• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 40,046
Next 10 →

The “What” and “Why” of Goal Pursuits: Human Needs and the Self-Determination of Behavior

by Edward L. Deci, Richard M. Ryan , 2000
"... Self-determination theory (SDT) maintains that an understanding of human motiva-tion requires a consideration of innate psychological needs for competence, auton-omy, and relatedness. We discuss the SDT concept of needs as it relates to previous need theories, emphasizing that needs specify the nece ..."
Abstract - Cited by 1105 (36 self) - Add to MetaCart
the necessary conditions for psycholog-ical growth, integrity, and well-being. This concept of needs leads to the hypotheses that different regulatory processes underlying goal pursuits are differentially associated with effective functioning and well-being and also that different goal contents have different

A social-cognitive approach to motivation and personality

by Carol S. Dweck, Ellen L. Leggett - Psychological Review , 1988
"... Past work has documented and described major patterns of adaptive and maladaptive behavior: the mastery-oriented and the helpless patterns. In this article, we present a research-based model that accounts for these patterns in terms of underlying psychological processes. The model specifies how indi ..."
Abstract - Cited by 964 (20 self) - Add to MetaCart
individuals ' implicit theories orient them toward particular goals and how these goals set up the different patterns. Indeed, we show how each feature (cognitive, affective, and behavioral) of the adaptive and maladaptive patterns can be seen to follow directly from different goals. We then exam

Achievement goals in the classroom: Students’ learning strategies and motivation processes

by Carole Ames, Jennifer Archer - Journal of Educational Psychology , 1988
"... We studied how specific motivational processes are related to the salience of mastery and performance goals in actual classroom settings. One hundred seventy-six students attending a junior high/high school for academically advanced students were randomly selected from one of their classes and respo ..."
Abstract - Cited by 433 (1 self) - Add to MetaCart
and strength of the findings suggest that the classroom goal orientation may facilitate the maintenance of adaptive motivation patterns when mastery goals are salient and are adopted by students. Recent research on achievement motivation has focused on identifying different types of goal orientations among

Differences, Goal Setting, and Math Achievement

by M. Shehni Yailagh, J. Lloyd, J. Walsh
"... This study was conducted to investigate the causal relationships between attribution styles, mathematics self-efficacy beliefs, gender differences, goal setting, and math achievement of school children. The subjects were 99 seventh-grade students (56 male and 43 female), from public schools in Sooke ..."
Abstract - Add to MetaCart
This study was conducted to investigate the causal relationships between attribution styles, mathematics self-efficacy beliefs, gender differences, goal setting, and math achievement of school children. The subjects were 99 seventh-grade students (56 male and 43 female), from public schools

Constraint Logic Programming: A Survey

by Joxan Jaffar, Michael J. Maher
"... Constraint Logic Programming (CLP) is a merger of two declarative paradigms: constraint solving and logic programming. Although a relatively new field, CLP has progressed in several quite different directions. In particular, the early fundamental concepts have been adapted to better serve in differe ..."
Abstract - Cited by 869 (25 self) - Add to MetaCart
in different areas of applications. In this survey of CLP, a primary goal is to give a systematic description of the major trends in terms of common fundamental concepts. The three main parts cover the theory, implementation issues, and programming for applications.

Reinforcement Learning I: Introduction

by Richard S. Sutton, Andrew G. Barto , 1998
"... In which we try to give a basic intuitive sense of what reinforcement learning is and how it differs and relates to other fields, e.g., supervised learning and neural networks, genetic algorithms and artificial life, control theory. Intuitively, RL is trial and error (variation and selection, search ..."
Abstract - Cited by 5614 (118 self) - Add to MetaCart
In which we try to give a basic intuitive sense of what reinforcement learning is and how it differs and relates to other fields, e.g., supervised learning and neural networks, genetic algorithms and artificial life, control theory. Intuitively, RL is trial and error (variation and selection

An Experimental Comparison of Min-Cut/Max-Flow Algorithms for Energy Minimization in Vision

by Yuri Boykov, Vladimir Kolmogorov - IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE , 2001
"... After [10, 15, 12, 2, 4] minimum cut/maximum flow algorithms on graphs emerged as an increasingly useful tool for exact or approximate energy minimization in low-level vision. The combinatorial optimization literature provides many min-cut/max-flow algorithms with different polynomial time compl ..."
Abstract - Cited by 1315 (53 self) - Add to MetaCart
After [10, 15, 12, 2, 4] minimum cut/maximum flow algorithms on graphs emerged as an increasingly useful tool for exact or approximate energy minimization in low-level vision. The combinatorial optimization literature provides many min-cut/max-flow algorithms with different polynomial time

Cognitive networks

by Ryan W. Thomas, Luiz A. DaSilva, Allen B. MacKenzie - IN PROC. OF IEEE DYSPAN 2005 , 2005
"... This paper presents a definition and framework for a novel type of adaptive data network: the cognitive network. In a cognitive network, the collection of elements that make up the network observes network conditions and then, using prior knowledge gained from previous interactions with the network ..."
Abstract - Cited by 1106 (7 self) - Add to MetaCart
with the network, plans, decides and acts on this information. Cognitive networks are different from other “intelligent ” communication technologies because these actions are taken with respect to the end-to-end goals of a data flow. In addition to the cognitive aspects of the network, a specification language

Image registration methods: a survey.

by Barbara Zitová , Jan Flusser , 2003
"... Abstract This paper aims to present a review of recent as well as classic image registration methods. Image registration is the process of overlaying images (two or more) of the same scene taken at different times, from different viewpoints, and/or by different sensors. The registration geometrical ..."
Abstract - Cited by 760 (10 self) - Add to MetaCart
Abstract This paper aims to present a review of recent as well as classic image registration methods. Image registration is the process of overlaying images (two or more) of the same scene taken at different times, from different viewpoints, and/or by different sensors. The registration

Automatically characterizing large scale program behavior

by Timothy Sherwood, Erez Perelman, Greg Hamerly , 2002
"... Understanding program behavior is at the foundation of computer architecture and program optimization. Many pro-grams have wildly different behavior on even the very largest of scales (over the complete execution of the program). This realization has ramifications for many architectural and com-pile ..."
Abstract - Cited by 778 (41 self) - Add to MetaCart
Understanding program behavior is at the foundation of computer architecture and program optimization. Many pro-grams have wildly different behavior on even the very largest of scales (over the complete execution of the program). This realization has ramifications for many architectural and com
Next 10 →
Results 1 - 10 of 40,046
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University