• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 202
Next 10 →

Self-determination and persistence in a real-life setting: Toward a motivational model of high school dropout.

by Robert J Vallerand , Michelle S Fbrtier , Frederic Guay - Journal of Personality and Social Psychology, , 1997
"... The purpose of this study was to propose and test a motivational model of high school dropout. The model posits that teachers, parents, and the school administration's behaviors toward students influence students' perceptions of competence and autonomy. The less autonomy supportive the so ..."
Abstract - Cited by 183 (19 self) - Add to MetaCart
on an earlier version of this article and Pierre Provencher for his help in collecting the data. Correspondence concerning this article should be addressed to Robert J. Vallerand, Laboratoire de Recherche sur le Comportement Social, Departement de Psychologie, University du Quebec a Montreal, C.P. 8888, Station

The Statistical Data Viewer

by Volker Nannen April, A Simple Experiment , 2003
"... This is the manual to the Statistical Data Viewer . The motivation for writing this application and an example of its actual use are discussed in my master's thesis [Nan03] on machine learning. If you simply want to get started and explore the application by yourself, read Section 2.3 of my ..."
Abstract - Add to MetaCart
This is the manual to the Statistical Data Viewer . The motivation for writing this application and an example of its actual use are discussed in my master's thesis [Nan03] on machine learning. If you simply want to get started and explore the application by yourself, read Section 2

Proof-Checking a Data Link Protocol

by F. W. Va, L. Helmink, L. Helmink, M. P. A. Sellink, M. P. A. Sellink, F.W. Vaandrager - Proceedings International Workshop TYPES'93 , 1994
"... A data link protocol developed and used by Philips Electronics is modeled and verified using I/O automata theory. Correctness is computer-checked with the Coq proof development system. AMS Subject Classification (1991): 03B15 [Mathematical logic and foundations]: Higher-order logic and type theor ..."
Abstract - Add to MetaCart
theory; 03B35 [Mathematical logic and foundations]: Mechanization of proofs and logical operations; 68Q22 [Computer science]: Parallel and distributed algorithms; 68Q60 [Computer science]: Specification and verification of programs. CR Subject Classification (1991): C.2.2 [Computer systems

Age-Incidence Data Support the Telomere Crisis

by Hypothesis Of Epithelial, Frieboes Brody, Hermann B. Frieboes, James P. Brody , 2005
"... Most human carcinomas exhibit telomere abnormalities early in the carcinogenesis process suggesting the crisis hypothesis: crisis caused by telomere shortening is the rate limiting step leading to human carcinomas. This hypothesis can be tested with age-incidence data. Epidemiological records of ..."
Abstract - Add to MetaCart
of the age at which each patient in a population develops carcinoma are known as age-incidence data; these provide a quantitative measure of human tumor initiation and dynamics. To test this hypothesis, we compared a mathematical model in which telomere loss is the rate limiting step during

Understanding Data Refinement Using Procedural Refinement

by Steven M. Kearns , 1990
"... : Data refinement is converting a program that uses one set of variables to an equally correct program that uses another set of variables, usually of different types. There have been a number of seemingly different mathematical definitions of data refinement. We present a unifying view of data refin ..."
Abstract - Add to MetaCart
: Data refinement is converting a program that uses one set of variables to an equally correct program that uses another set of variables, usually of different types. There have been a number of seemingly different mathematical definitions of data refinement. We present a unifying view of data

Machine utilizations achieved using balanced FMS production ratios in a simulated setting, Working Paper 486, Graduate

by Thomas J. Schriber, Kathryn E. Stecke , 1986
"... Stecke [21] has developed mathematical programming approaches for deter-mining, from a set of part type requirements, the production ratios (part types to be produced next, and their proportions) which maximize overall machine utiliza-tions by balancing machine workloads in a flexible manufacturing ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
Stecke [21] has developed mathematical programming approaches for deter-mining, from a set of part type requirements, the production ratios (part types to be produced next, and their proportions) which maximize overall machine utiliza-tions by balancing machine workloads in a flexible manufacturing

unknown title

by unknown authors , 2001
"... Abstract-- Approximately 43 % of the human genome is occupied by repetitive elements. Even more, around 51 % of the rice genome is occupied by repetitive elements. The analysis presented here indicates that repetitive elements in complete genomes may have been very important in the evolutionary geno ..."
Abstract - Add to MetaCart
gene classes regulated by similar mechanisms and accurately predict regulatory elements. Experiments are performed on several genomes including C. elegans, human chromosome 22, and Yeast. Index Terms-- database, data mining, complete genome, gene, transcription factor.

Perspective An Online Bioinformatics Curriculum

by David B. Searls
"... Abstract: Online learning initia-tives over the past decade have become increasingly comprehen-sive in their selection of courses and sophisticated in their presen-tation, culminating in the recent announcement of a number of consortium and startup activities that promise to make a university educat ..."
Abstract - Add to MetaCart
Abstract: Online learning initia-tives over the past decade have become increasingly comprehen-sive in their selection of courses and sophisticated in their presen-tation, culminating in the recent announcement of a number of consortium and startup activities that promise to make a university education on the internet, free of charge, a real possibility. At this pivotal moment it is appropriate to explore the potential for obtaining comprehensive bioinformatics training with currently existing free video resources. This article pre-sents such a bioinformatics curric-ulum in the form of a virtual course catalog, together with editorial commentary, and an assessment of strengths, weaknesses, and likely future directions for open online learning in this field. Online Learning Comes of Age Online academic ‘‘courseware’ ’ at the university level has now been available to the public for a decade, the earliest concerted effort having originated in 2002 with the Massachusetts Institute of Technology (MIT) and their OpenCour-seWare initiative

AND MATHEMATICAL ENGINEERING

by Madeleine Udell, Professor Lester Mackey , 2015
"... ii ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract not found

Finite element methods in probabilistic structural analysis: A selected review”.

by H Benaroya , M Rehak - Appl. Mech. Rew. , 1988
"... This review examines the field of structural analysis where finite element methods (FEMs) are used in a probabilistic setting. The finite element method is widely used, and its application in the field of structural analysis is universally accepted as an efficient numerical solution method. The ana ..."
Abstract - Cited by 30 (0 self) - Add to MetaCart
this review are simulation methods such as Monte Carlo and response surface, and methods that use FEM to solve deterministic equations (Fokker-Planck) governing probability densities. The essential conclusion is that the second moment methods are mathematically identical to the second order (except
Next 10 →
Results 1 - 10 of 202
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University