Nefarious Numbers

نویسندگان

  • Douglas N. Arnold
  • Kristine K. Fowler
چکیده

The impact factor has been widely adopted as a proxy for journal quality. It is used by libraries to guide purchase and renewal decisions, by researchers deciding where to publish and what to read, by tenure and promotion committees laboring under the assumption that publication in a higher impact factor journal represents better work, and by editors and publishers as a means to evaluate and promote their journals. The impact factor for a journal in a given year is calculated by ISI (Thomson Reuters) as the average number of citations in that year to the articles the journal published in the preceding two years. It has been widely criticized on a variety of grounds,,,:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Microsoft Word - WCE2012_PROV_Exponential_Decision_20_04_2012

To select the best alternative of solution for a problem considering the decision-maker knowledge, preferences and purposes, we developed a new multicriteria decision-making procedure, the PROV Exponential Decision Method, which uses the concepts of preference, indifference and nefarious thresholds. Its presentation is the main focus of this article. Numerical examples are presented to illustra...

متن کامل

Testing randomness for cancer risk

There are numerous stochastic models for cancer risk for a given tissue. Many rely on the following two hypotheses. 1. There is a fixed probability that a given cell division will eventually lead to a cancerous cell. 2. Cell divisions are nefarious or not independently of each other. We show that recent data on cancer risk and number of stem divisions is consistent with hypotheses 1 and 2.

متن کامل

Network Coding for Delay Tolerant Networks with Byzantine Adversaries

We consider Delay Tolerant mobile adhoc Networks (DTN) with Byzantine nodes and a binary spraying policy. Under such conditions, nefarious packets may propagate and considerably disrupt performance. We use Network Coding (NC) in this context, with a known number of Byzantine nodes. Existing approaches have considered static networks and used end-to-end error-correction schemes with fixed rates,...

متن کامل

Web Data Amalgamation for Security Engineering: Digital Forensic Investigation of Open Source Cloud

The largely distributed nature and growing demand for open source Cloud makes the infrastructure an ideal target for malicious attacks that grants unauthorized access to its data storage and posses a serious threat to Cloud software security. In case of any nefarious activity, the Cloud provenance information used by Digital Forensic experts to identify the issue is itself prone to tampering by...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1010.0278  شماره 

صفحات  -

تاریخ انتشار 2010