultations in Swedish primary care

Erica Rothlind, Uno Fors, Helena Salminen, Per Wändell, Solvig Ekblad, Barbara Schouten
2018 PLoS ONE  
step closer to sharing, rather than circling the undefined.  ...  The analysis generated a conceptual model named circling the undefined, where a silent agreement on issues fundamental to the core of the consultation was inadequately presumed and the communicative behaviors  ...  I've honestly talked to people who think the doctor is racist, that's what I've seen, even among my friends."  ... 
doi:10.1371/journal.pone.0203383 pmid:30161227 fatcat:tgggicfvovg25bt6p5mdoeqfpu

Deictic codes for the embodiment of cognition

Dana H. Ballard, Mary M. Hayhoe, Polly K. Pook, Rajesh P. N. Rao
1997 Behavioral and Brain Sciences  
Abstract: This commentary raises three questions about the target article: What are pointers or deictic devices? Why insist on deictic codes for cognition rather than deixis simpliciter?  ...  phenomena but less abstract than what is traditionally used to study high-level cognitive processes such as reasoning.  ...  For what it's worth, here is my attempt to meld deictic codes with my own ideas about the division of labour in the dorsal and ventral streams.  ... 
doi:10.1017/s0140525x97001611 fatcat:45j2crpyxjdzznuhtznnnwpdjy

Activism, Event and the Transmission of Behavior: Designing With Behavior for Behavior

Tjhien Liao
2022 Zenodo  
As such, it is a powerful means for design when it comes to behavior change: Designing with behavior for behavior.  ...  In Helsinki, summer 2010, a group of friends challenged each other to just consume at local independent stores for two weeks long.  ...  This infringement allows and attempts to legitimize the act: "Look at what happened to movie theaters!  ... 
doi:10.5281/zenodo.5833807 fatcat:y3tfsp2oe5hsjb53pbgivzaifi

Automatic formal verification for scheduled VLIW code

Xiushan Feng, Alan J. Hu
2002 Proceedings of the joint conference on Languages, compilers and tools for embedded systems software and compilers for embedded systems - LCTES/SCOPES '02  
Hu, who was and is an inspiration to me in many ways. Without his ideas and encouragement, my research would not have been nearly as successful.  ...  Hu as a paper for the ACM SIGPLAN Joint Conference LCTES/SCOPES'02. viii To my parents, for their endless patience and support. ix Chapter 1 Description Program Address Generate Determine address of the  ...  Second, the compiler has knowledge of the source code of the program, and source code typically has more information to track program behavior.  ... 
doi:10.1145/513829.513844 dblp:conf/lctrts/FengH02 fatcat:cgw473q6rbbgvlbczahsn2q734

Towards an ethical code for information security?

Steven J. Greenwald, Brian D. Snow, Richard Ford, Richard Thieme
2008 Proceedings of the 2008 workshop on New security paradigms - NSPW '08  
Our panelist positions run the gamut from "We desperately need a strong code of ethics" to "A specialized ethical code would cause great harm."  ...  Along with our positions, we report on the feedback we received from the NSPW process and what we learned.  ...  As editor, any mistakes appearing in this paper happened solely due to Steve Greenwald.  ... 
doi:10.1145/1595676.1595689 dblp:conf/nspw/GreenwaldSFT08 fatcat:q3zxhp2mencdbhmm6ccsggqcdi

How statically-typed functional programmers write code

Justin Lubin, Sarah E. Chasins
2021 Proceedings of the ACM on Programming Languages (PACMPL)  
run their compiler on code even when they know it will not successfully compile, and that they make textual program edits that reliably signal future edits that they intend to make.  ...  How working statically-typed functional programmers write code is largely understudied.  ...  We are also grateful to the anonymous OOPSLA '21 reviewers and CHI SRC '20 judges for their feedback.  ... 
doi:10.1145/3485532 fatcat:mizidpfr6jbyzdoj5bbscqlpwa

Pencil Code [article]

on behalf of the Pencil Code Collaboration Axel Brandenburg
2020 Zenodo  
code.  ...  The code has received 31,747 commits since 2001. The latest version is available under  ...  ' files. 7.5.3 Something about tag name undefined: Q: In one of my older run directories I can't read the data with idl anymore.  ... 
doi:10.5281/zenodo.3961647 fatcat:wrpaz23op5a2doysqq3zk7xme4

On "Sourcery," or Code as Fetish

Wendy Hui Kyong Chun
2008 Configurations  
The moral, according to John Godfrey Saxe's version of this tale, is: "So oft in theologic wars, / The disputants, I ween, / Rail on in utter ignorance / Of what each other mean, / And prate about an Elephant  ...  Arguing against theoretical conceptions of programming languages as the ultimate performative utterance, it contends that source code is never simply the source of any action; rather, source code is only  ...  How is it that code "causes" changes in machine behavior? What mediations sustain the notion of code as inherently executable?  ... 
doi:10.1353/con.0.0064 fatcat:4usbkg5xm5cjrofmzgkn2uurka

Information Needs In Contemporary Code Review

Luca Pascarella, Davide Spadini, Fabio Palomba, Magiel Bruntink, Alberto Bacchelli
2018 Zenodo  
In this paper, we aim at investigating the information that reviewers need to conduct a proper code review, to better understand this process and how research and tool support can make developers become  ...  Contemporary code review is a widespread practice used by software engineers to maintain high software quality and share project knowledge.  ...  R : "In what situations would [this condition] be false, but not undefined?"  ... 
doi:10.5281/zenodo.1405894 fatcat:arfrbbrmrfbgbdqulz2krvozqe

Misunderstanding Reliability

Klaus Krippendorff
2016 Methodology: European Journal of Research Methods for the Behavioral and Social Sciences  
It is totally unclear what Feng means by "good for." But it is clear that he recommends selecting reliability measures according to an undefined sense of the difficulties that coders are having.  ...  The explicit coding instructions that coders are asked to apply are the link to know what the resulting data are about.  ... 
doi:10.1027/1614-2241/a000119 fatcat:qcs6eaahfrfsxlgsxjxs4336eq


Ernst Glasersfeld
1976 Annals of the New York Academy of Sciences  
to which they are linked by a given code.  ...  Though at one time Hockett says that DISPLACEMENT implies "the ability to discuss today what happened yesterday or what may come to pass tomorrow," he then explains it in terms of information storage,  ...  Acknowledgment I should like to thank Charles Smock and Stuart Katz for their helpful comments on a draft of this paper, and to express my lasting gratitude to the late Ray Carpenter, who first introduced  ... 
doi:10.1111/j.1749-6632.1976.tb25487.x fatcat:bsnnyhajcfbwncu3xd4yz33tka

Studying Behavior of Software Developers With Cross-Tool Logs

Ciera Jaspan, Matt Jorde, Carolyn D Egelman, Collin Green, Ben Holtz, Edward K Smith, Margaret Morrow Hodges, Andrea Knight, Elizabeth Kammer, Jillian Dicker, Caitlin Sadowski, James Lin (+3 others)
2020 IEEE Software  
Prior research has lamented t he lack of va l id at ion i n si m il a r systems. 3 To obtain behavioral reports, we recruited 25 Google engineers to create diaries about what they did for a day, then  ...  An instantaneous event has an undefined end point, e.g., switching focus to a documentation page. A durational event has a set start and end time, e.g., running a build.  ... 
doi:10.1109/ms.2020.3014573 fatcat:elwfvvfncrc6zassf62tl4shym

Factors Influencing Impulse Buying Behavior

2022 International Journal of Orthopaedics Research  
Impulse buying is a classic example of undefinable strong emotional desire that motivates one to purchase a product.  ...  Interesting subject to study the reasons of breaking the rules where the extrinsic factors investigated in this study can be linked to the fight between the "New Brain(neocortex)vs.  ...  Variety adds spice to my buying.  ... 
doi:10.33140/ijor.05.02.05 fatcat:o74zhxksdrh7jno5y6raltk2pi

Management Citizenship Behavior and its Consequences

2002 Work and occupations  
The author uses data coded from the population of organizational ethnographies (N = 108) to evaluate the determinants and consequences of MCB. Unstable product markets result in lower levels of MCB.  ...  The concept of MCB facilitates an analysis of the behavior of managers as contributors to organizational viability.  ...  In both of these situations, managers may adjust their citizenship behaviors to what the situation demands and to what it will tolerate (Pelled, Eisenhardt, & Xin, 1999) .  ... 
doi:10.1177/0730888402029001004 fatcat:g7oeoevgmrcl5harumlgnghpqi

Code-carrying theory

Aytekin Vargun, David R. Musser
2008 Proceedings of the 2008 ACM symposium on Applied computing - SAC '08  
An Abstract of a Thesis Submitted to the Graduate  ...  Similarly the code producer may prove new theorems about some operational behavior of memory.  ...  I also wish to express my sincere thanks to one of my former advisors, Lloyd D. Fosdick. Our friendship started in Turkey and continued in the US.  ... 
doi:10.1145/1363686.1363780 dblp:conf/sac/VargunM08 fatcat:4v52prelxnhmzjk5quc4ggzqde
« Previous Showing results 1 — 15 out of 8,512 results