How NOT to Review a Paper: The Tools and Techniques of the Adversarial Reviewer. Cormode, G. 37(4):100–104. Paper doi abstract bibtex There are several useful guides available for how to review a paper in Computer Science [10, 6, 12, 7, 2]. These are soberly presented, carefully reasoned and sensibly argued. As a result, they are not much fun. So, as a contrast, this note is a checklist of how not to review a paper. It details techniques that are unethical, unfair, or just plain nasty. Since in Computer Science we often present arguments about how an adversary would approach a particular problem, this note describes the adversary's strategy.
@article{cormodeHowNOTReview2009,
title = {How {{NOT}} to {{Review}} a {{Paper}}: {{The Tools}} and {{Techniques}} of the {{Adversarial Reviewer}}},
author = {Cormode, Graham},
date = {2009-03},
journaltitle = {SIGMOD Rec.},
volume = {37},
pages = {100--104},
issn = {0163-5808},
doi = {10.1145/1519103.1519122},
url = {https://doi.org/10.1145/1519103.1519122},
abstract = {There are several useful guides available for how to review a paper in Computer Science [10, 6, 12, 7, 2]. These are soberly presented, carefully reasoned and sensibly argued. As a result, they are not much fun. So, as a contrast, this note is a checklist of how not to review a paper. It details techniques that are unethical, unfair, or just plain nasty. Since in Computer Science we often present arguments about how an adversary would approach a particular problem, this note describes the adversary's strategy.},
keywords = {*imported-from-citeulike-INRMM,~INRMM-MiD:c-4311739,check-list,peer-review,publication-bias,science-ethics},
number = {4}
}
Downloads: 0
{"_id":"LrKiChs2SX2Z9Abpr","bibbaseid":"cormode-hownottoreviewapaperthetoolsandtechniquesoftheadversarialreviewer","authorIDs":[],"author_short":["Cormode, G."],"bibdata":{"bibtype":"article","type":"article","title":"How NOT to Review a Paper: The Tools and Techniques of the Adversarial Reviewer","author":[{"propositions":[],"lastnames":["Cormode"],"firstnames":["Graham"],"suffixes":[]}],"date":"2009-03","journaltitle":"SIGMOD Rec.","volume":"37","pages":"100–104","issn":"0163-5808","doi":"10.1145/1519103.1519122","url":"https://doi.org/10.1145/1519103.1519122","abstract":"There are several useful guides available for how to review a paper in Computer Science [10, 6, 12, 7, 2]. These are soberly presented, carefully reasoned and sensibly argued. As a result, they are not much fun. So, as a contrast, this note is a checklist of how not to review a paper. It details techniques that are unethical, unfair, or just plain nasty. Since in Computer Science we often present arguments about how an adversary would approach a particular problem, this note describes the adversary's strategy.","keywords":"*imported-from-citeulike-INRMM,~INRMM-MiD:c-4311739,check-list,peer-review,publication-bias,science-ethics","number":"4","bibtex":"@article{cormodeHowNOTReview2009,\n title = {How {{NOT}} to {{Review}} a {{Paper}}: {{The Tools}} and {{Techniques}} of the {{Adversarial Reviewer}}},\n author = {Cormode, Graham},\n date = {2009-03},\n journaltitle = {SIGMOD Rec.},\n volume = {37},\n pages = {100--104},\n issn = {0163-5808},\n doi = {10.1145/1519103.1519122},\n url = {https://doi.org/10.1145/1519103.1519122},\n abstract = {There are several useful guides available for how to review a paper in Computer Science [10, 6, 12, 7, 2]. These are soberly presented, carefully reasoned and sensibly argued. As a result, they are not much fun. So, as a contrast, this note is a checklist of how not to review a paper. It details techniques that are unethical, unfair, or just plain nasty. Since in Computer Science we often present arguments about how an adversary would approach a particular problem, this note describes the adversary's strategy.},\n keywords = {*imported-from-citeulike-INRMM,~INRMM-MiD:c-4311739,check-list,peer-review,publication-bias,science-ethics},\n number = {4}\n}\n\n","author_short":["Cormode, G."],"key":"cormodeHowNOTReview2009","id":"cormodeHowNOTReview2009","bibbaseid":"cormode-hownottoreviewapaperthetoolsandtechniquesoftheadversarialreviewer","role":"author","urls":{"Paper":"https://doi.org/10.1145/1519103.1519122"},"keyword":["*imported-from-citeulike-INRMM","~INRMM-MiD:c-4311739","check-list","peer-review","publication-bias","science-ethics"],"downloads":0},"bibtype":"article","biburl":"https://tmpfiles.org/dl/58794/INRMM.bib","creationDate":"2020-07-02T22:41:04.583Z","downloads":0,"keywords":["*imported-from-citeulike-inrmm","~inrmm-mid:c-4311739","check-list","peer-review","publication-bias","science-ethics"],"search_terms":["review","paper","tools","techniques","adversarial","reviewer","cormode"],"title":"How NOT to Review a Paper: The Tools and Techniques of the Adversarial Reviewer","year":null,"dataSources":["DXuKbcZTirdigFKPF"]}