Results 1 - 10
of
24,675
GroupLens: An Open Architecture for Collaborative Filtering of Netnews
, 1994
"... Collaborative filters help people make choices based on the opinions of other people. GroupLens is a system for collaborative filtering of netnews, to help people find articles they will like in the huge stream of available articles. News reader clients display predicted scores and make it easy for ..."
Abstract
-
Cited by 1548 (41 self)
- Add to MetaCart
Collaborative filters help people make choices based on the opinions of other people. GroupLens is a system for collaborative filtering of netnews, to help people find articles they will like in the huge stream of available articles. News reader clients display predicted scores and make it easy
An Algorithm for Tracking Multiple Targets
- IEEE Transactions on Automatic Control
, 1979
"... Abstract—An algorithm for tracking multiple targets In a cluttered algorithms. Clustering is the process of dividing the entire environment Is developed. The algorithm Is capable of Initiating tracks, set of targets and measurements into independent groups accounting for false or m[~clngreports, and ..."
Abstract
-
Cited by 596 (0 self)
- Add to MetaCart
Abstract—An algorithm for tracking multiple targets In a cluttered algorithms. Clustering is the process of dividing the entire environment Is developed. The algorithm Is capable of Initiating tracks, set of targets and measurements into independent groups accounting for false or m
An Architecture for Wide-Area Multicast Routing
"... Existing multicast routing mechanisms were intended for use within regions where a group is widely represented or bandwidth is universally plentiful. When group members, and senders to those group members, are distributed sparsely across a wide area, these schemes are not efficient; data packets or ..."
Abstract
-
Cited by 534 (22 self)
- Add to MetaCart
is measured in terms of the state, control message processing, and data packet processing, required across the entire network in order to deliver data packets to the members of the group. Our Protocol Independent Multicast (PIM) architecture: (a) maintains the traditional IP multicast service model
Does the autistic child have a theory of mind
- Cognition
, 1985
"... We use a new model of metarepresentational development to predict a cognitive deficit which could explain a crucial component of the social impairment in childhood autism. One of the manifestations of a basic metarepresentational ca-pacity is a ‘theory of mind’. We have reason to believe that autist ..."
Abstract
-
Cited by 596 (47 self)
- Add to MetaCart
that autistic children lack such a ‘theory’. If this were so, then they would be unable to impute beliefs to others and to predict their behaviour. This hypothesis was tested using Wimmer and Perner’s puppet play paradigm. Normal children and those with Down’s syndrome were used as controls for a group
Rethinking individualism and collectivism: Evaluation of theoretical assumptions and meta-analyses
- Psychological Bulletin
, 2002
"... Are Americans more individualistic and less collectivistic than members of other groups? The authors summarize plausible psychological implications of individualism–collectivism (IND-COL), meta-analyze cross-national and within-United States IND-COL differences, and review evidence for effects of IN ..."
Abstract
-
Cited by 520 (11 self)
- Add to MetaCart
of IND-COL on self-concept, well-being, cognition, and relationality. European Americans were found to be both more individualistic—valuing personal independence more—and less collectivistic—feeling duty to in-groups less—than others. However, European Americans were not more individualistic than African
Hypertext Transfer Protocol - HTTP/1.1
, 1996
"... The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, object-oriented protocol which can be used for many tasks, such as name servers and distributed object management systems, through exten ..."
Abstract
-
Cited by 908 (27 self)
- Add to MetaCart
extension of its request methods. A feature of HTTP is the typing and negotiation of data representation, allowing systems to be built independently of the data being transferred. HTTP has been in use by the World-Wide Web global information initiative since 1990. This specification defines the protocol
A Survey of Mobility Models for Ad Hoc Network Research
- WIRELESS COMMUNICATIONS & MOBILE COMPUTING (WCMC): SPECIAL ISSUE ON MOBILE AD HOC NETWORKING: RESEARCH, TRENDS AND APPLICATIONS
, 2002
"... In the performance evaluation of a protocol for an ad hoc network, the protocol should be tested under realistic conditions including, but not limited to, a sensible transmission range, limited buffer space for the storage of messages, representative data traffic models, and realistic movements of t ..."
Abstract
-
Cited by 1213 (8 self)
- Add to MetaCart
of the mobile users (i.e., a mobility model). This paper is a survey of mobility models that are used in the simulations of ad hoc networks. We describe several mobility models that represent mobile nodes whose movements are independent of each other (i.e., entity mobility models) and several mobility models
Ecology of the family as a context for human development: Research perspectives.
- Developmental Psychology,
, 1986
"... This review collates and examines critically a theoretically convergent but widely dispersed body of research on the influence of external environments on the functioning of families as contexts of human development. Investigations falling within this expanding domain include studies of the interac ..."
Abstract
-
Cited by 518 (0 self)
- Add to MetaCart
of the interaction of genetics and environment in family processes; transitions and linkages between the family and other major settings influencing development, such as hospitals, day care, peer groups, school, social networks, the world of work (both for parents and children), and neighborhoods and communities
Effective Erasure Codes for Reliable Computer Communication Protocols
, 1997
"... Reliable communication protocols require that all the intended recipients of a message receive the message intact. Automatic Repeat reQuest (ARQ) techniques are used in unicast protocols, but they do not scale well to multicast protocols with large groups of receivers, since segment losses tend to b ..."
Abstract
-
Cited by 470 (14 self)
- Add to MetaCart
Reliable communication protocols require that all the intended recipients of a message receive the message intact. Automatic Repeat reQuest (ARQ) techniques are used in unicast protocols, but they do not scale well to multicast protocols with large groups of receivers, since segment losses tend
Elementary Students Using an Independent Group Contingency
"... Students Using an Independent Group Contingency. ” I have examined the final electronic ..."
Abstract
- Add to MetaCart
Students Using an Independent Group Contingency. ” I have examined the final electronic
Results 1 - 10
of
24,675