• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,010
Next 10 →

Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,

by ] Richard Hackman , Grec R Oldham , 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract - Cited by 622 (2 self) - Add to MetaCart
A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally

Loopy belief propagation for approximate inference: An empirical study. In:

by Kevin P Murphy , Yair Weiss , Michael I Jordan - Proceedings of Uncertainty in AI, , 1999
"... Abstract Recently, researchers have demonstrated that "loopy belief propagation" -the use of Pearl's polytree algorithm in a Bayesian network with loops -can perform well in the context of error-correcting codes. The most dramatic instance of this is the near Shannon-limit performanc ..."
Abstract - Cited by 676 (15 self) - Add to MetaCart
of the leaves were represented by a noisy-or: ? (Child= OIParents) = e-Bo-L; B,Paren t; where 110 represents the "leak" term. The QMR-DT network The QMR-DT is a bipartite network whose structure is the same as that shown in figure 2 but the size is much larger. There are approximately 600 diseases

Hypothesis Testing and Multiplicative Interaction Terms’,

by Bear F+ Braumoeller - International Organization , 2004
"... Abstract When a statistical equation incorporates a multiplicative term in an attempt to model interaction effects, the statistical significance of the lower-order coefficients is largely useless for the typical purposes of hypothesis testing+ This fact remains largely unappreciated in political sc ..."
Abstract - Cited by 91 (0 self) - Add to MetaCart
whether or not an interactive relationship between X 1 and X 2 can be said to exist+ The functional form may be something considerably more complex than basic multivariate regression, but the goal is the same+ Researchers make claims of the following nature: • b 1 is statistically significant; therefore

Hypothesis-Testing Processes in Social Interaction

by Mark Snyder, William B. Swann - Journal of Personality and Social Psychology , 1978
"... This research is concerned with the processes by which individuals use social interaction to actively test hypotheses about other people. In four separate empirical investigations, female participants were provided with hypotheses about the personal attributes of other individuals ("targets ..."
Abstract - Cited by 77 (2 self) - Add to MetaCart
of the psychological processes believed to underlie and generate both the preferential search for hypothesis-confirming behavioral evidence and the interpersonal consequences of hypothesis-testing activities is presented. In the course of social relationships, individuals often attempt to make judgments about

A critical role for the right fronto-insular cortex in switching between central-executive and default-mode networks.

by Devarajan Sridharan , † ‡ , Daniel J Levitin , Vinod Menon - Proc Natl Acad Sci USA , 2008
"... Cognitively demanding tasks that evoke activation in the brain's central-executive network (CEN) have been consistently shown to evoke decreased activation (deactivation) in the default-mode network (DMN). The neural mechanisms underlying this switch between activation and deactivation of larg ..."
Abstract - Cited by 178 (1 self) - Add to MetaCart
events in the environment. Recent research suggests that the human brain is intrinsically organized into distinct functional networks that support these processes (1-4). Analysis of resting-state functional connectivity, using both model-based and model-free approaches, has suggested the existence

Whom You Know Matters: Venture Capital Networks and Investment Performance,

by Yael Hochberg , Alexander Ljungqvist , Yang Lu , Steve Drucker , Jan Eberly , Eric Green , Yaniv Grinstein , Josh Lerner , Laura Lindsey , Max Maksimovic , Roni Michaely , Maureen O'hara , Ludo Phalippou Mitch Petersen , Jesper Sorensen , Per Strömberg Morten Sorensen , Yael Hochberg , Johnson - Journal of Finance , 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract - Cited by 138 (8 self) - Add to MetaCart
.9% in "Non-high-technology," 9.2% in "Medical, health, life sciences," 15.5% in "Communications and media," 6% in "Biotechnology," and 4.3% in "Semiconductors, other electronics." B. Measuring Fund Performance Ideally, we would measure fund performance

Marital processes predictive of later dissolution: Behavior, physiology, and health

by John M. Gottman, Robert W. Levenson - Journal of Personality and Social Psychology , 1992
"... Seventy-three married couples were studied in 1983 and 1987. To identify marital processes associated with dissolution, a balance theory of marriage was used to generate 1 variable for dividing couples into regulated and nonregulated groups. For studying the precursors of divorce, a "cascade &q ..."
Abstract - Cited by 119 (7 self) - Add to MetaCart
;cascade " model of marital dissolution, which forms a Guttman-like scale, received preliminary support. Compared with regulated couples, nonregulated couples had (a) marital problems rated as more severe (Time 1); (b) lower marital satisfaction (Time 1 and Time 2); (c) poorer health (Time 2); (d) smaller

Generation

by Michael A. Spall
"... of strong mesoscale eddies by weak ocean gyres ..."
Abstract - Add to MetaCart
of strong mesoscale eddies by weak ocean gyres

Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles). In: Dwork

by Xavier Boyen , Brent Waters - CRYPTO 2006. LNCS, , 2006
"... Abstract We present an identity-based cryptosystem that features fully anonymous ciphertexts and hierarchical key delegation. We give a proof of security in the standard model, based on the mild Decision Linear complexity assumption in bilinear groups. The system is efficient and practical, with sm ..."
Abstract - Cited by 119 (10 self) - Add to MetaCart
, the encryption algorithm proceeds as follows: ∈ G T × G 5+2 D . Encryption is very cheap with a bit of caching since the exponentiations bases never change. Decrypt(Pub, Pvk Id , CT) To decrypt a ciphertext CT, using (the decryption portion of) a private key Pvk (a) , k n,(b) ] n=0,...,1+D ] , the decryption

The Cognition Hypothesis, Task Design, and Adult Task-Based Language Learning

by Peter Robinson - Applied Linguistics , 1996
"... The Cognition Hypothesis of task-based language learning proposes that pedagogic tasks be sequenced for learners largely on the basis of increases in their cognitive complexity so as to increasingly approximate the demands of real-world target tasks. In this paper I describe a framework for operatio ..."
Abstract - Cited by 25 (2 self) - Add to MetaCart
for operationalizing this proposal that distinguishes between dimensions of tasks that can be manipulated to develop access to an existing L2 knowledge base (such as allowing planning time) and dimensions that can be manipulated to promote greater syntacticization and grammaticization of current interlanguage (such
Next 10 →
Results 1 - 10 of 3,010
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University