A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Circling the undefined—A grounded theory study of intercultural consultations in Swedish primary care
2018
PLoS ONE
step closer to sharing, rather than circling the undefined. ...
The analysis generated a conceptual model named circling the undefined, where a silent agreement on issues fundamental to the core of the consultation was inadequately presumed and the communicative behaviors ...
I've honestly talked to people who think the doctor is racist, that's what I've seen, even among my friends." ...
doi:10.1371/journal.pone.0203383
pmid:30161227
fatcat:tgggicfvovg25bt6p5mdoeqfpu
Deictic codes for the embodiment of cognition
1997
Behavioral and Brain Sciences
Abstract: This commentary raises three questions about the target article: What are pointers or deictic devices? Why insist on deictic codes for cognition rather than deixis simpliciter? ...
phenomena but less abstract than what is traditionally used to study high-level cognitive processes such as reasoning. ...
For what it's worth, here is my attempt to meld deictic codes with my own ideas about the division of labour in the dorsal and ventral streams. ...
doi:10.1017/s0140525x97001611
fatcat:45j2crpyxjdzznuhtznnnwpdjy
Activism, Event and the Transmission of Behavior: Designing With Behavior for Behavior
2022
Zenodo
As such, it is a powerful means for design when it comes to behavior change: Designing with behavior for behavior. ...
In Helsinki, summer 2010, a group of friends challenged each other to just consume at local independent stores for two weeks long. ...
This infringement allows and attempts to legitimize the act: "Look at what happened to movie theaters! ...
doi:10.5281/zenodo.5833807
fatcat:y3tfsp2oe5hsjb53pbgivzaifi
Automatic formal verification for scheduled VLIW code
2002
Proceedings of the joint conference on Languages, compilers and tools for embedded systems software and compilers for embedded systems - LCTES/SCOPES '02
Hu, who was and is an inspiration to me in many ways. Without his ideas and encouragement, my research would not have been nearly as successful. ...
Hu as a paper for the ACM SIGPLAN Joint Conference LCTES/SCOPES'02. viii To my parents, for their endless patience and support. ix Chapter 1 Description Program Address Generate Determine address of the ...
Second, the compiler has knowledge of the source code of the program, and source code typically has more information to track program behavior. ...
doi:10.1145/513829.513844
dblp:conf/lctrts/FengH02
fatcat:cgw473q6rbbgvlbczahsn2q734
Towards an ethical code for information security?
2008
Proceedings of the 2008 workshop on New security paradigms - NSPW '08
Our panelist positions run the gamut from "We desperately need a strong code of ethics" to "A specialized ethical code would cause great harm." ...
Along with our positions, we report on the feedback we received from the NSPW process and what we learned. ...
As editor, any mistakes appearing in this paper happened solely due to Steve Greenwald. ...
doi:10.1145/1595676.1595689
dblp:conf/nspw/GreenwaldSFT08
fatcat:q3zxhp2mencdbhmm6ccsggqcdi
How statically-typed functional programmers write code
2021
Proceedings of the ACM on Programming Languages (PACMPL)
run their compiler on code even when they know it will not successfully compile, and that they make textual program edits that reliably signal future edits that they intend to make. ...
How working statically-typed functional programmers write code is largely understudied. ...
We are also grateful to the anonymous OOPSLA '21 reviewers and CHI SRC '20 judges for their feedback. ...
doi:10.1145/3485532
fatcat:mizidpfr6jbyzdoj5bbscqlpwa
Pencil Code
[article]
2020
Zenodo
code. ...
The code has received 31,747 commits since 2001. The latest version is available under https://github.com/pencil-code ...
' files. 7.5.3 Something about tag name undefined: Q: In one of my older run directories I can't read the data with idl anymore. ...
doi:10.5281/zenodo.3961647
fatcat:wrpaz23op5a2doysqq3zk7xme4
On "Sourcery," or Code as Fetish
2008
Configurations
The moral, according to John Godfrey Saxe's version of this tale, is: "So oft in theologic wars, / The disputants, I ween, / Rail on in utter ignorance / Of what each other mean, / And prate about an Elephant ...
