Results 1 - 10
of
23,637
Principles and Practice in Second Language Acquisition
, 1982
"... This is the original version of Principles and Practice, as published in 1982, with only minor changes. It is gratifying to point out that many of the predictions made in this book were confirmed by subsequent research, for example, the superiority of comprehensible-input based methods and sheltered ..."
Abstract
-
Cited by 775 (4 self)
- Add to MetaCart
best through comprehensible input (Krashen, 1989; 2003). I have changed my position on only one issue: At the end of Principles and Practice, I suggest the use of a form of deception- students may think they are acquiring vocabulary or learning subject matter, but unknown to them, they are acquiring
Preface to the Second Issue
"... The release date of the last yearly issue of AntiMatters — the second issue in the case of this first volume — is November 24th. On this day in 1926, Sri Aurobindo arrived at a turning point in his yoga.1 According to Sri Aurobindo, there is a highest mental plane, to which he gave the name “overmin ..."
Abstract
- Add to MetaCart
The release date of the last yearly issue of AntiMatters — the second issue in the case of this first volume — is November 24th. On this day in 1926, Sri Aurobindo arrived at a turning point in his yoga.1 According to Sri Aurobindo, there is a highest mental plane, to which he gave the name
What is a hidden Markov model?
, 2004
"... Often, problems in biological sequence analysis are just a matter of putting the right label on each residue. In gene identification, we want to label nucleotides as exons, introns, or intergenic sequence. In sequence alignment, we want to associate residues in a query sequence with ho-mologous resi ..."
Abstract
-
Cited by 1344 (8 self)
- Add to MetaCart
splice site consenses, codon bias, exon/intron length preferences, and open reading frame analysis all in one scoring system. How should all those parameters be set? How should different kinds of information be weighted? A second issue is being able to interpret results probabilistically. Finding a best
On Spectral Clustering: Analysis and an algorithm
- ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS
, 2001
"... Despite many empirical successes of spectral clustering methods -- algorithms that cluster points using eigenvectors of matrices derived from the distances between the points -- there are several unresolved issues. First, there is a wide variety of algorithms that use the eigenvectors in slightly ..."
Abstract
-
Cited by 1713 (13 self)
- Add to MetaCart
Despite many empirical successes of spectral clustering methods -- algorithms that cluster points using eigenvectors of matrices derived from the distances between the points -- there are several unresolved issues. First, there is a wide variety of algorithms that use the eigenvectors
Computer Vision
, 1982
"... Driver inattention is one of the main causes of traffic accidents. Monitoring a driver to detect inattention is a complex problem that involves physiological and behavioral elements. Different approaches have been made, and among them Computer Vision has the potential of monitoring the person behind ..."
Abstract
-
Cited by 1041 (11 self)
- Add to MetaCart
and tracked. In the second stage the facial features are extracted for further processing. In last stage the most crucial parameter is monitored which is eye’s status. In the last stage it is determined that whether the eyes are closed or open. On the basis of this result the warning is issued to the driver
TCP and Explicit Congestion Notification
- In: ACM Computer Communication Review, V. 24 N
, 1994
"... This paper discusses the use of Explicit Congestion Notification (ECN) mechanisms in the TCP/IP protocol. The first part proposes new guidelines for TCP’s response to ECN mechanisms (e.g., Source Quench packets, ECN fields in packet headers). Next, using simulations, we explore the benefits and draw ..."
Abstract
-
Cited by 636 (13 self)
- Add to MetaCart
mechanisms is in avoiding unnecessary packet drops, and therefore avoiding unnecessary delay for packets from low-bandwidth delay-sensitive TCP connections. A second advantage of ECN mechanisms is in networks (generally LANs) where the effectiveness of TCP retransmit timers is limited by the coarse
Understanding Code Mobility
- IEEE COMPUTER SCIENCE PRESS
, 1998
"... The technologies, architectures, and methodologies traditionally used to develop distributed applications exhibit a variety of limitations and drawbacks when applied to large scale distributed settings (e.g., the Internet). In particular, they fail in providing the desired degree of configurability, ..."
Abstract
-
Cited by 560 (34 self)
- Add to MetaCart
, scalability, and customizability. To address these issues, researchers are investigating a variety of innovative approaches. The most promising and intriguing ones are those based on the ability of moving code across the nodes of a network, exploiting the notion of mobile code. As an emerging research field
Computation and Analysis of Multiple Structural Change Models.‖
- Journal of Applied Econometrics
, 2003
"... SUMMARY In a recent paper, Bai and Perron (1998) considered theoretical issues related to the limiting distribution of estimators and test statistics in the linear model with multiple structural changes. In this companion paper, we consider practical issues for the empirical applications of the pro ..."
Abstract
-
Cited by 448 (6 self)
- Add to MetaCart
of breaks. Our method can be applied to both pure and partial structural change models. Second, we consider the problem of forming confidence intervals for the break dates under various hypotheses about the structure of the data and the errors across segments. Third, we address the issue of testing
Perceived locus of causality and internalization: Examining reasons for acting in two domains.
- Journal of Personality and Social Psychology,
, 1989
"... Theories of internalization typically suggest that self-perceptions of the "causes" of(i.e., reasons for) behavior are differentiated along a continuum of autonomy that contains identifiable gradations. A model of perceived locus of causality (PLOC) is developed, using children's sel ..."
Abstract
-
Cited by 401 (24 self)
- Add to MetaCart
of PLOC and to motivation. A second project examines 3 reason categories (external, introject, and identification) within the domain of prosoeial behavior. Relations with measures of empathy, moral judgment, and positive interpersonal relatedness are presented. Finally, the proposed model
Storage and executive processes in the frontal lobes.
- Science,
, 1999
"... The human frontal cortex helps mediate working memory, a system that is used for temporary storage and manipulation of information and that is involved in many higher cognitive functions. Working memory includes two components: short-term storage (on the order of seconds) and executive processes th ..."
Abstract
-
Cited by 401 (5 self)
- Add to MetaCart
The human frontal cortex helps mediate working memory, a system that is used for temporary storage and manipulation of information and that is involved in many higher cognitive functions. Working memory includes two components: short-term storage (on the order of seconds) and executive processes
Results 1 - 10
of
23,637