Skip to main content

标  题: EB1A contribution容易RFE的原因

http://gengwg.blogspot.com/发信人: Eldora (潘多拉), 信区: I140
标  题: EB1A contribution容易RFE的原因
发信站: BBS 未名空间站 (Mon Apr 13 12:59:48 2015, 美东)

只是自己做得一点小思考,有没有用不打包票,遇到变态的IO除了束手就擒别无他法。
  有看到版上人被质疑contribution,并且与推荐人google scholar做对比,于是I
O得出你并没有那么出色的结论。
  为避免这样的对比,如果推荐人愿意帮忙,可以请求其在你投了之后的两周里把GS
private一下,这个不难。不PP的我就不知道时间点了,让教授Private太久
不太好吧。当然一些老教授其实根本就没有GS。如果觉得这要的要求不现实,那就好好
去找那些没有 google scholar的推荐人写推荐信吧。我当初提交的时候特意留意了下
自己推荐人是不是有google scholar,索性一个都没有,或者有他们都自己private了。
IO不会花大力气去查这些,而且也不是所有的IO都把这个当点去计较。

还有一个避免的点,你的google scholar右侧有coauthor显示的也都是有google
scholar的,把那些牛X的都叉掉,免得IO闲的没事点下一对比你就二了。

 当然如果不幸已经被RFE了,可以试着从方向其实不一样上去做对比。而且时代也不
一样的,有些方向在初期发文章容易,都现在就不容易了,还有一些年轻的一般学校的
faculty也不见的就比你好,等等。。。
--

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec