Questions

This is a list of all the questions and their associated study carrel identifiers. One can learn a lot of the "aboutness" of a text simply by reading the questions.

identifier question
cord-020200-g5hy5ncmThe primary research question this paper asks is: How can business value be safeguarded against destructive HCI behaviors?
cord-026948-jl3lj7yhHuman Language Technologies( NAACL- HLT 2018) Is attention interpretable?
cord-032466-1nfp1hcsWhat is Unity?
cord-130143-cqkpi32z-exposes enterprises access points and unmanaged devices to undetectable chip level attack Space/ time trade- offs in hash coding with allowable errors Centralized or decentralized?
cord-102542-1mglhh41Despite its importance, only one chatbot explicitly addressed this issue, namely Buoyhealth, allowing users to inquire about the reasons behind each question("Why am I being asked this?").
cord-102542-1mglhh41What Makes a Good Conversation?
cord-292065-3p4bf9ikCan she still hear us?
cord-292065-3p4bf9ikShould Doctors Withhold Ventilator?
cord-020936-k1upc1xuFor that purpose, we address the following question: for any friends- of- friends algorithm, such as Adamic- Adar[ 1] or the IR models, is it beneficial to reward the number of common users between the target and the candidate users?
cord-020936-k1upc1xuHowever, once the weight is important for a model( and, therefore, EWC1 is important) does satisfying the rest of the edge weight constraints provide more accurate recommendations?
cord-020936-k1upc1xuInformation filtering and information retrieval: two sides of the same coin?
cord-027431-6twmcituA tool to reveal true Identity in real- time Twitter as an indicator for whereabouts of people?
cord-027431-6twmcituComparing data from Twitter's streaming API with Twitter's Firehose Orienteering problem with functional profits for multi- source dynamic path construction Fake news detection on social media: a data mining perspective Who is who on Twitter- Spammer, fake or compromised account?
cord-027431-6twmcituEfficient pre- processing and feature selection for clustering of cancer tweets Analyzing user activities, demographics, social network structure and user- generated content on Instagram Is the sample good enough?
cord-186031-b1f9wtfnHow can we use this information in order to infer the orientation of non verified users?
cord-186031-b1f9wtfnHow does junk news spread so quickly across social media?
cord-186031-b1f9wtfnWhile the previous differences from the procedure of[ 6] are dictated by conservativeness( the choice of the seed labels) or by the adherence to a standard( the choice of[ 22]), this last one may be debatable: why choosing the validated network should return"better"results than the ones calculated on the entire retweet network?
cord-024433-b4vw5r0oAthena scientific Latent Dirichlet allocation Structural normalisation methods for improving best answer identification in question answering communities Integrating conflicting data: the role of source dependence Corroborating information from disagreeing views Widespread underprovision on reddit Which answer is best?
cord-024433-b4vw5r0oTruth inference in crowdsourcing: is the problem solved?
cord-024433-b4vw5r0oWhat we vote for?
cord-156676-wes5my9eBridging the gap between prediction and understanding of information cascades What makes an image popular?
cord-156676-wes5my9eDeep exogenous and endogenous influence combination for social chatter intensity prediction Information diffusion and external influence in networks Hateful symbols or hateful people?
cord-000925-91fhb66mCan electronic medical record systems transform health care?
cord-227156-uy4dykhg-why does xgboost winëverymachine learning competition?
cord-227156-uy4dykhgWhat the hashtag?
cord-227156-uy4dykhgWhy do humans reason?
cord-227492-st2ebdahAre South Korea's alerts too revealing?
cord-227492-st2ebdahCOVID-19: what is next for public health?
cord-227492-st2ebdahGod's Eye View: Will global AI empower us or destroy us?
cord-124191-38i44n0mHow do you feel?
cord-124191-38i44n0mHow's my mood and stress?:
cord-020901-aew8xr6nIn: CIKM Translating embeddings for modeling multi- relational data Empirical analysis of predictive algorithms for collaborative filtering TransNets: learning to transform for recommendation Are we really making much progress?
cord-020901-aew8xr6nUser models: theory, method, and practice TopicMF: simultaneously exploiting ratings and reviews for recommendation Classifying sentiment in microblogs: is brevity an advantage?
