نتایج جستجو برای: proxy modeling

تعداد نتایج: 414282  

2013
Doron FRIEDMAN Oren SALOMON

We describe the concept and a first prototype of a digital replacement for teacher in class. While earlier work on intelligent pedagogical agents has focused on the development of a generic idealized teacher agent, our focus lies on modeling the identity of a specific teacher, called a “classroom proxy.” We evaluate the concept of a classroom proxy in an exploratory case study and discuss the b...

Background: Child-parent agreement is a controversial aspect of measuring health-related quality of life (HRQoL) in children and adolescents. The aim of this study was to assess the agreement between the child self-reports and parent proxy reports of the PedsQL 3.0 Asthma Module in Iranian children with asthma to evaluate HRQoL. Moreover, the psychometric properties of the child and parent repo...

Developments after September of 2011 confirm the pessimistic view towards the Middle East because opposed to the expectations of the optimists, ending the Cold War and the collapse of bipolar system did not mean regional peace. One of the reasons for this instability and regional conflict is direct and indirect intervention of the United States and its presence in theregion. One of the areas th...

Journal: :Comput. J. 2007
Ing-Ray Chen Weiping He Baoshan Gu

We propose and analyse a proxy-based regional registration scheme for integrated mobility and service management with the goal to minimize the network signaling and packet delivery cost in Mobile Internet Protocol (MIP) systems. Under the proposed proxy-based regional registration scheme, a client-side proxy is created on a per-user basis to serve as a gateway between a mobile node (MN) and all...

The response speed of Web pages is one of the necessities of information technology. In recent years, renowned companies such as Google and computer scientists focused on speeding up the web. Achievements such as Google Pagespeed, Nginx and varnish are the result of these researches. In Customer to Customer(C2C) business systems, such as chat systems, and in Business to Customer(B2C) systems, s...

2004
Hoi Ying Wong

ABSTRACT In the credit risk modeling literature, there are two different viewpoints towards the structural model of Merton. Many empirical tests show that the Merton model overestimates corporate bond prices substantially. However, there are other empirical works defensing that the Merton model is useful in predicting default and performs well in estimating deposit insurance fund. In this paper...

2010
Jonathan Jackson

This paper examines vulnerability and risk perception in the fear of crime. Past studies have often treated gender and age as proxies for vulnerability, and on the few occasions that vulnerability has been operationalised, there has been little agreement on the mechanisms that underpin perceived susceptibility. To develop a more theoretically-driven approach, the current study examines whether ...

2006
Richard E. Zeebe Jelle Bijma Bärbel Hönisch Abhijit Sanyal Howard J. Spero Dieter A. Wolf-Gladrow

This paper primarily reviews our recent work on the biology and geochemistry of foraminifera with respect to their use as paleoceanographic proxies. Our approach to proxy validation and development is described, primarily from a modeler’s point of view. The approach is based on complementary steps in understanding the inorganic chemistry, inorganic isotope fractionation, and biological controls...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید