• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 8,190
Next 10 →

The Main Difficulties and Problems of the Romanian Immigrants from Europe

by unknown authors
"... ABSTRACT The present material is the result of a sociologic research among 615 Romanians who emigrated in 5 devel-oped countries from Europe. The main objective was that to know the difficulties that they face on the territory of other countries and to find who helps them to solve these problems. ..."
Abstract - Add to MetaCart
ABSTRACT The present material is the result of a sociologic research among 615 Romanians who emigrated in 5 devel-oped countries from Europe. The main objective was that to know the difficulties that they face on the territory of other countries and to find who helps them to solve these problems.

1The Main Difficulty with Pain: Commentary on Tye

by Murat Aydede , 2004
"... Consider the following two sentences: (1) I see a dark discoloration in the back of my hand. (2) I feel a jabbing pain in the back of my hand. They seem to have the same surface grammar, and thus prima facie invite the same kind of semantic treatment. Even though a reading of ‘see ’ in (1) where the ..."
Abstract - Add to MetaCart
Consider the following two sentences: (1) I see a dark discoloration in the back of my hand. (2) I feel a jabbing pain in the back of my hand. They seem to have the same surface grammar, and thus prima facie invite the same kind of semantic treatment. Even though a reading of ‘see ’ in (1) where the verb is not treated as a success verb is not out of the question, it is not the ordinary and natural reading. Note that if I am hallucinating a dark discoloration in the back of my hand, then (1) is simply false. For (1) to be true, therefore, I have to stand in the seeing relation to a dark discoloration in the back of my hand, i.e., to a certain surface region in the back of my hand marked by a darker shade of the usual color of my skin, a certain region that can be seen by others possibly in the same way in which I see it. Also note that although the truth of (1) doesn’t require the possession of any concept by me expressed by the words making up the sentence, my uttering of (1) to make a report typically does — if we take such utterances as expressions of one’s thoughts. So my seeing would typically induce me to identify something in the back of my hand as a

Compositional Model Checking

by E. M. Clarke, D. E. Long, K. L. Mcmillan , 1999
"... We describe a method for reducing the complexity of temporal logic model checking in systems composed of many parallel processes. The goal is to check properties of the components of a system and then deduce global properties from these local properties. The main difficulty with this type of approac ..."
Abstract - Cited by 3252 (70 self) - Add to MetaCart
We describe a method for reducing the complexity of temporal logic model checking in systems composed of many parallel processes. The goal is to check properties of the components of a system and then deduce global properties from these local properties. The main difficulty with this type

Comparison of Multiobjective Evolutionary Algorithms: Empirical Results

by Eckart Zitzler, Lothar Thiele, Kalyanmoy Deb , 2000
"... In this paper, we provide a systematic comparison of various evolutionary approaches to multiobjective optimization using six carefully chosen test functions. Each test function involves a particular feature that is known to cause difficulty in the evolutionary optimization process, mainly in conver ..."
Abstract - Cited by 628 (41 self) - Add to MetaCart
In this paper, we provide a systematic comparison of various evolutionary approaches to multiobjective optimization using six carefully chosen test functions. Each test function involves a particular feature that is known to cause difficulty in the evolutionary optimization process, mainly

Missing data: Our view of the state of the art

by Joseph L. Schafer, John W. Graham - Psychological Methods , 2002
"... Statistical procedures for missing data have vastly improved, yet misconception and unsound practice still abound. The authors frame the missing-data problem, review methods, offer advice, and raise issues that remain unresolved. They clear up common misunderstandings regarding the missing at random ..."
Abstract - Cited by 739 (1 self) - Add to MetaCart
developments are discussed, including some for dealing with missing data that are not MAR. Although not yet in the main-stream, these procedures may eventually extend the ML and MI methods that currently represent the state of the art. Why do missing data create such difficulty in sci-entific research? Because

A Fast Elitist Non-Dominated Sorting Genetic Algorithm for Multi-Objective Optimization: NSGA-II

by Kalyanmoy Deb, Samir Agrawal, Amrit Pratap, T Meyarivan , 2000
"... Multi-objective evolutionary algorithms which use non-dominated sorting and sharing have been mainly criticized for their (i) -4 computational complexity (where is the number of objectives and is the population size), (ii) non-elitism approach, and (iii) the need for specifying a sharing ..."
Abstract - Cited by 662 (15 self) - Add to MetaCart
Multi-objective evolutionary algorithms which use non-dominated sorting and sharing have been mainly criticized for their (i) -4 computational complexity (where is the number of objectives and is the population size), (ii) non-elitism approach, and (iii) the need for specifying a

A Fast and Elitist Multi-Objective Genetic Algorithm: NSGA-II

by Kalyanmoy Deb, Amrit Pratap, Sameer Agarwal, T. Meyarivan , 2000
"... Multi-objective evolutionary algorithms which use non-dominated sorting and sharing have been mainly criticized for their (i) O(MN computational complexity (where M is the number of objectives and N is the population size), (ii) non-elitism approach, and (iii) the need for specifying a sharing param ..."
Abstract - Cited by 1815 (60 self) - Add to MetaCart
Multi-objective evolutionary algorithms which use non-dominated sorting and sharing have been mainly criticized for their (i) O(MN computational complexity (where M is the number of objectives and N is the population size), (ii) non-elitism approach, and (iii) the need for specifying a sharing

Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,

by ] Richard Hackman , Grec R Oldham , 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract - Cited by 622 (2 self) - Add to MetaCart
. At the least, this increases the difficulty of testing the theory in on-going organizations. It also limits the degree to which the theory can be used to diagnose jobs prior to planned change, or to evaluate the effects of work redesign activities after changes have been carried out. Activation theory. While

The people make the place.

by Benjamin Schneider , Benjamin Schneider - Personnel Psychology, , 1987
"... A framework for understanding the etiology of organizational behavior is presented. The framework is ]based on theory and research from interactional psychology, vocational psychology, I/O psychology, and organizational theory. The framework proposes that organizations are functions of the kinds of ..."
Abstract - Cited by 466 (5 self) - Add to MetaCart
is developed through a series of propositions. Then some implications of the model are outlined, including (1) the difficulty of bringing about change in organizations, (2) the utility of personality and interest measures for understanding organizational behavior, (3) the genesis of organizational climate

Safe Kernel Extensions Without Run-Time Checking

by George C. Necula, Peter Lee - Proc. of OSDI'96
"... Abstract This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel first defines a safety policy and makes it public. Then, using this policy, an application can provide binaries i ..."
Abstract - Cited by 429 (20 self) - Add to MetaCart
. If the validation succeeds, the code is guaranteed to respect the safety policy without relying on run-time checks. The main practical difficulty of PCC is in generating the safety proofs. In order to gain some preliminary experience with this, we have written several network packet filters in hand-tuned DEC Alpha
Next 10 →
Results 1 - 10 of 8,190
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University