Results 1 - 10
of
750
EEGLAB: an open source toolbox for analysis of single-trial EEG dynamics including independent component analysis
- J. Neurosci. Methods
"... Abstract: We have developed a toolbox and graphic user interface, EEGLAB, running under the cross-platform MATLAB environment (The Mathworks, Inc.) for processing collections of single-trial and/or averaged EEG data of any number of channels. Available functions include EEG data, channel and event i ..."
Abstract
-
Cited by 886 (45 self)
- Add to MetaCart
and component cross-coherence supported by bootstrap statistical methods based on data resampling. EEGLAB functions are organized into three layers. Top-layer functions allow users to interact with the data through the graphic interface without needing to use MATLAB syntax. Menu options allow users to tune
A middle option for choices in the Continuous Opinions and Discrete Actions model
, 2009
"... Modeling the conditions for the emergence of extremism is a very important problem, with clear applications for describing the interaction among individuals. Traditional models either are not suited for the task, as in the case of discrete models, or, like Bounded Confidence models, are built with r ..."
Abstract
-
Cited by 1 (1 self)
- Add to MetaCart
of emergence of extremism will be addressed by introducing a middle discrete option in the CODA model, making it similar to a Potts model. Different scenarios for the third option will be discussed: when it is equivalent to withholding judgment, when it is a real third option and when it is a real, middle
Learning to Predict Where Humans Look
"... For many applications in graphics, design, and human computer interaction, it is essential to understand where humans look in a scene. Where eye tracking devices are not a viable option, models of saliency can be used to predict fixation locations. Most saliency approaches are based on bottom-up com ..."
Abstract
-
Cited by 211 (4 self)
- Add to MetaCart
For many applications in graphics, design, and human computer interaction, it is essential to understand where humans look in a scene. Where eye tracking devices are not a viable option, models of saliency can be used to predict fixation locations. Most saliency approaches are based on bottom
Behavioral theories and the neurophysiology of reward,
- Annu. Rev. Psychol.
, 2006
"... ■ Abstract The functions of rewards are based primarily on their effects on behavior and are less directly governed by the physics and chemistry of input events as in sensory systems. Therefore, the investigation of neural mechanisms underlying reward functions requires behavioral theories that can ..."
Abstract
-
Cited by 187 (0 self)
- Add to MetaCart
-bodied, dark ale whose taste alone is a reward. Changing the scenery again, you are in the middle of a Saturday morning market in a small town in southern France and run into a nicely arranged stand of rosé and red wines. Knowing the presumably delicious contents of the differently priced bottles to varying
Why do some firms give stock options to all employees: An empirical examination of alternative theories
, 2003
"... Many firms issue stock options to all employees. We consider three potential economic justifications for this practice: providing incentives to employees, inducing employees to sort, and helping firms retain employees. We gather data on firms’ stock option grants to middle managers from three distin ..."
Abstract
-
Cited by 115 (8 self)
- Add to MetaCart
Many firms issue stock options to all employees. We consider three potential economic justifications for this practice: providing incentives to employees, inducing employees to sort, and helping firms retain employees. We gather data on firms’ stock option grants to middle managers from three
Middle Cerebral Artery Stenosis: Stenting Is One of the Options
"... The online version of this article, along with updated information and services, is located on the ..."
Abstract
- Add to MetaCart
The online version of this article, along with updated information and services, is located on the
Middle Cerebral Artery Stenosis: Stenting Is One of the Options No
"... The online version of this article, along with updated information and services, is located on the ..."
Abstract
- Add to MetaCart
The online version of this article, along with updated information and services, is located on the
Choices from identical options
- Psychological Science
, 1995
"... Abstract—Many of the decisions that people must make involve selections from arrays of identical options. The six studies presented explored people's pref-erences in two contexts: choosing one item from rows of identical items and choosing a route from a series of identi-cal routes. The first t ..."
Abstract
-
Cited by 31 (0 self)
- Add to MetaCart
Abstract—Many of the decisions that people must make involve selections from arrays of identical options. The six studies presented explored people's pref-erences in two contexts: choosing one item from rows of identical items and choosing a route from a series of identi-cal routes. The first
Middle East
"... The Dead Sea continues to shrink with an annual drop of over one meter in its sea level paving a road to a new reality; the environmental consequences of this phenomenon are clear, most notably, the significant numbers of sinkholes that have appeared on the Dead Sea shores. While the sinkholes probl ..."
Abstract
- Add to MetaCart
for the research to save the Dead Sea. These cases have highlighted the devastating environmental impacts of drying seas, causing salt storms and drop in ground water levels, thus endangering human lives. The case of saving the Dead Sea has not yet been lost. The potential options to mitigate this catastrophe have
Man-in-the-Middle in Tunnelled Authentication Protocols
- In 11th Security Protocols Workshop
, 2002
"... Recently new protocols have been proposed in the IETF for protecting remote client authentication protocols by running them within a secure tunnel. Examples of such protocols are PIC, PEAP and EAP-TTLS. One goal of these new protocols is to enable the migration from legacy client authentication prot ..."
Abstract
-
Cited by 50 (0 self)
- Add to MetaCart
as an option in PEAP and EAP-TTLS, but is not mandated. Naturally, the PIC protocol does not even o er this option, because the goal of PIC is to obtain credentials that can be used for client authentication.
Results 1 - 10
of
750