NSL OpenIR

Browse/Search Results:  1-10 of 19 Help

Filters    
Selected(0)Clear Items/Page:    Sort:
A Study of Methods to Identify Industry-University-Research Institution Cooperation Partners based on Innovation Chain Theory 期刊论文
Journal of Data and Information Science, 2018, 期号: 3(2), 页码: 38-61
Authors:  Haiyun Xu;  Chao Wang;  Kun Dong;  Rui Luo;  Zenghui Yue;  Hongshen Pang
View  |  Adobe PDF(2605Kb)  |  Favorite  |  View/Download:104/7  |  Submit date:2018/09/12
An Accurate and Impartial Expert Assignment Method for Scientific Project Review 期刊论文
Journal of Data and Information Science, 2017, 卷号: 2, 期号: 4, 页码: 65–80
Authors:  Yue ML(岳名亮);  Tian KL(田凯琳);  Ma TC(马廷灿)
View  |  Adobe PDF(499Kb)  |  Favorite  |  View/Download:324/86  |  Submit date:2017/12/07
Under-reporting of Adverse Events in the Biomedical Literature 期刊论文
Journal of Data and Information Science, 2016, 卷号: 1, 期号: 4, 页码: 10-32
Authors:  Ronald N. Kostoff;  Ronald N. Kostoff (E-mail:ronald.kostoff@pubpolicy.gatech.edu)
View  |  Adobe PDF(2176Kb)  |  Favorite  |  View/Download:488/107  |  Submit date:2016/11/08
Under-reporting  Publication Bias  Reporting Bias  Manufactured Research  Research Misconduct  Research Malfeasance  Biomedical Literature  
Topic Detection Based on Weak Tie Analysis: A Case Study of LIS Research 期刊论文
Journal of Data and Information Science, 2016, 卷号: 1, 期号: 4, 页码: 81-101
Authors:  Ling Wei;  Haiyun Xu;  Zhenmeng Wang;  Kun Dong;  Chao Wang;  Shu Fang;  Haiyun Xu (E-mail:xuhy@clas.ac.cn)
View  |  Adobe PDF(6140Kb)  |  Favorite  |  View/Download:541/75  |  Submit date:2016/11/08
Research Topics  Weak Tie Network  Weak Tie Theory  Weak Tie Nodes  Library And Information Science (Lis)  
Topic Detection Based on Weak Tie Analysis: A Case Study of LIS Research 期刊论文
Journal of Data and Information Science, 2016, 卷号: 1, 期号: 4, 页码: 81–101
Authors:  Wei L(隗玲);  Xu HY(许海云);  Zhenmeng Wang;  Dong K(董坤);  Chao Wang;  Fang S(方曙)
Adobe PDF(5101Kb)  |  Favorite  |  View/Download:1237/93  |  Submit date:2016/11/04
Research Topics  Weak Tie Network  Weak Tie Theory  Weak Tie Nodes  Library  
Predictive Characteristics of Co-authorship Networks: Comparing the Unweighted, Weighted, and Bipartite Cases 期刊论文
Journal of Data and Information Science, 2016, 卷号: 1, 期号: 3, 页码: 59-78
Authors:  Raf Guns;  Raf Guns (E-mail: raf.guns@uantwerpen.be).
View  |  Adobe PDF(1258Kb)  |  Favorite  |  View/Download:459/79  |  Submit date:2016/09/08
Network Evolution  Link Prediction  Weighted Networks  Bipartite Networks  Two-mode Networks  
Identification and Analysis of Multi-tasking Product Information Search Sessions with Query Logs 期刊论文
Journal of Data and Information Science, 2016, 卷号: 1, 期号: 3, 页码: 79-94
Authors:  Xiang Zhou;  Pengyi Zhang;  Jun Wang
View  |  Adobe PDF(1092Kb)  |  Favorite  |  View/Download:411/100  |  Submit date:2016/09/08
Product Search  Shopping Task Identification  Shopping Task Analysis  Multitasking Session  
Identifying Scientific Project-generated Data Citation from Full-text Articles: An Investigation of TCGA Data Citation 期刊论文
Journal of Data and Information Science, 2016, 卷号: 1, 期号: 2, 页码: 32-44
Authors:  Jiao Li;  Si Zheng;  Hongyu Kang;  Zhen Hou;  Qing Qian;  Qing Qian (E-mail: qian.qing@imicams.ac.cn).
View  |  Adobe PDF(1807Kb)  |  Favorite  |  View/Download:377/89  |  Submit date:2016/06/16
Scientific Data  Full-text Literature  Open Access  Pubmed Central  Data Citation  
Knowledge Representation in Patient Safety Reporting: An Ontological Approach 期刊论文
Journal of Data and Information Science, 2016, 卷号: 1, 期号: 2, 页码: 75-91
Authors:  Liang Chen;  Yang Gong;  Yang Gong (E-mail: Yang.Gong@uth.tmc.edu).
View  |  Adobe PDF(1250Kb)  |  Favorite  |  View/Download:304/68  |  Submit date:2016/06/16
Patient Safety  Medical Error  Knowledge Representation  Health Information Technology  Ontology  
Critical Factors for Personal Cloud Storage Adoption in ChinaCritical Factors for Personal Cloud Storage Adoption in China 期刊论文
Journal of Data and Information Science, 2016, 卷号: 1, 期号: 2, 页码: 60-74
Authors:  Jianya WANG;  Jianya Wang (E-mail: wjyhbu@163.com).
View  |  Adobe PDF(1133Kb)  |  Favorite  |  View/Download:319/95  |  Submit date:2016/06/16
Adoption Behavior  Behavior Intention  Personal Cloud Storage  Personal Information Management  Cloud Computing  Network Externality  Technology Acceptance Model (Tam)  Personal Innovativeness