نتایج جستجو برای: learning intention
تعداد نتایج: 646369 فیلتر نتایج به سال:
This paper deals with conversations at an abstract level. The purpose is to sketch a theoretical framework for messaging where electronically mediated conversations can be decomposed into elements. More specifically, the decomposition takes advantage of the speech act theory. The speech act theory has already been applied to both human beings and artificial agents, but in separate contexts and ...
Social networking websites have become increasingly popular, and have also become the main media not only to connect lives socially, but also to affect brand image and consumers’ purchase intention. The purpose of this paper is to incorporate the Facebook fan page and e-journal provide over the Internet (cloud e-journal) with the uses and gratification theory to test the impact on brand image a...
Responding appropriately to gaze cues is essential for fluent social interaction, playing a crucial role in social learning, collaboration, threat assessment and understanding others' intentions. Previous research has shown that responses to gaze cues can be studied by investigating the gaze-cuing effect (i.e. the tendency for observers to respond more quickly to targets in locations that were ...
Human actions may be carried out in response to exogenous stimuli (stimulus based) or they may be selected endogenously on the basis of the agent’s intentions (intention based). We studied the functional differences between these two types of action during action–effect (ideomotor) learning. Participants underwent an acquisition phase, in which each key-press (left/right) triggered a specific t...
Mobile operating systems adopt permission systems to protect system integrity and user privacy. In this work, we propose INSPIRED, an intention-aware dynamic mediation system for mobile operating systems with privacy preserving capability. When a security or privacy sensitive behavior is triggered, INSPIRED automatically infers the underlying program intention by examining its runtime environme...
Android security has been built upon a permission-based mechanism which restricts accesses of third-party Android applications to critical resources on an Android device. The user must accept the set of permissions an application requires, before proceeding the installation. This process aims to inform the users of the risk of installing and using an application on their device; but most often,...
E-learning is becoming increasingly prominent in higher education, with universities increasing provision and more students signing up. This paper examines factors that predict students' intention to adopt e-learning at the Egyptian University of Mansourra. Understanding the nature of these factors may assist Egyptian universities in promoting the use of information and communication technology...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید