In this session, we will start at the beginning and talk about what you need to think about in setting up research analytics capabilities for your organization. There are so many options for tools and other resources to get started, but what if you only have Excel? How do you get reporting off the ground when it hasn’t been done (or done consistently) at your workplace? We’ll talk about ways to get started, including who you need to talk with, what you need to consider, and how to move forward with basic reporting. Presented at the 2024 Research Analytics Summit in Albuquerque NM
more »
« less
Where we've been and where we're going: the importance of source communities in predicting establishment success from phylogenetic relationships
- Award ID(s):
- 1750280
- PAR ID:
- 10332674
- Date Published:
- Journal Name:
- Ecography
- Volume:
- 2022
- Issue:
- 6
- ISSN:
- 0906-7590
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Abstract Goldin-Meadow & Brentari (G-M&B) outline several criteria for delineating the boundaries between (discrete) signs and (continuous) gestures. However, the complex links between linguistics forms and their phonetic realizations defy such heuristics. A systematic exploration of language structure by mouth and by hand may help get us closer to answering the important challenge outlined in this target article.more » « less
-
Where provenance is a relationship between a data item and the location from which this data was copied. In a DBMS, a typical use of where provenance is in establishing a copy-by-address relationship between the output of a query and the particular data value(s) that originated it. Normal DBMS operations create a variety of auxiliary copies of the data (e.g., indexes, MVs, cached copies). These copies exist over time with relationships that evolve continuously – (A) indexes maintain the copy with a reference to the origin value, (B) MVs maintain the copy without a reference to the source table, (C) cached copies are created once and are never maintained. A query may be answered from any of these auxiliary copies; however, this where provenance is not computed or maintained. In this paper, we describe sources from which forensic analysis of storage can derive where provenance of table data. We also argue that this computed where provenance can be useful (and perhaps necessary) for accurate forensic reports and evidence from maliciously altered databases or validation of corrupted DBMS storage.more » « less
An official website of the United States government

