Results 161 to 170 of about 233,719 (314)
Prompt-Hacking: The New p-Hacking?
As Large Language Models (LLMs) become increasingly embedded in empirical research workflows, their use as analytical tools for quantitative or qualitative data raises pressing concerns for scientific integrity. This opinion paper draws a parallel between "prompt-hacking", the strategic tweaking of prompts to elicit desirable outputs from LLMs, and the
Kosch, Thomas, Feger, Sebastian
openaire +2 more sources
Trajectories of genetic risk across dimensions of alcohol use behaviors
Abstract Background and aims Alcohol use behaviors (AUBs) manifest in a variety of normative and problematic ways across the life course, all of which are heritable. Twin studies show that genetic influences on AUBs change across development, but this is usually not considered in research identifying and investigating the genes linked to AUBs ...
Jeanne E. Savage +127 more
wiley +1 more source
Curious Games: Game Making, Hacking and Jamming as Critical Practice. [PDF]
Germaine C, Wake P.
europepmc +1 more source
Abstract Extension services are designed to facilitate the flow of information from researchers to farmers. However, information failures continue to impede the diffusion of soil‐improving and water conservation technologies in Sub‐Saharan African countries. We use a randomized controlled trial (RCT) to examine the impact of an extension‐based campaign
Esther Gloria Mbabazi +3 more
wiley +1 more source
The history of the semantic hacking project and the lessons it teaches for modern cognitive security. [PDF]
Thompson P, Guillory S.
europepmc +1 more source
Mitigating tough times? How material self‐interest influences citizens' welfare state behavior
Abstract It is a long‐standing view that citizens support the welfare state because it provides insurance against future income losses. However, existing studies have struggled to isolate the effect of future‐oriented material self‐interest from normative and political predispositions.
Matias Engdal Christensen
wiley +1 more source
A hybrid intrusion detection model based on dynamic spatial-temporal graph neural network in in-vehicle networks. [PDF]
Zhang J, Fan X, Zhao Z.
europepmc +1 more source
Quality from Kent: Preliminary results from the analysis of fifth‐ to seventh‐century silver alloys
Abstract This paper explores early results from the chemical and lead isotope analysis of 30 silver‐alloy objects from southeast England dating between the fifth and seventh centuries CE, presenting limited aspects of the three main analyses that were conducted. First, a comparison of the results gained from surface x‐ray fluorescence (pXRF) values and
Toby F. Martin, Matthew J. Ponting
wiley +1 more source
Am I Worth it? Social Investment Discourse as a Frame of Interaction in Welfare Programs for Young People with Drug Problems. [PDF]
Andersen D.
europepmc +1 more source