cord-218383-t2lwqrpb: What are the issues and privacy concerns in existing contact tracing apps?
cord-218383-t2lwqrpbHow to utilize mobile and fog computing to trace and prevent COVID-19 community transmission?
cord-218383-t2lwqrpbPrivacy- preserving Framework: How to develop an automated privacy- preserving e- government framework?
cord-201675-3bvshhtnAn emerging low- power wireless technology Bluetooth: a viable solution for iot?
cord-120498-b1bla3fpvia answerable questions( e.g. do books also have pages?).
cord-035285-dx5bbeqmIn addition, we also share Let's Control COVID and Curious about COVID?
cord-267860-mc0xa5omNew Orleans 3 M Occupational Health and Environmental Safety Division Qualitative fit testing instructions( KCPI-0356) Use of personal protective equipment for respiratory protection Effectiveness of fit check methods on half mask respirators Evaluation of the benefit of the user seal check on N95 filtering facepiece respirator fit Health care workers and respiratory protection: is the user seal check a surrogate for respirator fit- testing?
cord-267860-mc0xa5omTherefore, the research question was as follows: Can the result of the user seal check reflect the actual gross leakage under the conditions of normal and deep breathing?
cord-122159-sp6o6h31Offers an opportunity to communicate a personalized risk profile to each citizen, answering the question"Should I be concerned or not?"
cord-122159-sp6o6h31Reuters Graphics Legal by Design'or'Legal Protection by Design'?
cord-122159-sp6o6h31The New York Times Coronavirus vaccine in 18 months?
cord-269850-5pidolqbCan we compare the Covid-19 and 2008 crises?
cord-269850-5pidolqbThis part of the system is to monitoring and tracing the registered users only in terms of how the areas( which have been visited by users) should be lockdown or not?
cord-269850-5pidolqbWhat is contact tracing?
cord-355513-vgs96w3bFor example, the article"Can you go out without a mask?
cord-355513-vgs96w3bQuantitative study Professional use of social media by pharmacists: A qualitative study Engaging the Family Medicine Community through Social Media Mapping physician twitter networks: Describing how they work as a first step in understanding connectivity, information flow, and message diffusion Medicine 2.0: Social networking, collaboration, participation, apomediation, and openness Instrumental utilities and information seeking State of the art in social network user behaviours and its future Using social media data to understand the impact of promotional information on laypeople's discussions: A case study of Lynch syndrome Health- Seeking influence reflected by online health- related messages received on social media: Cross- Sectional survey Understanding WeChat users'liking behaviour: An empirical study in China What makes us click"like"on Facebook?
cord-355513-vgs96w3bThe post"Can you go out without a mask?
cord-031617-l9iacaecHow long does it take to find lost stuff?
cord-031617-l9iacaecWhat causes you to look for something?
cord-031617-l9iacaecWhere do you find lost stuff?
cord-020891-lt3m8h41: an example Is question answering fit for the semantic web?:
cord-020891-lt3m8h41That is, a user might ask a rather"fuzzy"first question( such as"what are important topics in the field of'Information Retrieval'?
cord-020891-lt3m8h41The last information need( q 5) was formulated in a complex way("which authors that have written a book about criminal law have also written a review?") and required participants to recognise that a partial result to the question was already available from a previous step.
cord-020891-lt3m8h41This query, however, will not retrieve anything since the question contains an ellipsis: it should actually be formulated as"Which journals have published a review about it?".
cord-238444-v9gfh3m1This part of the system is to monitoring and tracing the registered users only in terms of how the areas( which have been visited by users) should be lockdown or not?
cord-238444-v9gfh3m1a prospective study Novel coronavirus in the united states Lockdowns ca n't end until covid-19 vaccine found, study says Can we compare the covid-19 and 2008 crises?
cord-251676-m8f6de33How accurately do WiFi session durations reveal true durations of times spent at a location?
cord-251676-m8f6de33How accurately do co- located WiFi device sessions reveal co- located users at those locations?
cord-251676-m8f6de33We conducted a small- scale user study to gather ground truth data to validate three question related to the use of passive WiFi sensing for contact tracing:( 1) How accurately do WiFi access point associations reveal true user locations?
