نتایج جستجو برای: volta metric behavior

تعداد نتایج: 697653  

پایان نامه :دانشگاه رازی - کرمانشاه - دانشکده ادبیات و علوم انسانی 1393

in recent years, there has been a growing interest among researchers to investigate the relationship betweenteacher self-efficacy and classroom behavior management, especially students misbehavior. therefore, this study aimed to comparatively investigate english and arabic teachers’ use of different behavior managementstrategies, their self-efficacy, and their success in an iranian context. th...

2014
Michael W. Floyd Michael Drinkwater David W. Aha

Robots are added to human teams to increase the team’s skills or capabilities but in order to get the full benefit the teams must trust the robots. We present an approach that allows a robot to estimate its trustworthiness and adapt its behavior accordingly. Additionally, the robot uses casebased reasoning to store previous behavior adaptations and uses this information to perform future adapta...

Journal: :SIAM Journal on Optimization 2007
María J. Cánovas Diethard Klatte Marco A. López Juan Parra

This paper is concerned with the Lipschitzian behavior of the optimal set of convex semi-infinite optimization problems under continuous perturbations of the right hand side of the constraints and linear perturbations of the objective function. In this framework we provide a sufficient condition for the metric regularity of the inverse of the optimal set mapping. This condition consists of the ...

2016
Matthias Hagen Maximilian Michel Benno Stein

We propose a framework for deterministic simulation of user behavior that allows to analyze the cost-gain-based performance on single result lists or whole search sessions. The ideal user representing optimal behavior (i.e., most gain with lowest effort) is contrasted with more “average” users that employ the spreading activation model from cognitive theory. On TREC Session Track data, the idea...

2015
Kun Zhang

Cyber-Physical Systems (CPS) are systems of collaborating computational elements controlling physical entities via communication. Such systems involve control processes of physical entities and computational processes. The control complexities originated from the physical dynamics and systematic constraints are difficult for traditional control approaches (e.g., PID control) to handle without a...

2000
John J. Wilson David Sheppard Nancy Jacobs

Reacting, in part, to these and other sobering statistics, the Office of Juvenile Justice and Delinquency Prevention established the Partnerships To Reduce Juvenile Gun Violence Program, which seeks to increase the effectiveness of existing strategies by enhancing and coordinating prevention, intervention, and suppression efforts and strengthening community linkages. This Bulletin describes the...

2013
Ara Norenzayan Will M. Gervais

Atheists are distrusted in societies with religious majorities. However, relatively little is known about the underlying reasons for this phenomenon. Previous evidence suggests that distrust of atheists is in part the result of believers thinking that being under supernatural surveillance by a watchful God underlies moral behavior. However, secular rule of law, including institutions such as po...

Journal: :Social Networks 2012
Dean Lusher Garry Robins Philippa Pattison Alessandro Lomi

The possibility of resolving the tension between trust as a psychological condition and trust as a general organizing principle depends on assumptions about the convergence of expressed and perceived trust relations. In empirical organizational research these assumptions are frequently left implicit and only rarely modeled directly. Using data that we have collected on trust relations within th...

Journal: :Genetics and molecular research : GMR 2016
R D Castro L A Peternelli M D V Resende C D Marinho P M A Costa M H P Barbosa E F A Moreira

The objective of this study was to assess the efficiency of a modification of the simulated individual best linear unbiased prediction (BLUPIS) procedure, which is used for the approximation of classic individuals (BLUPI) for selection between and within sugarcane families. A total of 110 full-sib families were employed in an experiment initiated in 2007 using a randomized block design with fiv...

2013
Radwan M. Al-Dwairi R. M. Al-Dwairi

E-commerce web sites are attractive targets for web attackers. The wide media coverage about many successful attacks against many web sites makes e-customers more reluctant toward conducting online transactions via the web. The critical point in this situation is how to help e-customers decide whether a certain e-commerce web site is trusted or not and persuade them to proceed with their online...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید