|Appears in Collections:||Computing Science and Mathematics Conference Papers and Proceedings|
|Peer Review Status:||Refereed|
|Authors:||Niazi, Muaz A K|
Baig, Abdul Rauf
|Title:||Simulation of the research process|
|Citation:||Niazi MAK, Hussain A, Baig AR & Bhatti S (2008) Simulation of the research process, Mason Scott, Hill Ray, Mönch Lars, Rose Oliver (ed.) Winter Simulation Conference, 2008. WSC 2008, Winter Simulation Conference, 2008. WSC 2008, Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), pp. 1326-1334.|
|Series/Report no.:||Winter Simulation Conference, WSC|
|Conference Name:||Winter Simulation Conference, 2008. WSC 2008|
|Abstract:||This paper presents ﬁrst steps towards the development of a formal model of the research process. We evaluate the use of simulation as a tool for the evaluation of research strategies in nascent research organizations faced with the absence of signiﬁcant data. We start by modeling the research process by using the ”Publish or Perish” paradigm, a well-known criteria of evaluation of research. We demonstrate the use of this model for researchers to evaluate the effects of selection of a particular publishing venue over time. We then perform various experiments using this basic idea. By means of various visualization techniques, we see how researchers with similar publishing policies might self-organize in the form of groups. We also evaluate the effects of giving higher weights to articles in journals and see where the effects of publishing in these venues breaks even for both top as well as average acceptance rates.|
|Rights:||Published in Winter Simulation Conference, 2008. WSC 2008 by Institute of Electrical and Electronics Engineers (IEEE).; © 2008 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.|
|Affiliation:||COMSATS Institute of IT|
Computing Science - CSM Dept
Foundation University, Islamabad
This item is protected by original copyright
Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
If you believe that any material held in STORRE infringes copyright, please contact firstname.lastname@example.org providing details and we will remove the Work from public display in STORRE and investigate your claim.