نتایج جستجو برای: think aloud protocol

تعداد نتایج: 295593  

2010
Qun Liu Yang Liu Haitao Mi

Syntax-based statistical translation model is proved to be better than phrasebased model, especially for language pairs with very different syntax structures, such as Chinese and English. In this talk I will introduce a serial of statistical translation models based on source syntax structure. The tree-based model uses the one best syntax tree for translation. The forest-based model uses a comp...

2013
IsMAIL HussEIN

I WOULD LIKE FIRST OF ALL TO THANK THE PRESIDENT of the Royal Asiatic Society Malaysian Branch and the Society itself for the invitation to give the Annual Lecture this evening. I propose to spend this one hour or so to talk about some general problems regarding the study of Malay literature, in particular the older or traditional-literature. It is a subject which is very close to heart for the...

2002
Christine Wallace Curtis R. Cook Jay Summet Margaret M. Burnett

There has been little research on end-user program development beyond the programming phase. Devising ways to address additional phases may be critical, because research shows that over one-half of the programs written by end users, at least in the widely used spreadsheet paradigm, contain errors. In this paper, we investigate whether providing end users with integrated support for requirement ...

Journal: :Case studies in sport and exercise psychology 2021

This case reports a brief attribution-retraining (AR) intervention with youth tennis players. Athletes were struggling to maintain emotional control, resulting in problematic on-court behavior (e.g., racket throwing). The used Think Aloud protocol and AR across five key phases: (a) assessment, (b) psychoeducation, (c) AR, (d) evaluation, (e) follow-up. authors determined effectiveness using qua...

2013
Tanya Y. Berger-Wolf

Computation has fundamentally changed the way we study nature. New data collection technology, such as GPS, high definition cameras, UAVs, genotyping, and crowdsourcing, are generating data about wild populations that are orders of magnitude richer than any previously collected. Unfortunately, in this domain as in many others, our ability to analyze data lags substantially behind our ability to...

Journal: :Educational Technology & Society 2007
Buhle Mbambo Johannes C. Cronjé

This paper reports on a locally initiated investigation into the suitability of the Internet in helping to meet the information needs of women in small, medium, and micro enterprises (SMMEs) in the textile industry in Botswana. The background is the stated government policy to encourage the development of SMMEs and the Internet infrastructure. The question is, how likely are women entrepreneurs...

1998
Robert L. Jaffe

I have to confess: at the time, I had little idea what Sid was talking about. Now I understand that he was planting in the historical record a classical context for the talk I am about to give. As all of you know, Sid was a much more practical man than this quote would suggest. His down-to-earth attitude toward particle theory rubbed off on most of his students. It is exemplified by the followi...

2008
Thomas Ågotnes Michael Wooldridge

While different forms of social interaction have been extensively studied in several fields, the development of formal logics makes precise knowledge representation and mechanical reasoning about situations involving social interaction possible. In particular, such logics make it possible to formally specify and verify software implementing social mechanisms. In my talk I will give an overview ...

Journal: :Theor. Comput. Sci. 2009
Alessio Guglielmi

Giorgio Levi has two great fortunes: he has a noble smile and he survived a heart attack. These are the important facts about his personality, and they are so evident that there is no need for this modest portrait, which does little more than stating the obvious. I should perhaps start by sketching my relation with Giorgio, so that my point of view is clear: I owe my life to him. In 1991, he ga...

2009
Divyakant Agrawal Amr El Abbadi

Data is everywhere, and manifests itself in various formats. Data can be publicly available and can be privately owned. Data can be persistent on a server or ephemeral in a data stream. Society depends on data and hence the security, privacy and reliability of the data are critical in diverse ways. In this talk I will touch on various security aspects of data in different contexts that arise in...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید