Results 1 - 10
of
1,832
Middle
, 1997
"... Environstratigraphy is proposed to produce a direct stratigraphic correlation for the Middle Triassic sequences of entirely different lithologic and palaeontologic compositions in various palaeogeographic environmental gradients (facies) of southern Guizhou. As environstratigraphy is based on enviro ..."
Abstract
- Add to MetaCart
Environstratigraphy is proposed to produce a direct stratigraphic correlation for the Middle Triassic sequences of entirely different lithologic and palaeontologic compositions in various palaeogeographic environmental gradients (facies) of southern Guizhou. As environstratigraphy is based
Behavioral theories and the neurophysiology of reward,
- Annu. Rev. Psychol.
, 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract
-
Cited by 187 (0 self)
- Add to MetaCart
-bodied, dark ale whose taste alone is a reward. Changing the scenery again, you are in the middle of a Saturday morning market in a small town in southern France and run into a nicely arranged stand of rosé and red wines. Knowing the presumably delicious contents of the differently priced bottles to varying
Case Alternations and the Icelandic Passive and Middle
- In Passives and Impersonals in European Languages, ed. Satu Manninen, Diane Nelson, Katrin Hiietam, Elsi Kaiser, and Virve Vihman
, 2006
"... The main question to be addressed in this paper is, why is accusative case system-atically lost in passives (as illustrated in (1)), while dative case is retained, equally systematically (as illustrated in (2))? (1) a. Stormurinn ..."
Abstract
-
Cited by 5 (0 self)
- Add to MetaCart
The main question to be addressed in this paper is, why is accusative case system-atically lost in passives (as illustrated in (1)), while dative case is retained, equally systematically (as illustrated in (2))? (1) a. Stormurinn
Why do some firms give stock options to all employees: An empirical examination of alternative theories
, 2003
"... Many firms issue stock options to all employees. We consider three potential economic justifications for this practice: providing incentives to employees, inducing employees to sort, and helping firms retain employees. We gather data on firms’ stock option grants to middle managers from three distin ..."
Abstract
-
Cited by 115 (8 self)
- Add to MetaCart
Many firms issue stock options to all employees. We consider three potential economic justifications for this practice: providing incentives to employees, inducing employees to sort, and helping firms retain employees. We gather data on firms’ stock option grants to middle managers from three
Alternative Scheduling in the Middle School: Considering Circadian Rhythms.
, 2011
"... Alternative Scheduling in the Middle School: Considering Circadian Rhythms by ..."
Abstract
- Add to MetaCart
Alternative Scheduling in the Middle School: Considering Circadian Rhythms by
The polymorphism of verbs exhibiting middle transitive alternations in English
, 2000
"... reference cannot be specific. More specifically the middle variant of the alternation exhibits the following two basic characteristics: 0 We would like to thank James Pustejovsky and Maya Arad for their helpful comments and suggestions. All responsability for errors are of course our own. 1 (a) ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
reference cannot be specific. More specifically the middle variant of the alternation exhibits the following two basic characteristics: 0 We would like to thank James Pustejovsky and Maya Arad for their helpful comments and suggestions. All responsability for errors are of course our own. 1 (a
Domains and facets: Hierarchical personality assessment using the Revised NEO Personality Inventory
- Journal of Personality Assessment
, 1995
"... Personality traits are organized hierarchically, with narrow, specific traits com-bining to define broad, global factors. The Revised NEO Personality Inventory (NEO-PI-R; Costa & McCrae, 1992c) assesses personality at bo1.h levels, with six specific facet scales in each of five broad domains. Th ..."
Abstract
-
Cited by 141 (2 self)
- Add to MetaCart
. This article describes conceptual issues in specifying facets of a domain and reports evidence on the validity of NEO-PI-R facet scales. Facet analysis-the interpretation of a scale in terms of the specific facets with which it correlates-is illustrated using alternative measures of the five-factor model
Middle East
"... The Dead Sea continues to shrink with an annual drop of over one meter in its sea level paving a road to a new reality; the environmental consequences of this phenomenon are clear, most notably, the significant numbers of sinkholes that have appeared on the Dead Sea shores. While the sinkholes probl ..."
Abstract
- Add to MetaCart
been studied in the past decades, but so far no solution has been implemented. At the end of the day, it seems that out of several alternatives, a seawater conveyance to the Dead Sea – such as the Mediterranean Dead Sea project – is one of the major feasible options. Keywords:
Regular expression pattern matching for XML
, 2003
"... We propose regular expression pattern matching as a core feature of programming languages for manipulating XML. We extend conventional pattern-matching facilities (as in ML) with regular expression operators such as repetition (*), alternation (|), etc., that can match arbitrarily long sequences of ..."
Abstract
-
Cited by 114 (8 self)
- Add to MetaCart
We propose regular expression pattern matching as a core feature of programming languages for manipulating XML. We extend conventional pattern-matching facilities (as in ML) with regular expression operators such as repetition (*), alternation (|), etc., that can match arbitrarily long sequences
Loud and clear: Human-verifiable authentication based on audio
- In ICDCS ’06: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
, 2006
"... Authentication of communication channels between devices that lack any previous association is an challenging problem. It has been considered in many contexts and in various flavors, most recently, by McCune et al., where human-assisted device authentication is achieved through the use of photo came ..."
Abstract
-
Cited by 118 (6 self)
- Add to MetaCart
cameras (present in some cellphones) and 2-dimensional barcodes. Their proposed Seeing-is-Believing system allows users with devices equipped with cameras to use the visual channel for authentication of unfamiliar devices, so as to defeat man-inthe-middle attacks. In this paper, we investigate
Results 1 - 10
of
1,832