• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 23,637
Next 10 →

Principles and Practice in Second Language Acquisition

by Stephen D Krashen , 1982
"... This is the original version of Principles and Practice, as published in 1982, with only minor changes. It is gratifying to point out that many of the predictions made in this book were confirmed by subsequent research, for example, the superiority of comprehensible-input based methods and sheltered ..."
Abstract - Cited by 775 (4 self) - Add to MetaCart
best through comprehensible input (Krashen, 1989; 2003). I have changed my position on only one issue: At the end of Principles and Practice, I suggest the use of a form of deception- students may think they are acquiring vocabulary or learning subject matter, but unknown to them, they are acquiring

Preface to the Second Issue

by Ulrich Mohrhoff
"... The release date of the last yearly issue of AntiMatters — the second issue in the case of this first volume — is November 24th. On this day in 1926, Sri Aurobindo arrived at a turning point in his yoga.1 According to Sri Aurobindo, there is a highest mental plane, to which he gave the name “overmin ..."
Abstract - Add to MetaCart
The release date of the last yearly issue of AntiMatters — the second issue in the case of this first volume — is November 24th. On this day in 1926, Sri Aurobindo arrived at a turning point in his yoga.1 According to Sri Aurobindo, there is a highest mental plane, to which he gave the name

What is a hidden Markov model?

by Sean R. Eddy , 2004
"... Often, problems in biological sequence analysis are just a matter of putting the right label on each residue. In gene identification, we want to label nucleotides as exons, introns, or intergenic sequence. In sequence alignment, we want to associate residues in a query sequence with ho-mologous resi ..."
Abstract - Cited by 1344 (8 self) - Add to MetaCart
splice site consenses, codon bias, exon/intron length preferences, and open reading frame analysis all in one scoring system. How should all those parameters be set? How should different kinds of information be weighted? A second issue is being able to interpret results probabilistically. Finding a best

On Spectral Clustering: Analysis and an algorithm

by Andrew Y. Ng, Michael I. Jordan, Yair Weiss - ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS , 2001
"... Despite many empirical successes of spectral clustering methods -- algorithms that cluster points using eigenvectors of matrices derived from the distances between the points -- there are several unresolved issues. First, there is a wide variety of algorithms that use the eigenvectors in slightly ..."
Abstract - Cited by 1713 (13 self) - Add to MetaCart
Despite many empirical successes of spectral clustering methods -- algorithms that cluster points using eigenvectors of matrices derived from the distances between the points -- there are several unresolved issues. First, there is a wide variety of algorithms that use the eigenvectors

Computer Vision

by Kusuma Kumari B. M , 1982
"... Driver inattention is one of the main causes of traffic accidents. Monitoring a driver to detect inattention is a complex problem that involves physiological and behavioral elements. Different approaches have been made, and among them Computer Vision has the potential of monitoring the person behind ..."
Abstract - Cited by 1041 (11 self) - Add to MetaCart
and tracked. In the second stage the facial features are extracted for further processing. In last stage the most crucial parameter is monitored which is eye’s status. In the last stage it is determined that whether the eyes are closed or open. On the basis of this result the warning is issued to the driver

TCP and Explicit Congestion Notification

by Sally Floyd - In: ACM Computer Communication Review, V. 24 N , 1994
"... This paper discusses the use of Explicit Congestion Notification (ECN) mechanisms in the TCP/IP protocol. The first part proposes new guidelines for TCP’s response to ECN mechanisms (e.g., Source Quench packets, ECN fields in packet headers). Next, using simulations, we explore the benefits and draw ..."
Abstract - Cited by 636 (13 self) - Add to MetaCart
mechanisms is in avoiding unnecessary packet drops, and therefore avoiding unnecessary delay for packets from low-bandwidth delay-sensitive TCP connections. A second advantage of ECN mechanisms is in networks (generally LANs) where the effectiveness of TCP retransmit timers is limited by the coarse

Understanding Code Mobility

by Alfonso Fuggetta, Gian Pietro Picco, Giovanni Vigna - IEEE COMPUTER SCIENCE PRESS , 1998
"... The technologies, architectures, and methodologies traditionally used to develop distributed applications exhibit a variety of limitations and drawbacks when applied to large scale distributed settings (e.g., the Internet). In particular, they fail in providing the desired degree of configurability, ..."
Abstract - Cited by 560 (34 self) - Add to MetaCart
, scalability, and customizability. To address these issues, researchers are investigating a variety of innovative approaches. The most promising and intriguing ones are those based on the ability of moving code across the nodes of a network, exploiting the notion of mobile code. As an emerging research field

Computation and Analysis of Multiple Structural Change Models.‖

by Jushan Bai , Pierre Perron - Journal of Applied Econometrics , 2003
"... SUMMARY In a recent paper, Bai and Perron (1998) considered theoretical issues related to the limiting distribution of estimators and test statistics in the linear model with multiple structural changes. In this companion paper, we consider practical issues for the empirical applications of the pro ..."
Abstract - Cited by 448 (6 self) - Add to MetaCart
of breaks. Our method can be applied to both pure and partial structural change models. Second, we consider the problem of forming confidence intervals for the break dates under various hypotheses about the structure of the data and the errors across segments. Third, we address the issue of testing

Perceived locus of causality and internalization: Examining reasons for acting in two domains.

by Richard M Ryan , James P Connell , Rachel Avery , Wendy Grolnick , John Lynch , Christina Frederick , Cynthia Mellor-Crummey , James Wellborn , Elizabeth Whitehead , Edward Deci - Journal of Personality and Social Psychology, , 1989
"... Theories of internalization typically suggest that self-perceptions of the "causes" of(i.e., reasons for) behavior are differentiated along a continuum of autonomy that contains identifiable gradations. A model of perceived locus of causality (PLOC) is developed, using children's sel ..."
Abstract - Cited by 401 (24 self) - Add to MetaCart
of PLOC and to motivation. A second project examines 3 reason categories (external, introject, and identification) within the domain of prosoeial behavior. Relations with measures of empathy, moral judgment, and positive interpersonal relatedness are presented. Finally, the proposed model

Storage and executive processes in the frontal lobes.

by Edward E Smith , John Jonides - Science, , 1999
"... The human frontal cortex helps mediate working memory, a system that is used for temporary storage and manipulation of information and that is involved in many higher cognitive functions. Working memory includes two components: short-term storage (on the order of seconds) and executive processes th ..."
Abstract - Cited by 401 (5 self) - Add to MetaCart
The human frontal cortex helps mediate working memory, a system that is used for temporary storage and manipulation of information and that is involved in many higher cognitive functions. Working memory includes two components: short-term storage (on the order of seconds) and executive processes
Next 10 →
Results 1 - 10 of 23,637
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University