YbeY: The Jealous Tailor

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Jealous Child

This book contains a wealth of material on a large number of psychiatric topics arranged in alphabetic order. Most of the treatises, and especially the best ones, are reprints of articles published by the respective authors in various journals and the latter often represent authoritative thinking in the particular fields. There are, however, glaring omissions, which are aggravated by a very unu...

متن کامل

Cognitive computation of jealous emotion

The computational role of jealous emotion has been proposed in a model of emotion, in which the desirable gain (or loss) is used as a measure for computing the emotional feedback that assesses the discrepancy between what an individual wants and gets. The jealous emotion is elicited when the perception that the other individuals have more than one has, or that the desire of wanting what others ...

متن کامل

Jealous love and morbid jealousy.

Jealous love and morbid jealousy, although inextricably linked, cannot be considered the same: jealous love (trait jealousy) is the behavioral and cognitive-affective precondition of morbid jealousy (state jealousy). Love is jealous when it is devoured by the desire for the exclusive and total possession of the partner, whose unconditional and continued presence is avidly requested. This type o...

متن کامل

Antiplatelet therapy: to tailor or not to tailor?

We have all been witnessing the steep upward trend in mobile device usage and their increasing sophistication which will no doubt continue. We used to use our mobile phones to make calls and possibly to send a text message, but now we check our emails, reserve cinema tickets, and, of course, read the latest journal articles via our smartphones and tablets. At Oxford University Press, we launche...

متن کامل

Tinker, tailor, solver, proof

We introduce Tinker, a tool for designing and evaluating proof strategies based on proof-strategy graphs, a formalism introduced by the authors in [7]. We represent proof strategies as open-graphs, which are directed graphs with additional input/output edges. Tactics appear as nodes in a graph, and can be ‘piped’ together by adding edges between them. Goals are added to the input edges of such ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Molecular Cell

سال: 2013

ISSN: 1097-2765

DOI: 10.1016/j.molcel.2013.01.021