نتایج جستجو برای: catching
تعداد نتایج: 3664 فیلتر نتایج به سال:
Two results are established concerning the ability of a set to cover any element of a class of sets under the action of an ergodic flow. The classes considered are the class of countable sets and the class of sets of measure zero. RESUME. Deux résultats sont demontres concernant la possibilité pour un ensemble de recouvrir, sous l’action d’un flot ergodique, tous les elements d’une classe d’ens...
An interesting class of intelligent tutoring systems are systems that are able to detect and recognize affective responses and states in students, and use such data to adapt its feedback, guidance and instruction. The article presents affective responses and states considered relevant for learning, and methods that have been proposed or used to detect such responses and states. We focus on the ...
Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/page/info/about/policies/terms.jsp. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive o...
Abstract In this paper we test two versions of convergence hypothesis namely deterministic or conditional convergence and stochastic or catching up hypothesis using Carrion-i-Silvestre et al. (2005) stationary test. The results show Latin and South American countries (LSA) catching up process toward the USA failed in 1980s and somewhat in 1990s. But in 2000s most of them could lie in converge...
The mechanism and speed of endocytosis at central synapses after neurotransmitter release is still under debate. In this issue of Neuron,Delvendahl et al. (2016) propose an ultrafast form of endocytosis after single action potentials (APs) at physiological temperature.
Two signalling pathways work together to reshape olfactory responses so that hungry flies are attracted to food sources they would otherwise ignore.
In the past several years there has been extensive research into honeypot technologies, primarily for detection and information gathering against external threats. However, little research has been done for one of the most dangerous threats, the advance insider, the trusted individual who knows your internal organization. These individuals are not after your systems, they are after your informa...
In one paper scheduled to be presented this week at the Conference on E-mail and Anti-Spam, in Mountain View, CA, researchers from Indiana University studied how spammers obtain the e-mail addresses in the first place. The researchers used a variety of techniques to match the programs that cull e-mail addresses from Web pages to the resulting spam. "We are basically trying to figure out how spa...
We propose a new approach for dealing with the estimation of the location of change-points in one-dimensional piecewise constant signals observed in white noise. Our approach consists in reframing this task in a variable selection context. We use a penalized least-squares criterion with a `1-type penalty for this purpose. We prove some theoretical results on the estimated change-points and on t...
After the completion of the human genome sequencing project, DNA microarrays and sophisticated bioinformatics platforms give scientists a global view of biological systems. In today's proteome era, efforts are undertaken to adapt microarray technology in order to analyse the expression of a large number of proteins simultaneously and screen entire genomes for proteins that interact with particu...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید