Research misconduct: Issues, implications, and strategies
โ Scribed by White, Jeff
- Publisher
- John Wiley and Sons
- Year
- 1998
- Tongue
- English
- Weight
- 90 KB
- Volume
- 49
- Category
- Article
- ISSN
- 0002-8231
No coin nor oath required. For personal study only.
โฆ Synopsis
remote method invocation, and security are to be printed in a separate volume. For comprehensive information on all the Java class libraries, one should consider purchasing a complete reference set, such as Patrick Chan and Rosanna Lee's The Java Class Libraries, Second Edition, Volumes 1 and 2 (Reading, MA: Addison-Wesley; 1998).
The subject index is comprehensive but short on cross-references. This is particularly true of abbreviations which are used throughout the index. For example, information on the Abstract Windowing Toolkit is found under AWT, not "abstract." For the experienced programmer, this is a time-saving feature, however it would have been useful to include the full phrase, in parenthesis, after all abbreviations, instead of just some. An ordering key would also have been useful. For instance, KEY_ACTION is filed as "key action" which naturally comes before "keyboard," and "java.beans" comes before "javac," which comes before "java.math." In one case, the underscore functions as a space; in the other, the period is ignored.
An errata list, as well as further information regarding the book, can be found at O'Reilly's website: http://www.oreilly.com/ catalog/javanut2/. There are some 24 corrections listed, the vast majority of which are minor spelling and/or grammatical errors. For a book of this size and complexity, this is a remarkably small list.
A note about the binding is in order here. A good reference book, when opened to any page, should lie flat on a desktop, to allow easy reading while hands are occupied with typing/input. This book, unfortunately, does not do this, and you will need some sort of weight to keep it open, which is a definite annoyance.
Mr. Flanagan succeeds in producing this quick, desktop reference. If one had to have just one book, this would be an excellent choice, and at under $20.00, it is one of the best investments any Java programmer can make.
๐ SIMILAR VOLUMES
The organizers and presenters are to be commended for the many stimulating papers delivered at this conference. The diversity of the papers' topics makes generalization a difficult task, but I shall do my best to synthesize and assess what I have heard here and offer some suggestions for researchabl
## User-centered design methods have long focused on well as new research approaches to study, design, and solitary users interacting with isolated computer sysevaluate these systems better. No longer can the focus be tems. The explosion of computer-supported cooperative solely on the usability of
This article considers the problems caused by ever increasing traffic on Token Ring LANs. It shows how the new IEEE 802.5 standard for DTR addresses this problem, outlining scenarios and providing a migration strategy for evolving networks, using this new standard.
Despite a rich history of etiological research, thefield of occupational safety and health does not a have a rigorous history of research on what works and does not work to prevent and control occupational diseases and injuries. National and global transformations of economies and workplaces with en
Business strategy is a complex subject and is usefully examined from several perspectives. This paper applies the lenses of governance and competence to the study of strategy. Both the governance and the competence perspectives have had the benefit of distinguished antecedents. They have also had t