• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 6,889
Next 10 →

Matlab user’s guide

by Sunsoft Inc , 2005
"... This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Portio ..."
Abstract - Cited by 535 (0 self) - Add to MetaCart
-party software, including font technology in this product, is protected by copyright and licensed from Sun’s suppliers. RESTRICTED RIGHTS: Use, duplication, or disclosure by the U.S. Government is subject to restrictions of FAR 52.227-14(g)(2)(6/87) and FAR 52.227-19(6/87), or DFAR 252.227-7015(b)(6/95) and DFAR

Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,

by ] Richard Hackman , Grec R Oldham , 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract - Cited by 622 (2 self) - Add to MetaCart
under government sponsorship are encouraged to express their own judgment freely, this report does not necessarily represent the official opinion or policy of the government. redesign are not fully adequate to meet the problems encountered in their application. Especially troublesome is the paucity

Role-Based Access Control

by David Ferraiolo, Richard Kuhn - In 15th NIST-NCSC National Computer Security Conference , 1992
"... While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of a ..."
Abstract - Cited by 477 (6 self) - Add to MetaCart
While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method

A-morphous morphology

by Stephen R. Anderson, D. Meyer, D. Platt, D. Ridley , 1992
"... In the early years of the development of a theory of generative grammar (roughly 1955 through the early 1970s), a striking difference between the research problems that characterized the emerging field and those that had occupied its predecessors was the precipitous decline of the study of morpholog ..."
Abstract - Cited by 444 (9 self) - Add to MetaCart
of morphology. The principles of word structure can be divided roughly between those that govern the distribution of "morphemes " or subconstituents of a word and those that govern the variations in shape shown by these elements; and early developments in phonology and syntax left little if any

RMM: A Methodology for Structured Hypermedia Design

by Tomás Isakowitz, Edward A. Stohr, P. Balasubramanian , 1995
"... Hypermedia application design differs from other software design in that it involves navigation as well as user-interface and information processing issues. We present the Relationship Management Data model (RMDM) and the Relationship Management (RMM) methodology for the design and development of hy ..."
Abstract - Cited by 387 (2 self) - Add to MetaCart
of the methodology. Introduction Hypermedia development, especially on a commercial scale, often involves teams of developers who need to be managed and coordinated over an extended period of time. Formal systems development and project management techniques are needed to ensure that the hypermedia product meets

Support Vector Machines for Classification and Regression

by Steve R. Gunn - UNIVERSITY OF SOUTHAMPTON, TECHNICAL REPORT , 1998
"... The problem of empirical data modelling is germane to many engineering applications. In empirical data modelling a process of induction is used to build up a model of the system, from which it is hoped to deduce responses of the system that have yet to be observed. Ultimately the quantity and qualit ..."
Abstract - Cited by 357 (5 self) - Add to MetaCart
on the training data. It is this difference which equips SVM with a greater ability to generalise, which is the goal in statistical learning. SVMs were developed to solve the classification problem, but recently they have been extended to the domain of regression problems (Vapnik et al., 1997). In the literature

Capability Maturity Model . . .

by Mark C. Paulk, Mark C. Paulk, Bill Curtis, Bill Curtis, Mary Beth Chrissis, Mary Beth Chrissis, Charles V. Weber, Charles V. Weber, Thomas R. Miller, Lt Col , 1993
"... (maximum 200 words) 14. SUBJECT TERMS 15. NUMBER OF PAGES 16. PRICE CODE 17. SECURITY CLASSIFICATION OF REPORT UNCLASSIFIED 18. SECURITY CLASSIFICATION OF THIS PAGE UNCLASSIFIED 19. SECURITY CLASSIFICATION OF ABSTRACT UNCLASSIFIED 20. LIMITATION OF ABSTRACT UL NSN 7540-01-280-5500 Standard Form 298 ..."
Abstract - Cited by 253 (5 self) - Add to MetaCart
(Rev. 2-89) Prescribed by ANSI Std. Z39-18 298-102 Capability Maturity Model SM for Software, Version 1.1 Mark C. Paulk, Bill Curtis, Mary Beth Chrissis, Charles V. Weber In November 1986, the Software Engineering Institute (SEI), with assistance from the Mitre Corporation, began developing a process

Governance

by unknown authors , 2012
"... This policy Manual has been developed to provide a convenient resource for individuals interested in the operation of the Wisconsin Technical College System Board (WTCSB). The Policy Manual contains all WTCSB policies currently in effect. Policy is formally adopted by the WTCSB at regular meetings a ..."
Abstract - Add to MetaCart
This policy Manual has been developed to provide a convenient resource for individuals interested in the operation of the Wisconsin Technical College System Board (WTCSB). The Policy Manual contains all WTCSB policies currently in effect. Policy is formally adopted by the WTCSB at regular meetings

Capitals and Capabilities: A Framework for Analyzing Peasant Viability, Rural Livelihoods and Poverty

by Anthony Bebbington - World Development , 1990
"... Summary. — On the basis of themes emerging in current debates on rural development in Latin America, this paper develops an analytical framework for analyzing rural livelihoods in terms of their sustainability and their implications for rural poverty. The framework argues that our analyses of rural ..."
Abstract - Cited by 211 (1 self) - Add to MetaCart
Summary. — On the basis of themes emerging in current debates on rural development in Latin America, this paper develops an analytical framework for analyzing rural livelihoods in terms of their sustainability and their implications for rural poverty. The framework argues that our analyses of rural

Marriage Market, Divorce Legislation, and Household Labor Supply

by Bernard Fortin, Guy Lacroix, et al. - JOURNAL OF POLITICAL ECONOMY , 2002
"... This paper provides a theoretical framework for analyzing the impact of the marriage market and divorce legislation on household labor supply. In our approach, the sex ratio in the marriage market and the rules governing divorce are examples of “distribution factors.” These factors are defined as va ..."
Abstract - Cited by 209 (8 self) - Add to MetaCart
as variables that affect the household members’ bargaining position but not preferences or the joint budget set. We extend the collective labor supply model developed by Chiappori to allow for distribution factors. We show that our model imposes new restrictions on the labor supply functions and eases
Next 10 →
Results 1 - 10 of 6,889
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University