cord-318195-38gu0yabFor example, an open- ended question like''What specific information do you need to record during an oculoplastics consultation?''could reveal information such as the need for templates for eyelid measurements, tear film break- up time, accompanied by anatomical drawings of the eyelids and orbit.
cord-318195-38gu0yabare we ignoring the real cause?
cord-102738-e5zojanbAnd even if people in general could not beat the AI, would play trajectories resulting from certain lucky punches or persistent quantum heroes be enough to help the AIs learn in new ways?
cord-102738-e5zojanbMaking Sense of Game- Play: How Can We Examine Learning and Involvement?
cord-102738-e5zojanbThe simulations in which our algorithms tried to optimize this process bear a remarkable similarity to side scrolling casual games, and so the notion of human quantum optimization was hatched: What if real humans would do things differently than the logical step- by- step nature of the algorithms?
cord-102738-e5zojanbWhat can breakdowns and breakthroughs tell us about learning and involvement experienced during game- play?
cord-102738-e5zojanbWould explicit understandings of the counterintuitive quantum problems help people solve our problem more intelligently?
cord-102738-e5zojanbWould human physical and cognitive fallibility add an interesting random factor?
cord-302724-hu0raqyiAre they going out the back door?
cord-302724-hu0raqyiWhere are the masks going?he asked( bit.ly/34YPnV9).
cord-302724-hu0raqyiWhy should we care about this seemingly arcane mathematical principle?
cord-193856-6vs16mq3Closing Conceptual Gaps Improving Health by Taking It Personally Uncertainty and Exploration in a Restless Bandit Problem Ensemble Contextual Bandits for Personalized Recommendation Analysis of Recommender Systems Algorithms To Stay or Leave?:
cord-193856-6vs16mq3Spoiled for Choice?
cord-193856-6vs16mq3The Effects of Mismatches between Social Support and Health Outcomes in an Online Weight Loss Community Feeling Blue?
cord-193856-6vs16mq3or Should I Go?
cord-347144-rj76i40vHigh supply- side and demand- side openness matching with knowledge complexity leads to high performance Closed or open platform?
cord-347144-rj76i40vHow open is open enough?
cord-347144-rj76i40vThe nature of platform and a qualitative comparative analysis of the performance effect of platform openness Industry platforms and ecosystem innovation Balancing platform control and external contribution in thirdparty development: the boundary resources model What is platform governance?
cord-347144-rj76i40vkey: cord-347144-rj76i40v authors: Wang, Jiexiang; Guo, Bin; Wang, Xiaoyan; Lou, Shuzhen title: Closed or open platform?
cord-243596-ryyokrdxDo our users enjoy playing the game and recommend it to their peers?
cord-243596-ryyokrdxHow about and differences on TCT and accuracy based on game configurations of seated and standing?
cord-243596-ryyokrdxIf so, which configurations are the most popular ones?
cord-243596-ryyokrdxIs there any difference between the complexities of the easy/ hard levels in the game based on TCT and accuracy?
cord-243596-ryyokrdxMore specifically, research questions to inspire the study were: Does the VR therapy game improve user's range of motion and reach?
cord-033725-rlzbznav( i.e, does a model learned on data from users with long sequences transfer to those with short ones?)
cord-033725-rlzbznav-RQ3: How can we incorporate early recordings of users in U short incrementally into the model to improve predictive performance?
cord-033725-rlzbznav: Can we predict the entire sequence of observations of a user in U short with a model trained only on data from users in U long?
cord-033725-rlzbznav: How well can we predict the behaviour of users in U short given the data from the users in U long?
cord-033725-rlzbznavDid you feel to be in control of your diabetes today?
cord-033725-rlzbznavDoes tinnitus depend on time- of- day?
cord-033725-rlzbznavWhere to Learn from?
cord-350000-eqn3kl5p( COVID-19 Do psychiatric patients experience more psychiatric symptoms during COVID-19 pandemic and lockdown?
cord-350000-eqn3kl5pA virtual reality exposure therapy application for Iraq war military personnel with post traumatic stress disorder: From training to toy to treatment Cognitive processing therapy for veterans with military- related posttraumatic stress disorder Virtual reality and cognitivebehavioral therapy for driving anxiety and aggression in veterans: A pilot study Social support and mental health in community samples Effects of social support and personal coping resources on depressive symptoms: different for various chronic diseases?
cord-350000-eqn3kl5pEverything you need to know about anxiety Share of the population worldwide who suffered from anxiety disorders from What are anxiety disorders?
cord-350000-eqn3kl5pHow the COVID-19 pandemic affects people with social anxiety Is returning to work during the COVID-19 pandemic stressful?
cord-350000-eqn3kl5pThe effect of mindfulness- based therapy on anxiety and depression: A meta- analytic review Mindfulness meditation, anxiety reduction, and heart disease: A pilot study Mindfulness and anxiety disorders: Developing a wise relationship with the inner experience of fear How does mindfulness reduce anxiety, depression, and stress?
cord-350000-eqn3kl5pWhat is cognitive behavioral therapy?
cord-027120-w6agcu63( e.g. is the baby monitor on?"
cord-027120-w6agcu63,"what is the temperature in the living room?", or"turn on the coffee machine".
cord-027120-w6agcu63Finally, rules defined for device refers to the user performing queries that require introspection, such as"what rules are defined for the bedroom light?
cord-027120-w6agcu63For most intents, such as direct actions or"why did something happen?"
cord-027120-w6agcu63In these cases, we incorporated Jarvis with conversational awareness to allow for chained commands; the following dialogue exemplifies this particular feature: User:"Why did the toaster turn on?"
cord-027120-w6agcu63It is important to clarify that one- time action w/ unclear device refers to actions like"turn on the light"with which Jarvis asks the user to clarify which device he means based through responses such as"do you mean the bedroom or living room light?".
cord-027120-w6agcu63Jarvis also lets the user easily understand and modify the rules and cooperation of multiple devices in the system, through queries like why did the toaster turn on?
cord-027120-w6agcu63The usage of contextual awareness for more natural conversations, allowing interactions that last for multiple sentences and provide a more intuitive conversation, e.g."what rules do I have defined for the living room light?";( 3) Event management, that allows orchestration of multiples devices that might not necessarily know that each other exists, e.g."turn on the light when the motion sensor is activated"; and( 4) Causality queries, to better understand how the current system operates, e.g."why did the light turn on?
cord-027120-w6agcu63The usage of contextual awareness for more natural conversations, allowing interactions that last for multiple sentences and provide a more intuitive conversation, e.g."what rules do I have defined for the living room light?";( 3) Event management, that allows orchestration of multiples devices that might not necessarily know that each other exists, e.g."turn on the light when the motion sensor is activated"; and( 4) Causality queries, to better understand how the current system operates, e.g."why did the light turn on?
cord-027120-w6agcu63Their solution supports( 1) direct question/ answer exchanges,( 2) questions that require a rationale as response such as"Why is the room cold?"and( 3) explicit requests to change a particular state.
cord-027120-w6agcu63This relate to the user asking why something happened( e.g."why did the light turn on?
cord-236830-0y5yisfkCan a positive citizen's identity, who chooses to report being positive, be inferred by others?
cord-236830-0y5yisfkCan a positive citizen's location, who chooses to report being positive, be inferred by others?
cord-236830-0y5yisfkCan the app be designed so as to mitigate re- identification risks to average users?
cord-236830-0y5yisfkDoes the protocol support both medically confirmed positive tests and self- confirmed positives tests?
cord-236830-0y5yisfkHow will the protocol handle issues of false positives and false negatives, with regards to alerting?
cord-236830-0y5yisfkIf I tested positive and I voluntarily disclose this information, what does the protocol reveal to others?
cord-236830-0y5yisfkIf a citizen is alerted to be at risk, is it possible the citizen was not in the proximity of a positive individual?
cord-236830-0y5yisfkIf you are negative, can a malicious citizen listen to your phone's broadcasts and, then report positive pretending to be you?
cord-236830-0y5yisfkWhat about cases when users do n't have( or use their) mobile phones?
cord-236830-0y5yisfkWhat information is leaked if a citizen's device is compromised by a hacker, stolen, or physically seized by an authority?
cord-310272-utqyuy0n20th Australasian conference on information systems ACIS What is IT in use and why does it matter for IS design?
cord-310272-utqyuy0nBut he is less content when it comes to how the tablet has been serving him during his rounds because the tablet acts like a barrier between him and his patients, which he consider as a restriction and prioritises ultimately achieving a better communication with the patients rather than his convenience("Who wants a medical student( someday physician) who focuses more on a computer than on the person?").
cord-310272-utqyuy0nCode saturation versus meaning saturation: How many interviews are enough?
cord-310272-utqyuy0nDo electronic health records affect quality of care?
cord-310272-utqyuy0nEureka moments in the works of Claudio Ciborra Resist, comply or workaround?
cord-310272-utqyuy0nHow Lloyd Morgan's canon backfired Have your cake and eat it too?
cord-310272-utqyuy0nIn this paper, we are interested in seeing"what is the process of appropriation of IT devices by individual and volitional users following negative disconfirmation?
cord-310272-utqyuy0nWe seek to understand"what is the process of appropriation of IT devices by individual and volitional users following negative disconfirmation?
cord-310272-utqyuy0nWhat happens when learning takes place?
cord-310272-utqyuy0nWhat's under construction Here?
cord-310272-utqyuy0nWhy should I follow your rules?
cord-120017-vsoc9v85A Framework for Systematic Assessment of Explainable Approaches On the challenges in usable security lab studies: lessons learned from replicating a study on SSL warnings Building robust systems an essay Evaluating usercomputer interaction: a framework Building robust learning systems by combining induction and optimization Usable security Is Usable Security an Oxymoron?
cord-120017-vsoc9v85Analyzing art therapy for older adults with dementia Cybersecurity and United States Infrastructure Security Agency( CISA), Department of Homeland Security Is usable security an oxymoron?
cord-120017-vsoc9v85Do you want to try another way?
cord-120017-vsoc9v85How do we account for the incident this time, to minimize the chance that it would happen again?
cord-120017-vsoc9v85Moreover, while the threat models are relatively simple compared to example 1 and 4, the system still needs to induce trust from the psychiatrists: how do they know it is them, instead of malicious attackers described in the threat models, who see the images, patients'information, and the algorithm outputs?
cord-120017-vsoc9v85The protection of information in computer systems Transforming the âĂŸweakest linkâĂŹâĂŤa human/ computer interaction approach to usable and effective security If A1 is the answer, what was the question?
cord-120017-vsoc9v85What are we going to do with the system and users, now and later?
cord-120017-vsoc9v85While patients and providers who choose to use a ML- powered matching service could be assumed to have a greater degree of general trust in ML and technology, the same level of trust could not be assumed in the specific matching decisions:"How and why did this black- box know that I would be a good fit for this patient/ provider?"would be the question to answer for every patient or provider who uses the service.
cord-120017-vsoc9v85what happens, should a security incident( e.g. a breach, a compromise, or a previously undiscovered vulnerability) happens?
cord-355789-x449xflmAn investigation into students responses to various phishing emails and other phishing- related behaviours Social network phishing: Becoming habituated to clicks and ignorant to threats?
cord-355789-x449xflmAn investigation into the relationship between the Big Five, shyness, narcissism, loneliness, and Facebook usage Information security policy compliance model in organizations SIM swap fraud: no way out?
cord-355789-x449xflmThe Art of Deception: Controlling the Human Element of Security How neurotic are scam victims, really?
cord-355789-x449xflmThe case of Facebook Social engineering in social networking sites: how good becomes evil The impact of individual differences on influence strategies What is the influence of users'characteristics on their ability to detect phishing emails?
cord-355789-x449xflmThe cross- cultural generalizability of the Five Factor Model of Personality Who uses Facebook?
cord-355789-x449xflmThe handbook of marketing research: Uses, misuses, and future advances Evaluating the fit of structural equation models: tests of significance and descriptive goodness- of- fit measures Reporting structural equation modeling and confirmatory factor analysis results: a review Defending against spear- phishing: Motivating users through fear appeal manipulations Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions Personality, attitudes, and intentions: Predicting initial adoption of information security behavior
cord-355789-x449xflmThe influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment Effects of personality on risky driving behavior and accident involvement for Chinese drivers Thinking styles and the big five personality traits revisited How could I fall for that?
cord-355789-x449xflmWhen do personality traits predict behavior?
cord-355789-x449xflmWho interacts on the Web?:
cord-355789-x449xflmWhy do people get phished?
cord-237721-rhcvsqtkCan your phone be your therapist?
cord-237721-rhcvsqtkFor example, the questions"Did< system> motivate you to write at length about your thoughts and feelings?
cord-237721-rhcvsqtkFor instance, if the system detects work as a topic of interest, it responds with"How has work changed under COVID?
cord-237721-rhcvsqtkHow does what you say relate to your values?"
cord-237721-rhcvsqtkWhat advice would you give other people about how to cope with any of the issues you are facing?
cord-237721-rhcvsqtkWhat are the major issues in your life right now, especially in the light of the COVID outbreak?
cord-237721-rhcvsqtkWhat do you most look forward to doing once the pandemic is over?
cord-237721-rhcvsqtkWhat do you think is the best way for people to cope with these feelings?"
cord-237721-rhcvsqtkWhat is something that you have done or experienced recently that you are grateful for?
cord-237721-rhcvsqtkWhat might you be able to do to keep your career moving during these difficult times?"
cord-237721-rhcvsqtkand"How useful was C.P. to discuss your concerns about COVID?
cord-323372-770sos8m: A Green Solution for Mobility?
cord-323372-770sos8mA guidance note for practice Are e- scooters polluters?
cord-323372-770sos8mAnything else you'd like to tell us? 11.
cord-323372-770sos8mAre Shared Electric Scooters Going Extinct?
cord-323372-770sos8mBench Bar Minn Are electric scooters promoted on social media with safety in mind?
cord-323372-770sos8mBut Can These Electric- Powered Mobility Options Be Considered Sustainable Using Life- Cycle Analysis?
cord-323372-770sos8mCan e- Scooters Solve the'Last Mile'Problem?
cord-323372-770sos8mCase reports indicate a growing public health concern The Integration of Electric Scooters: Useful Technology or Public Health Problem?
cord-323372-770sos8mDid you know that Provo City Code 9.15.200 prohibits riding on sidewalks?
cord-323372-770sos8mGiven the variety of motivations cited for riding e- scooters, a critical question in terms of health implications is: For which alternative modes of travel are e- scooters being substituted?
cord-323372-770sos8mIf you rode on sidewalks, why did you choose to do so?
cord-323372-770sos8mOn your last trip, what mode of transportation would you have taken had a scooter not been available?
cord-323372-770sos8mOn your last trip, where did you primarily ride?
cord-323372-770sos8mOn your last trip, where did you ride from?
cord-323372-770sos8mOn your last trip, where did you ride to?
cord-323372-770sos8mOn your last trip, why did you choose to ride a scooter?
cord-323372-770sos8mRiders Park Dockless, Shared Electric Scooters?
cord-323372-770sos8mThe Case for Electric Scooters Invasion of the Electric Scooter: Can Our Cities Cope?
cord-323372-770sos8mWhat alternative travel mode would riders be using if not riding an e- scooter?;( 4) To what degree are e- scooter users aware of and complying with safety regulations?
cord-323372-770sos8mWhat alternative travel mode would riders be using if not riding an e- scooter?;( 4) To what degree are e- scooter users aware of and complying with safety regulations?
cord-323372-770sos8mWhat are the primary destinations of e- scooter users?;( 3)
cord-323372-770sos8mWhat changes would make you want to ride in the street instead of the sidewalk?
cord-323372-770sos8mWhat city do you live in?
cord-323372-770sos8mWhat is your age? 13.
cord-323372-770sos8mWhat is your gender?
cord-323372-770sos8mWhat motivations do users have for riding e- scooters?;( 2)
cord-323372-770sos8mWhat program or policy changes do e- scooter users believe would improve Provo's e- scooter share program?
cord-323372-770sos8mWhere should scooters be staged in the morning that they are n't currently?
cord-323372-770sos8mYou Fit?
cord-323372-770sos8mthe environmental impacts of shared dockless electric scooters Understanding spatio- temporal heterogeneity of bike- sharing and scooter- sharing mobility Electric scooters: Batteries in the battle against ambient air pollution?