نتایج جستجو برای: wilson model
تعداد نتایج: 2118218 فیلتر نتایج به سال:
The discovery of mirror neurons has been hailed as one of the most 1 exciting developments in neuroscience in the past few decades. These neurons dis2 charge in response to the observation of others’ actions. But how are we to understand 3 the function of these neurons? In this paper I defend the idea that mirror neurons are 4 best conceived as components of a sensory system that has the functi...
This is a continuation of Mirror Principle III [14].
This is a continuation of Mirror Principle III [14].
We define the fundamental strict categorical group P2(M, ∗) of a based smooth manifold (M, ∗) and construct categorical holonomies, being smooth morphisms P2(M, ∗) → C(G), where C(G) is a Lie categorical group, by using a notion of categorical connections, which we define. As a result, we are able to define Wilson spheres in this context.
Stimulating is an important mechanism in Virtual Community (VC) during the Knowledge Sharing (KS) process. In this paper, we combine the power of game theory and stimulating mechanism together to optimize the KS process in Social Network (SN). We first model the basic stimulating mechanism as a static game of complete information, under which the stimulating threshold for Nash Equilibrium (NE) ...
(3) Soar does not currently include any capacity limits on its dynamic memory (SDM), but is compatible with certain such limitations. In particular, a constraint that SDM can hold at most two items of the same “type” (suitably defined) yields a coherent explanation for many psycholinguistic phenomena in the comprehension of sentences. This constraint is motivated by computational efficiency con...
In a recent study Dugatkin & Wilson (1992) tested for cognitive abilities in bluegill sunfish. They found that when a focal fish was allowed to forage with different companions, it was able to remember with which ones it had had greatest success and to use this information in future interactions. Moreover, fish seemed to prefer to associate with familiar conspecifics over unfamiliar ones. A num...
Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ignored or added at or after implementation. The paper explores common security models, and their relevance to databases. It demonstrates how security-relevant concepts can be extracted during a conventional database development....
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید