نتایج جستجو برای: some others
تعداد نتایج: 1430664 فیلتر نتایج به سال:
Imagine you lose sight of your friends (or parents) for a moment while are out at the park. You glance around and then spot them in distance. easily pick from all other people park correctly identify them. This process is called familiar face recognition. For most us, this seems easy generally good recognising faces. However, few really struggle to recognise Other “super-recognisers” who have a...
The present study explored social and emotional loneliness, and victimisation among a sample of adult male prisoners. 241 prisoners took part, completing a behavioural measure of behaviours indicative of bullying (DIPC-R: Direct and Indirect Prisoner behaviour Checklist, Ireland, J.L. 2003. The Direct and Indirect Prisoner behaviour Checklist -- Revised. Psychology Department, University of Cen...
This study reports and analyses rates and correlates of repeat victimisation in selected European cities. Rates of repeat were lower outside the English cities surveyed. However, the extreme level of repeat victimisation among dacha victims in Miskolc, Hungary, proved startling, indicating the vulnerability of such property to burglary. There are marked differences between levels of repeat vict...
BACKGROUND Despite increasing evidence suggesting that childhood maltreatment is significantly associated with psychosis, the specific role of bullying in the onset of psychotic disorders is still unclear. This study aimed to examine whether bullying was more prevalent amongst individuals presenting to services for the first time with a psychotic disorder than in unaffected community controls. ...
In this paper we analyze a two-candidate electoral competition in which a candidate can either lie about his private policy preference in order to get elected, or pander to post-election external influences in choosing a policy to implement. Both the pre-election announcement and post-election implementation are a candidate’s strategic choices. We show that, in equilibrium, different types of c...
In February 2004, TechWise Research published a paper entitled: Total Cost of Ownership for Entry-Level and Mid-Range Clusters. That paper showed that HP OpenVMS/AlphaServer clusters average fewer hours of security-related downtime than IBM AIX/pSeries and Sun Solaris/Sun Fire clusters. TechWise Research decided to conduct a follow-up study to probe specifically into the area of cluster securit...
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission.
The results of this study provide insight into why some universities generate more new companies to exploit their intellectual property than do others. We compare four different explanations for cross-institutional variation in new firm formation rates from university technology licensing offices (TLOs) over the 1994–1998 period—the availability of venture capital in the university area; the co...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید