• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,933
Next 10 →

Illusion and well-being: A social psychological perspective on mental health.

by Shelley E Taylor , Jonathon D Brown , Nancy Cantor , Edward Emery , Susan Fiske , Tony Green-Wald , Connie Hammen , Darrin Lehman , Chuck Mcclintock , Dick Nisbett , Lee Ross , Bill Swann , Joanne - Psychological Bulletin, , 1988
"... Many prominent theorists have argued that accurate perceptions of the self, the world, and the future are essential for mental health. Yet considerable research evidence suggests that overly positive selfevaluations, exaggerated perceptions of control or mastery, and unrealistic optimism are charac ..."
Abstract - Cited by 988 (20 self) - Add to MetaCart
Grant CA 36409, and Research Scientist Development Award MH 00311 from the National Institute of Mental Health to Shelley E. Taylor. Jonathon D. Brown was supported by a University of California, Los Angeles, Chancellor's fellowship and by a Southern Methodist University new-faculty seed grant. We

The Norwegian Dependency Treebank

by Per Erik Solberg , Arne Skjaerholt , Lilja Øvrelid , Kristin Hagen , Janne Bondi Johannessen , Språkbanken - In LREC. Reut Tsarfaty, Joakim Nivre, and Evelina Ndersson , 2014
"... Abstract The Norwegian Dependency Treebank is a new syntactic treebank for Norwegian Bokmål and Nynorsk with manual syntactic and morphological annotation, developed at the National Library of Norway in collaboration with the University of Oslo. It is the first publically available treebank for Nor ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract The Norwegian Dependency Treebank is a new syntactic treebank for Norwegian Bokmål and Nynorsk with manual syntactic and morphological annotation, developed at the National Library of Norway in collaboration with the University of Oslo. It is the first publically available treebank

A Self-Configuring RED Gateway

by Wu-Chang Feng, Dilip D. Kandlur, Debanjan Saha, Kang G. Shin , 1999
"... The congestion control mechanisms used in TCP have been the focus of numerous studies and have undergone a number of enhancements. However, even with these enhancements, TCP connections still experience alarmingly high loss rates, especially during times of congestion. The IETF has addressed this pr ..."
Abstract - Cited by 173 (11 self) - Add to MetaCart
The congestion control mechanisms used in TCP have been the focus of numerous studies and have undergone a number of enhancements. However, even with these enhancements, TCP connections still experience alarmingly high loss rates, especially during times of congestion. The IETF has addressed

Self-determination and persistence in a real-life setting: Toward a motivational model of high school dropout.

by Robert J Vallerand , Michelle S Fbrtier , Frederic Guay - Journal of Personality and Social Psychology, , 1997
"... The purpose of this study was to propose and test a motivational model of high school dropout. The model posits that teachers, parents, and the school administration's behaviors toward students influence students' perceptions of competence and autonomy. The less autonomy supportive the so ..."
Abstract - Cited by 183 (19 self) - Add to MetaCart
The purpose of this study was to propose and test a motivational model of high school dropout. The model posits that teachers, parents, and the school administration's behaviors toward students influence students' perceptions of competence and autonomy. The less autonomy supportive

Syntactic Annotation Guidelines for the Quranic Arabic Dependency Treebank

by Kais Dukes, Eric Atwell, Abdul-baquee M. Sharaf
"... The Quranic Arabic Dependency Treebank (QADT) is part of the Quranic Arabic Corpus (http://corpus.quran.com), an online linguistic resource organized by the University of Leeds, and developed through online collaborative annotation. The website has become a popular study resource for Arabic and the ..."
Abstract - Cited by 6 (1 self) - Add to MetaCart
The Quranic Arabic Dependency Treebank (QADT) is part of the Quranic Arabic Corpus (http://corpus.quran.com), an online linguistic resource organized by the University of Leeds, and developed through online collaborative annotation. The website has become a popular study resource for Arabic

Behavioral theories and the neurophysiology of reward,

by Wolfram Schultz - Annu. Rev. Psychol. , 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract - Cited by 187 (0 self) - Add to MetaCart
, without attempting to provide a complete account of all the studies done. We focus on the activity of single neurons studied by neurophysiological techniques in behaving animals, in particular monkeys, and emphasize the formative role of behavioral theories, such as animal learning theory

Universal Dependency Annotation for Multilingual Parsing

by Ryan Mcdonald, Joakim Nivre, Yvonne Quirmbach-brundage, Yoav Goldberg, Dipanjan Das, Kuzman Ganchev, Keith Hall, Slav Petrov, Hao Zhang, Oscar Täckström, Claudia Bedini, Núria Bertomeu, Castelló Jungmee Lee
"... We present a new collection of treebanks with homogeneous syntactic dependency annotation for six languages: German, English, Swedish, Spanish, French and Korean. To show the usefulness of such a resource, we present a case study of crosslingual transfer parsing with more reliable evaluation than ha ..."
Abstract - Cited by 17 (1 self) - Add to MetaCart
We present a new collection of treebanks with homogeneous syntactic dependency annotation for six languages: German, English, Swedish, Spanish, French and Korean. To show the usefulness of such a resource, we present a case study of crosslingual transfer parsing with more reliable evaluation than

Integrating decision procedures into heuristic theorem provers: A case study of linear arithmetic

by Robert S. Boyer, J Strother Moore - Machine Intelligence , 1988
"... We discuss the problem of incorporating into a heuristic theorem prover a decision procedure for a fragment of the logic. An obvious goal when incorporating such a procedure is to reduce the search space explored by the heuristic component of the system, as would be achieved by eliminating from the ..."
Abstract - Cited by 120 (10 self) - Add to MetaCart
strategic information back and forth between the two components. Finally, the efficiency of the decision procedure may be virtually irrelevant; the efficiency of the final system may depend most heavily on how easy it is to communicate between the two components. This paper is a case study of how we

Effect of temporal envelope smearing on speech reception.

by Rob Drullman , Joost M Festen , Reinier Plomp - International Journal of Bioelectromagnetism , 2011
"... The effect of smearing the temporal envelope on the speech-reception threshold (SRT) for sentences in noise and on phoneme identification was investigated for normal-hearing listeners. For this purpose, the speech signal was split up into a series of frequency bands (width of The ear's resolut ..."
Abstract - Cited by 145 (0 self) - Add to MetaCart
tests. As to phoneme perception, several investigators have studied the information contained in the temporal envelope for consonant recognition in cases of limited spectral cues. With noise stimuli modulated by the amplitude envelope of /aCa/syllables, Van Tasell et al. (1987) found poor

On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions

by Ran Canetti, Eyal Kushilevitz, Yehuda Lindell - Journal of Cryptology , 2003
"... Abstract. The recently proposed universally composable (UC) security framework, for analyzing security of cryptographic protocols, provides very strong security guarantees. In particular, a protocol proven secure in this framework is guaranteed to maintain its security even when deployed in arbitrar ..."
Abstract - Cited by 103 (18 self) - Add to MetaCart
in arbitrary multi-party, multi-protocol, multi-execution environments. Protocols for securely carrying out essentially any cryptographic task in a universally composable way exist, both in the case of an honest majority (in the plain model, i.e., without set-up assumptions) and in the case of no honest
Next 10 →
Results 1 - 10 of 3,933
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University