Arguing against theoretical conceptions of programming languages as the ultimate performative utterance, it contends that source code is never simply the source of any action; rather, source code is only ...
How is it that code "causes" changes in machine behavior? What mediations sustain the notion of code as inherently executable? ...
doi:10.1353/con.0.0064
fatcat:4usbkg5xm5cjrofmzgkn2uurka
Information Needs In Contemporary Code Review
2018
Zenodo
In this paper, we aim at investigating the information that reviewers need to conduct a proper code review, to better understand this process and how research and tool support can make developers become ...
Contemporary code review is a widespread practice used by software engineers to maintain high software quality and share project knowledge. ...
R : "In what situations would [this condition] be false, but not undefined?" ...
doi:10.5281/zenodo.1405894
fatcat:arfrbbrmrfbgbdqulz2krvozqe
Misunderstanding Reliability
2016
Methodology: European Journal of Research Methods for the Behavioral and Social Sciences
It is totally unclear what Feng means by "good for." But it is clear that he recommends selecting reliability measures according to an undefined sense of the difficulties that coders are having. ...
The explicit coding instructions that coders are asked to apply are the link to know what the resulting data are about. ...
doi:10.1027/1614-2241/a000119
fatcat:qcs6eaahfrfsxlgsxjxs4336eq
THE DEVELOPMENT OF LANGUAGE AS PURPOSIVE BEHAVIOR
1976
Annals of the New York Academy of Sciences
to which they are linked by a given code. ...
Though at one time Hockett says that DISPLACEMENT implies "the ability to discuss today what happened yesterday or what may come to pass tomorrow," he then explains it in terms of information storage, ...
Acknowledgment I should like to thank Charles Smock and Stuart Katz for their helpful comments on a draft of this paper, and to express my lasting gratitude to the late Ray Carpenter, who first introduced ...
doi:10.1111/j.1749-6632.1976.tb25487.x
fatcat:bsnnyhajcfbwncu3xd4yz33tka
Studying Behavior of Software Developers With Cross-Tool Logs
2020
IEEE Software
Prior research has lamented t he lack of va l id at ion i n si m il a r systems. 3 To obtain behavioral reports, we recruited 25 Google engineers to create diaries about what they did for a day, then ...
An instantaneous event has an undefined end point, e.g., switching focus to a documentation page. A durational event has a set start and end time, e.g., running a build. ...
doi:10.1109/ms.2020.3014573
fatcat:elwfvvfncrc6zassf62tl4shym
Factors Influencing Impulse Buying Behavior
2022
International Journal of Orthopaedics Research
Impulse buying is a classic example of undefinable strong emotional desire that motivates one to purchase a product. ...
Interesting subject to study the reasons of breaking the rules where the extrinsic factors investigated in this study can be linked to the fight between the "New Brain(neocortex)vs. ...
Variety adds spice to my buying. ...
doi:10.33140/ijor.05.02.05
fatcat:o74zhxksdrh7jno5y6raltk2pi
Management Citizenship Behavior and its Consequences
2002
Work and occupations
The author uses data coded from the population of organizational ethnographies (N = 108) to evaluate the determinants and consequences of MCB. Unstable product markets result in lower levels of MCB. ...
The concept of MCB facilitates an analysis of the behavior of managers as contributors to organizational viability. ...
In both of these situations, managers may adjust their citizenship behaviors to what the situation demands and to what it will tolerate (Pelled, Eisenhardt, & Xin, 1999) . ...
doi:10.1177/0730888402029001004
fatcat:g7oeoevgmrcl5harumlgnghpqi
Code-carrying theory
2008
Proceedings of the 2008 ACM symposium on Applied computing - SAC '08
An Abstract of a Thesis Submitted to the Graduate ...
Similarly the code producer may prove new theorems about some operational behavior of memory. ...
I also wish to express my sincere thanks to one of my former advisors, Lloyd D. Fosdick. Our friendship started in Turkey and continued in the US. ...
doi:10.1145/1363686.1363780
dblp:conf/sac/VargunM08
fatcat:4v52prelxnhmzjk5quc4ggzqde
« Previous
Showing results 1 — 15 out of 8,512 results