• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,290,002
Next 10 →

Understanding Intelligence

by Rolf Pfeifer, Gabriel Gomez , 1999
"... with the real world – design principles for ..."
Abstract - Cited by 576 (23 self) - Add to MetaCart
with the real world – design principles for

Those who understand: Knowledge growth in teaching. Educational Researcher

by Lee S. Shulman , 1986
"... "He who can, does. He who cannot, teaches. “ 1 don't know in what fit of pique George Bernard Shaw wrote that infamous aphorism, words that have plagued members of the teach-ing profession for nearly a century. They are found in "Maxims for Revolutionists, " an appendix to his pl ..."
Abstract - Cited by 1272 (1 self) - Add to MetaCart
"He who can, does. He who cannot, teaches. “ 1 don't know in what fit of pique George Bernard Shaw wrote that infamous aphorism, words that have plagued members of the teach-ing profession for nearly a century. They are found in "Maxims for Revolutionists, " an appendix to his

Eliciting self-explanations improves understanding

by Michelene T. H. Chi, Nicholas De Leeuw, Mei-hung Chiu, Christian Lavancher - Cognitive Science , 1994
"... Learning involves the integration of new information into existing knowledge. Generoting explanations to oneself (self-explaining) facilitates that integration process. Previously, self-explanation has been shown to improve the acquisition of problem-solving skills when studying worked-out examples. ..."
Abstract - Cited by 556 (22 self) - Add to MetaCart
implicitly stated. Understanding was further captured by a mental model onolysis of the self-explanation protocols. High explainers all achieved the correct mental model of the circulatory system, whereas many of the unprompted students as well as the low explainers did not. Three processing characteristics

Human domination of Earth’s ecosystems

by Peter M. Vitousek, Harold A. Mooney, Jane Lubchenco, Jerry M. Melillo - Science , 1997
"... Human alteration of Earth is substantial and growing. Between one-third and one-half interact with the atmosphere, with aquatic of the land surface has been transformed by human action; the carbon dioxide con- systems, and with surrounding land. Morecentration in the atmosphere has increased by near ..."
Abstract - Cited by 551 (6 self) - Add to MetaCart
Human alteration of Earth is substantial and growing. Between one-third and one-half interact with the atmosphere, with aquatic of the land surface has been transformed by human action; the carbon dioxide con- systems, and with surrounding land. Morecentration in the atmosphere has increased by nearly 30 percent since the beginning of over, land trallsformation interacts strongly the Industrial Revolution; more atmospheric nitrogen is fixed by humanity than by all with most other components of global ennatural terrestrial sources combined; more than half of all accessible surface fresh water rironmental change. is put to use by humanity; and about one-quarter of the bird species on Earth have been The measurement of land transformadriven to extinction. By these and other standards, it is clear that we live on a human- tion on a global scale is challenging; changdominated planet. es can be measured more or less straightforwardly at a eiven site, but it is difficult to aggregate these changes regionally and globallv. In contrast to analvses of human al-A11 organisms modify their environment, reasonably well quantified; all are ongoing, teraiion of the global carbon cycle, we and humans are no exceotion. As the hu- These relativelv well-documented changes cannot install instruments on a tro~ical man population has and the power of in turn entrail; further alterations to;he mountain to collect evidence of land tians-technology has expanded, the scope and f~~nctioning of the Earth system, most no- formation. Remote sensing is a most useful

Understanding Normal and Impaired Word Reading: Computational Principles in Quasi-Regular Domains

by David C. Plaut , James L. McClelland, Mark S. Seidenberg, Karalyn Patterson - PSYCHOLOGICAL REVIEW , 1996
"... We develop a connectionist approach to processing in quasi-regular domains, as exemplified by English word reading. A consideration of the shortcomings of a previous implementation (Seidenberg & McClelland, 1989, Psych. Rev.) in reading nonwords leads to the development of orthographic and phono ..."
Abstract - Cited by 583 (94 self) - Add to MetaCart
We develop a connectionist approach to processing in quasi-regular domains, as exemplified by English word reading. A consideration of the shortcomings of a previous implementation (Seidenberg & McClelland, 1989, Psych. Rev.) in reading nonwords leads to the development of orthographic and phonological representations that capture better the relevant structure among the written and spoken forms of words. In a number of simulation experiments, networks using the new representations learn to read both regular and exception words, including low-frequency exception words, and yet are still able to read pronounceable nonwords as well as skilled readers. A mathematical analysis of the effects of word frequency and spelling-sound consistency in a related but simpler system serves to clarify the close relationship of these factors in influencing naming latencies. These insights are verified in subsequent simulations, including an attractor network that reproduces the naming latency data directly in its time to settle on a response. Further analyses of the network's ability to reproduce data on impaired reading in surface dyslexia support a view of the reading system that incorporates a graded division-of-labor between semantic and phonological processes. Such a view is consistent with the more general Seidenberg and McClelland framework and has some similarities with---but also important differences from---the standard dual-route account.

Understanding Code Mobility

by Alfonso Fuggetta, Gian Pietro Picco, Giovanni Vigna - IEEE COMPUTER SCIENCE PRESS , 1998
"... The technologies, architectures, and methodologies traditionally used to develop distributed applications exhibit a variety of limitations and drawbacks when applied to large scale distributed settings (e.g., the Internet). In particular, they fail in providing the desired degree of configurability, ..."
Abstract - Cited by 549 (34 self) - Add to MetaCart
, code mobility is generating a growing body of scientific literature and industrial developments. Nevertheless, the field is still characterized by the lack of a sound and comprehensive body of concepts and terms. As a consequence, it is rather difficult to understand, assess, and compare the existing

An Essay Concerning Human Understanding

by John Locke , 1921
"... God, having designed man for a sociable creature, made him not only with an inclination and under a necessity to have fellowship with those of his own kind, but furnished him also with language, which was to be the great instrument and common tie of society. ..."
Abstract - Cited by 790 (2 self) - Add to MetaCart
God, having designed man for a sociable creature, made him not only with an inclination and under a necessity to have fellowship with those of his own kind, but furnished him also with language, which was to be the great instrument and common tie of society.

Formalising trust as a computational concept

by Stephen Paul Marsh , 1994
"... Trust is a judgement of unquestionable utility — as humans we use it every day of our lives. However, trust has suffered from an imperfect understanding, a plethora of definitions, and informal use in the literature and in everyday life. It is common to say “I trust you, ” but what does that mean? T ..."
Abstract - Cited by 518 (5 self) - Add to MetaCart
Trust is a judgement of unquestionable utility — as humans we use it every day of our lives. However, trust has suffered from an imperfect understanding, a plethora of definitions, and informal use in the literature and in everyday life. It is common to say “I trust you, ” but what does that mean

The Protection of Information in Computer Systems

by Jerome H. Saltzer, Michael D. Schroeder , 1975
"... This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main sections ..."
Abstract - Cited by 815 (2 self) - Add to MetaCart
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures--whether hardware or software--that are necessary to support information protection. The paper develops in three main

Human-Computer Interaction

by Alan Dix, Sandra Cairncross, Gilbert Cockton, Russell Beale, Robert St Amant, Martha Hause , 1993
"... www.bcs-hci.org.uk Find out what happened at HCI2004 Interacting with … music aeroplanes petrol pumps Published by the British HCI Group • ISSN 1351-119X 1 ..."
Abstract - Cited by 582 (18 self) - Add to MetaCart
www.bcs-hci.org.uk Find out what happened at HCI2004 Interacting with … music aeroplanes petrol pumps Published by the British HCI Group • ISSN 1351-119X 1
Next 10 →
Results 1 - 10 of 1,290,002
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University