scispace - formally typeset
Search or ask a question
Institution

University of Colorado Colorado Springs

EducationColorado Springs, Colorado, United States
About: University of Colorado Colorado Springs is a education organization based out in Colorado Springs, Colorado, United States. It is known for research contribution in the topics: Population & Poison control. The organization has 6664 authors who have published 10872 publications receiving 323416 citations. The organization is also known as: UCCS & University of Colorado at Colorado Springs.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors examine whether audit quality affects the trade-off between accrual-based and real earnings management and find that firms with high audit quality are more likely to use accretive stock repurchases.
Abstract: We examine whether audit quality affects the trade-off between accrual-based and real earnings management. We hypothesize that firms motivated to manage earnings per share (EPS) to meet or beat consensus analysts' forecasts are more likely to engage in accretive stock repurchases (a form of real earnings management) when their ability to manage earnings through accruals is constrained by high audit quality. We find that firms with high audit quality are more likely to use accretive stock repurchases and less likely to use accrual-based earnings management to meet or beat consensus analysts' forecasts. Our results are robust to various controls for endogeneity concerns.

99 citations

01 Jan 2006
TL;DR: In this article, a robust distance measure for face recognition is proposed, which can be used for secure robust revocable biometrics. But, unlike passwords, biometric signatures cannot be changed or revoked.
Abstract: This paper explores a form of robust distance measures for biometrics and presents experiments showing that, when applied per "class" they can dramatically improve the accuracy of face recognition. We "robustify'' many distance measures included in the CSU face-recognition toolkit, and apply them to PCA, LDA and EBGM. The resulting performance puts each of these algorithms, for the FERET datasets tested, on par with commercial face recognition results. Unlike passwords, biometric signatures cannot be changed or revoked. This paper shows how the robust distance measures introduce can be used for secure robust revocable biometrics. The technique produces what we call Biotopes/spl trade/, which provide public-key cryptographic security, supports matching in encoded form, cannot be linked across different databases and are revocable. Biotopes support a robust distance measure computed on the encoded form that is proven not to decrease, and that may potentially increase, accurately. The approach is demonstrated, to improve performance beyond the already impressive gains from the robust distance measure.

99 citations

Journal ArticleDOI
TL;DR: This study evaluated cognitive set-shifting in 12 patients with focal lesions in the lateral prefrontal cortex by examining their performance on the Trail Making Test from the Delis-Kaplan Executive Function System (D-KEFS), and suggested that LPC lesions can lead to impaired cognitiveSetshifting on a visual-motor sequencing task.
Abstract: This study evaluated cognitive set-shifting in 12 patients with focal lesions in the lateral prefrontal cortex (LPC) by examining their performance on the Trail Making Test from the Delis-Kaplan Executive Function System (D-KEFS). Patients with LPC lesions performed significantly worse than controls on the D-KEFS Trail Making Test on the Letter Sequencing, Number-Letter Switching (set-shifting), and Motor Speed conditions. Patients with LPC lesions performed significantly more slowly on the Number-Letter Switching condition even after controlling for performance on the four baseline conditions of the test. In addition, patients with LPC lesions exhibited significantly elevated error rates on the Number-Letter Switching condition. Results suggest that LPC lesions can lead to impaired cognitive set-shifting on a visual-motor sequencing task. (JINS, 2007, 13, 704–709.)

99 citations

Journal ArticleDOI
TL;DR: Survey results showed that although the use of computers for individuals with intellectual and developmental disabilities is more prevalent, other technology use frequency is much the same as in the late 1990s.
Abstract: Background A nationwide survey of family members of people with intellectual and developmental disabilities ranging in age from birth through adulthood was conducted to replicate a similar effort by Wehmeyer and update the knowledge base concerning technology use by people with intellectual and developmental disabilities. Method Survey responses provided information about use of technology for mobility, hearing and vision, communication, independent living, and in the area of computer use. In addition, survey items queried the use of electronic and information technology devices such as use of email, mobile telephones and digital cameras. Results Survey results showed that although the use of computers for individuals with intellectual and developmental disabilities is more prevalent, other technology use frequency is much the same as in the late 1990s. However, technology needs did vary among school-age individuals over time. Conclusion Implications of results for technology use of people with disabilities are discussed through the lens of frequency of use and needs for individuals with disabilities.

99 citations

Journal ArticleDOI
TL;DR: Recent approaches for generating adversarial texts are summarized and a taxonomy to categorize them are proposed and a comprehensive review of their use to improve the robustness of DNNs in NLP applications is presented.
Abstract: Deep learning models have achieved great success in solving a variety of natural language processing (NLP) problems. An ever-growing body of research, however, illustrates the vulnerability of deep neural networks (DNNs) to adversarial examples — inputs modified by introducing small perturbations to deliberately fool a target model into outputting incorrect results. The vulnerability to adversarial examples has become one of the main hurdles precluding neural network deployment into safety-critical environments. This paper discusses the contemporary usage of adversarial examples to foil DNNs and presents a comprehensive review of their use to improve the robustness of DNNs in NLP applications. In this paper, we summarize recent approaches for generating adversarial texts and propose a taxonomy to categorize them. We further review various types of defensive strategies against adversarial examples, explore their main challenges, and highlight some future research directions.

99 citations


Authors

Showing all 6706 results

NameH-indexPapersCitations
Jeff Greenberg10554243600
James F. Scott9971458515
Martin Wikelski8942025821
Neil W. Kowall8927934943
Ananth Dodabalapur8539427246
Tom Pyszczynski8224630590
Patrick S. Kamath7846631281
Connie M. Weaver7747330985
Alejandro Lucia7568023967
Michael J. McKenna7035616227
Timothy J. Craig6945818340
Sheldon Solomon6715023916
Michael H. Stone6537016355
Christopher J. Gostout6533413593
Edward T. Ryan6030311822
Network Information
Related Institutions (5)
Arizona State University
109.6K papers, 4.4M citations

93% related

University of Illinois at Urbana–Champaign
225.1K papers, 10.1M citations

90% related

Pennsylvania State University
196.8K papers, 8.3M citations

90% related

Florida State University
65.3K papers, 2.5M citations

90% related

University of Maryland, College Park
155.9K papers, 7.2M citations

90% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202325
202246
2021569
2020543
2019479
2018454