Nefarious Numbers
نویسندگان
چکیده
The impact factor has been widely adopted as a proxy for journal quality. It is used by libraries to guide purchase and renewal decisions, by researchers deciding where to publish and what to read, by tenure and promotion committees laboring under the assumption that publication in a higher impact factor journal represents better work, and by editors and publishers as a means to evaluate and promote their journals. The impact factor for a journal in a given year is calculated by ISI (Thomson Reuters) as the average number of citations in that year to the articles the journal published in the preceding two years. It has been widely criticized on a variety of grounds,,,:
منابع مشابه
Microsoft Word - WCE2012_PROV_Exponential_Decision_20_04_2012
To select the best alternative of solution for a problem considering the decision-maker knowledge, preferences and purposes, we developed a new multicriteria decision-making procedure, the PROV Exponential Decision Method, which uses the concepts of preference, indifference and nefarious thresholds. Its presentation is the main focus of this article. Numerical examples are presented to illustra...
متن کاملTesting randomness for cancer risk
There are numerous stochastic models for cancer risk for a given tissue. Many rely on the following two hypotheses. 1. There is a fixed probability that a given cell division will eventually lead to a cancerous cell. 2. Cell divisions are nefarious or not independently of each other. We show that recent data on cancer risk and number of stem divisions is consistent with hypotheses 1 and 2.
متن کاملNetwork Coding for Delay Tolerant Networks with Byzantine Adversaries
We consider Delay Tolerant mobile adhoc Networks (DTN) with Byzantine nodes and a binary spraying policy. Under such conditions, nefarious packets may propagate and considerably disrupt performance. We use Network Coding (NC) in this context, with a known number of Byzantine nodes. Existing approaches have considered static networks and used end-to-end error-correction schemes with fixed rates,...
متن کاملWeb Data Amalgamation for Security Engineering: Digital Forensic Investigation of Open Source Cloud
The largely distributed nature and growing demand for open source Cloud makes the infrastructure an ideal target for malicious attacks that grants unauthorized access to its data storage and posses a serious threat to Cloud software security. In case of any nefarious activity, the Cloud provenance information used by Digital Forensic experts to identify the issue is itself prone to tampering by...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1010.0278 شماره
صفحات -
تاریخ انتشار 2010