Results 1 - 10
of
258
Upper Bounds on the Lifetime of Sensor Networks
, 2001
"... In this paper, we ask a fundamental question concerning the limits of energy e#ciency of sensor networks - What is the upper bound on the lifetime of a sensor network that collects data from a specified region using a certain number of energy-constrained nodes? The answer to this question is valuabl ..."
Abstract
-
Cited by 198 (4 self)
- Add to MetaCart
In this paper, we ask a fundamental question concerning the limits of energy e#ciency of sensor networks - What is the upper bound on the lifetime of a sensor network that collects data from a specified region using a certain number of energy-constrained nodes? The answer to this question
Banks as Liquidity Providers: An Explanation for the Co-Existence of Lending and Deposit-Taking
- Journal of Finance
, 2002
"... What ties together the traditional commercial banking activities of deposittaking and lending? We argue that since banks often lend via commitments, their lending and deposit-taking may be two manifestations of one primitive function: the provision of liquidity on demand. There will be synergies bet ..."
Abstract
-
Cited by 228 (14 self)
- Add to MetaCart
variety of data to test the model empirically. WHAT ARE THE DEFINING CHARACTERISTICS of a bank? Both the legal definition in the United States and the standard answer from economists is that commercial banks are institutions that engage in two distinct types of activities, one on each side of the balance
Self-determination and persistence in a real-life setting: Toward a motivational model of high school dropout.
- Journal of Personality and Social Psychology,
, 1997
"... The purpose of this study was to propose and test a motivational model of high school dropout. The model posits that teachers, parents, and the school administration's behaviors toward students influence students' perceptions of competence and autonomy. The less autonomy supportive the so ..."
Abstract
-
Cited by 183 (19 self)
- Add to MetaCart
students. Students were told that additional information would be gathered later on, and so it was important that they write their student identification numbers on the questionnaire. The experimenter also explained the types of questions that students would be asked to answer and provided examples
Incomplete information and certain answers in general data models
- In PODS’11
"... While incomplete information is ubiquitous in all data models – especially in applications involving data translation or integration – our understanding of it is still not completely satisfactory. For example, even such a basic notion as certain answers for XML queries was only introduced recently, ..."
Abstract
-
Cited by 15 (9 self)
- Add to MetaCart
While incomplete information is ubiquitous in all data models – especially in applications involving data translation or integration – our understanding of it is still not completely satisfactory. For example, even such a basic notion as certain answers for XML queries was only introduced recently
An Application of Lexical Semantics Annotation to Question-Answering in e-Farming
"... In this poster we present an approach to responding to complex questions in the agriculture domain, from specifications given by experts. We present in particular a semantic annotation procedure that would allow us to define accurate and domain dedicated forms of lexical semantics inference, in orde ..."
Abstract
- Add to MetaCart
, in order to be able to match non factoid questions (i.e. questions whose response is a significant text portion) with documents on a large scale. This project is designed to help farmers to get advices via question answering on SMS in order to improve rice farming. 1 Challenges and Goals Question answering
First steps in programming: A rationale for attention investment models.
- In Proc. HCC, IEEE
, 2002
"... Abstract Research into the cognitive aspects of programming originated in the study of professional programmers (whether experts or students). Even "end-user" programmers What is Programming? Goodell's excellent website devoted to end user programming Programming is in fact seld ..."
Abstract
-
Cited by 110 (16 self)
- Add to MetaCart
of this paper is that when people say they are programming, we should not question whether this activity is genuine programming, but instead analyse their experience in order to understand the general nature of programming activity. Cognitive features of programming What are the cognitive implications
Sensing, Understanding, and Shaping Social Behavior
"... An ability to understand social systems through the aid of computational tools is central to the emerging field of Computational Social Systems. Such understanding can answer epistemological questions on human behavior in a data-driven manner, and provide prescriptive guidelines for persuading human ..."
Abstract
- Add to MetaCart
An ability to understand social systems through the aid of computational tools is central to the emerging field of Computational Social Systems. Such understanding can answer epistemological questions on human behavior in a data-driven manner, and provide prescriptive guidelines for persuading
Bayesian Approaches to Multi-Sensor Data Fusion
, 1999
"... I hereby declare that my thesis is not substantially the same as any that I have submitted for a degree or diploma or other qualification at any other University. I further state that no part of my thesis has already been or is being concurrently submitted for any such degree, diploma or other quali ..."
Abstract
- Add to MetaCart
advice, support and constant willingness to help during the past year. I am also indebted to Dr. Christophe Andrieu and Dr. Arnaud Doucet for their endless support, encouragement and kindness in answering the questions; from them, through the numerous fruitful discussions and help-ful comments, I
Cloak and Swagger: Understanding Data Sensitivity Through the Lens of User Anonymity
"... Abstract—Most of what we understand about data sensitivity is through user self-report (e.g., surveys); this paper is the first to use behavioral data to determine content sensitivity, via the clues that users give as to what information they consider private or sensitive through their use of privac ..."
Abstract
- Add to MetaCart
Abstract—Most of what we understand about data sensitivity is through user self-report (e.g., surveys); this paper is the first to use behavioral data to determine content sensitivity, via the clues that users give as to what information they consider private or sensitive through their use
Cloak and Swagger: Understanding Data Sensitivity Through the Lens of User Anonymity
"... Abstract—Most of what we understand about data sensitivity is through user self-report (e.g., surveys); this paper is the first to use behavioral data to determine content sensitivity, via the clues that users give as to what information they consider private or sensitive through their use of privac ..."
Abstract
- Add to MetaCart
Abstract—Most of what we understand about data sensitivity is through user self-report (e.g., surveys); this paper is the first to use behavioral data to determine content sensitivity, via the clues that users give as to what information they consider private or sensitive through their use
Results 1 - 10
of
258