Institution
University of Colorado Colorado Springs
Education•Colorado Springs, Colorado, United States•
About: University of Colorado Colorado Springs is a education organization based out in Colorado Springs, Colorado, United States. It is known for research contribution in the topics: Population & Poison control. The organization has 6664 authors who have published 10872 publications receiving 323416 citations. The organization is also known as: UCCS & University of Colorado at Colorado Springs.
Topics: Population, Poison control, Thin film, Capacitor, Ferroelectricity
Papers published on a yearly basis
Papers
More filters
•
01 Jan 2003TL;DR: The Psychology Impact of 9/11: Managing the Terror The Roots of Islamic Terrorism Giving Peace a Chance In the Wake of 9 /11: Rising Above the Terror as discussed by the authors...
Abstract: Terror in America - The Day our World Changed Terror Management Theory - An Evolutionary Existential Account of Human Behaviour Terror Management Research - Coping with Conscious and Unconscious Death Related Thoughts Terror Management Research on Prejudice and Self-Esteem Striving Black Tuesday - The Psychology Impact of 9/11 Managing the Terror The Roots of Islamic Terrorism Giving Peace a Chance In the Wake of 9/11 Rising Above the Terror.
544 citations
••
TL;DR: Mortality salience did not lead to negative reactions to the critic when the value of tolerance was highly accessible and, under mortality-salient or control conditions, Ss evaluated a target person who criticized the United States.
Abstract: Terror management research has shown that reminding Ss of their mortality leads to intolerance. The present research assessed whether mortality salience would lead to increased intolerance when the value of tolerance is highly accessible. In Study 1, given that liberals value tolerance more than conservatives, it was hypothesized that with mortality salience, dislike of dissimilar others would increase among conservatives but decrease among liberals. Liberal and conservative Ss were induced to think about their own mortality or a neutral topic and then were asked to evaluate 2 target persons, 1 liberal, the other conservative. Ss' evaluations of the targets supported these hypotheses. In Study 2, the value of tolerance was primed for half the Ss and, under mortality-salient or control conditions, Ss evaluated a target person who criticized the United States. Mortality salience did not lead to negative reactions to the critic when the value of tolerance was highly accessible.
541 citations
••
TL;DR: The general idea of open space risk limiting classification is extended to accommodate non-linear classifiers in a multiclass setting and a new open set recognition model called compact abating probability (CAP), where the probability of class membership decreases in value as points move from known data toward open space.
Abstract: Real-world tasks in computer vision often touch upon open set recognition: multi-class recognition with incomplete knowledge of the world and many unknown inputs. Recent work on this problem has proposed a model incorporating an open space risk term to account for the space beyond the reasonable support of known classes. This paper extends the general idea of open space risk limiting classification to accommodate non-linear classifiers in a multiclass setting. We introduce a new open set recognition model called compact abating probability (CAP), where the probability of class membership decreases in value (abates) as points move from known data toward open space. We show that CAP models improve open set recognition for multiple algorithms. Leveraging the CAP formulation, we go on to describe the novel Weibull-calibrated SVM (W-SVM) algorithm, which combines the useful properties of statistical extreme value theory for score calibration with one-class and binary support vector machines. Our experiments show that the W-SVM is significantly better for open set object detection and OCR problems when compared to the state-of-the-art for the same tasks.
536 citations
••
TL;DR: Empirical evidence collected from information system professionals demonstrated a structure similar to previously published studies with adequate reliability, convergent validity, and discriminant validity for the SERVQUAL instrument.
Abstract: There has been much debate as of late over the use of the SERVQUAL instrument to measure Information Systems service quality. Detractors argue that the difference score leads to unreliable measures and that the dimensionality and validity is erratic. Proponents argue for the diagnostic power of the gap between expectations and perceived delivery while demonstrating some empirical stability and reliability. To extend the discussion requires the examination of the instrument from the viewpoint of the information system professional. Importantly, a large variety of samples must view the instrument and measures in the same light for the instrument to have applicability. Likewise, analysis of differences between users and providers requires that both populations have similar structural views of the instrument. Empirical evidence collected from information system professionals demonstrated a structure similar to previously published studies with adequate reliability, convergent validity, and discriminant validity. The structure is the same as is found for a gap between users and IS professionals.
531 citations
•
09 Sep 1985TL;DR: A unitary self-contained card (10) which does not require interaction with a fixed terminal device to prevent monitoring of confidential information contained within the card is presented in this article.
Abstract: A unitary, self-contained card (10) which does not require interaction with a fixed terminal device to prevent monitoring of confidential information contained within the card (10). The unitary, self-contained card (10) has the ability to verify a personal identification number (PIN) which is entered directly into the card by way of a keyboard (12) without the use of an outside terminal and produce a transaction identification code (TIC) which varies for each transactional use of the card (10) and which can later be verified to determine the validity of the transaction. The card (10) is capable of storing issue and expiration dates, credit limit balances and other card transactional data. The card (10) can be used in conjuctions with a validation system (102) with provisions for verifying information recorded on the magnetic indicia (22) of the card (10). The card (10) can also be used with peripheral devices (96) which function to verify the validity of the transation from the transaction identification code (TIC).
525 citations
Authors
Showing all 6706 results
Name | H-index | Papers | Citations |
---|---|---|---|
Jeff Greenberg | 105 | 542 | 43600 |
James F. Scott | 99 | 714 | 58515 |
Martin Wikelski | 89 | 420 | 25821 |
Neil W. Kowall | 89 | 279 | 34943 |
Ananth Dodabalapur | 85 | 394 | 27246 |
Tom Pyszczynski | 82 | 246 | 30590 |
Patrick S. Kamath | 78 | 466 | 31281 |
Connie M. Weaver | 77 | 473 | 30985 |
Alejandro Lucia | 75 | 680 | 23967 |
Michael J. McKenna | 70 | 356 | 16227 |
Timothy J. Craig | 69 | 458 | 18340 |
Sheldon Solomon | 67 | 150 | 23916 |
Michael H. Stone | 65 | 370 | 16355 |
Christopher J. Gostout | 65 | 334 | 13593 |
Edward T. Ryan | 60 | 303 | 11822 |