Offline Teaching.

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Offline Delegation

This article describes mechanisms for offline delegation of access rights to files maintained by a distributed “File Repository”. The mechanisms are designed for a target environment where personal machines are used at times when critical services, such as authentication and authorization services, are not accessible. We demonstrate how valid delegation credentials can be transferred verbally w...

متن کامل

OFFLINE CONSOLIDATION 1 Running head: OFFLINE CONSOLIDATION Offline consolidation in implicit sequence learning

The goal of this study was to investigate offline memory consolidation with regard to general motor skill learning and implicit sequence-specific learning. We trained young adults on a serial reaction time task with a retention interval of either 24 hours (Experiment 1) or 1 week (Experiment 2) between two sessions. We manipulated sequence complexity (deterministic vs. probabilistic) and motor ...

متن کامل

Handwriting Recognition – “Offline” Approach

There are many things we humans have in common. But there are other things that are very unique to every individual DNA, fingerprints, etc. Handwriting is one other such thing that is unique to every individual, which the recent studies on Handwriting analysis have already proved. Although arguable is this issue, that handwriting can be mimicked and forgery becoming a huge issue, there is certa...

متن کامل

Taking Entity Reconciliation Offline

Entity reconciliation—linking names or terms to identifiers in external datasets—is a popular method of adding standardized structured data to loosely structured documents. Most approaches to entity reconciliation rely on remote web services, requiring network access during the reconciliation process. For use cases that rely on a “human in the loop” (reconciling entities during the authoring pr...

متن کامل

Offline Signature Recognition

The most commonly used protection mechanisms today are based on either what a person possesses (e.g. an ID card) or what the person remembers (like passwords and PIN numbers). However, there is always a risk of passwords being cracked by unauthenticated users and ID cards being stolen, in addition to shortcomings like forgotten passwords and lost ID cards (Huang & Yan, 1997). To avoid such inco...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Robotics Society of Japan

سال: 1995

ISSN: 0289-1824,1884-7145

DOI: 10.7210/jrsj.13.611