• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 77,112
Next 10 →

Affective Computing

by R. W. Picard , 1995
"... Recent neurological studies indicate that the role of emotion in human cognition is essential; emotions are not a luxury. Instead, emotions play a critical role in rational decision-making, in perception, in human interaction, and in human intelligence. These facts, combined with abilities computers ..."
Abstract - Cited by 1909 (43 self) - Add to MetaCart
, and both theoretical and practical applications are described for learning, human-computer interaction, perceptual information retrieval, creative arts and entertainment, human health, and machine intelligence. Significant potential advances in emotion and cognition theory hinge on the development

A standardized set of 260 pictures: Norms for name agreement, image agreement, familiarity, and visual complexity

by Joan Gay Snodgrass, Mary Vanderwart - JOURNAL OF EXPERIMENTAL PSYCHOLOGY: HUMAN LEARNING AND MEMORY , 1980
"... In this article we present a standardized set of 260 pictures for use in experiments investigating differences and similarities in the processing of pictures and words. The pictures are black-and-white line drawings executed according to a set of rules that provide consistency of pictorial represent ..."
Abstract - Cited by 663 (1 self) - Add to MetaCart
attributes of the pictures. The concepts were selected to provide exemplars from several widely studied semantic categories. Sources of naming variance, and mean familiarity and complexity of the exemplars, differed significantly across the set of categories investigated. The potential significance of each

On agent-based software engineering

by Nicholas R. Jennings, Michael Wooldridge - ARTIFICIAL INTELLIGENCE , 2000
"... Agent-oriented techniques represent an exciting new means of analysing, designing and building complex software systems. They have the potential to significantly improve current practice in software engineering and to extend the range of applications that can feasibly be tackled. Yet, to date, there ..."
Abstract - Cited by 632 (26 self) - Add to MetaCart
Agent-oriented techniques represent an exciting new means of analysing, designing and building complex software systems. They have the potential to significantly improve current practice in software engineering and to extend the range of applications that can feasibly be tackled. Yet, to date

A survey of trust and reputation systems for online service provision

by Audun Jøsang, Roslan Ismail, Colin Boyd , 2005
"... Trust and reputation systems represent a significant trend in decision support for Internet mediated service provision. The basic idea is to collect information about potential service providers in order to select the most reliable and trustworthy provider of services and information and to avoid th ..."
Abstract - Cited by 632 (15 self) - Add to MetaCart
Trust and reputation systems represent a significant trend in decision support for Internet mediated service provision. The basic idea is to collect information about potential service providers in order to select the most reliable and trustworthy provider of services and information and to avoid

Location-aided routing (LAR) in mobile ad hoc networks, in:

by Young-Bae Ko , Nitin H Vaidya - Proc. of MOBICOM , 1998
"... A mobile ad hoc network consists of wireless hosts that may move often. Movement of hosts results in a change in routes, requiring some mechanism for determining new routes. Several routing protocols have already been proposed for ad hoc networks. This paper suggests an approach to utilize location ..."
Abstract - Cited by 901 (10 self) - Add to MetaCart
" of the ad hoc network. This results in a significant reduction in the number of routing messages. We present two algorithms to determine the request zone, and also suggest potential optimizations to our algorithms.

The Construct of Resilience: A Critical Evaluation and Guidelines for Future Work.

by Suniya S Luthar , Dante Cicchetti , Bronwyn Becker - Child Development, , 2000
"... This paper presents a critical appraisal of resilience, a construct connoting the maintenance of positive adaptation by individuals despite experiences of significant adversity. As empirical research on resilience has burgeoned in recent years, criticisms have been levied at work in this area. Thes ..."
Abstract - Cited by 495 (8 self) - Add to MetaCart
This paper presents a critical appraisal of resilience, a construct connoting the maintenance of positive adaptation by individuals despite experiences of significant adversity. As empirical research on resilience has burgeoned in recent years, criticisms have been levied at work in this area

Axiomatic quantum field theory in curved spacetime

by Stefan Hollands, Robert M. Wald , 2008
"... The usual formulations of quantum field theory in Minkowski spacetime make crucial use of features—such as Poincare invariance and the existence of a preferred vacuum state—that are very special to Minkowski spacetime. In order to generalize the formulation of quantum field theory to arbitrary globa ..."
Abstract - Cited by 689 (18 self) - Add to MetaCart
of the spin-statistics theorem and the PCT theorem. Some potentially significant further implications of our new viewpoint on quantum field theory are discussed.

The nesC language: A holistic approach to networked embedded systems

by David Gay, Matt Welsh, Philip Levis, Eric Brewer, Robert Von Behren, David Culler - In Proceedings of Programming Language Design and Implementation (PLDI , 2003
"... We present nesC, a programming language for networked embedded systems that represent a new design space for application developers. An example of a networked embedded system is a sensor network, which consists of (potentially) thousands of tiny, lowpower “motes, ” each of which execute concurrent, ..."
Abstract - Cited by 943 (48 self) - Add to MetaCart
We present nesC, a programming language for networked embedded systems that represent a new design space for application developers. An example of a networked embedded system is a sensor network, which consists of (potentially) thousands of tiny, lowpower “motes, ” each of which execute concurrent

Rethinking the emotional brain

by Joseph LeDoux , 2012
"... ts fe o th emotion is, and how it differs from other aspects of mind and behavior, in spite of discussion and debate that dates back to emotion, since animal research is essential for identifying cally use these ‘‘feeling words’ ’ as guideposts to explore the terrain of emotion. One set of such phen ..."
Abstract - Cited by 678 (3 self) - Add to MetaCart
of such phenomena includes responses that occur whenProgress in understanding emotional phenomena in the brains of laboratory animals has in fact helped elucidate emotional functions in the human brain, including pathological aspects of responses that occur when in danger or when in the presence of a potential mate

A Case for End System Multicast

by Yang-hua Chu, Sanjay G. Rao, Srinivasan Seshan, Hui Zhang - in Proceedings of ACM Sigmetrics , 2000
"... Abstract — The conventional wisdom has been that IP is the natural protocol layer for implementing multicast related functionality. However, more than a decade after its initial proposal, IP Multicast is still plagued with concerns pertaining to scalability, network management, deployment and suppor ..."
Abstract - Cited by 1290 (24 self) - Add to MetaCart
of multicast support from routers to end systems has the potential to address most problems associated with IP Multicast. However, the key concern is the performance penalty associated with such a model. In particular, End System Multicast introduces duplicate packets on physical links and incurs larger end
Next 10 →
Results 1 - 10 of 77,112
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University