نتایج جستجو برای: wilson model

تعداد نتایج: 2118218  

Journal: :Nuclear Physics B - Proceedings Supplements 1995

Journal: :Synthese 2009
Lawrence Shapiro

The discovery of mirror neurons has been hailed as one of the most 1 exciting developments in neuroscience in the past few decades. These neurons dis2 charge in response to the observation of others’ actions. But how are we to understand 3 the function of these neurons? In this paper I defend the idea that mirror neurons are 4 best conceived as components of a sensory system that has the functi...

2001
B. K. Agrawal Tapas Sil S. K. Samaddar J. N. De

2001
Bong H. Lian Kefeng Liu Shing-Tung Yau

This is a continuation of Mirror Principle III [14].

2008
Bong H. Lian Kefeng Liu Shing-Tung Yau

This is a continuation of Mirror Principle III [14].

2008
João Faria Martins Roger Picken

We define the fundamental strict categorical group P2(M, ∗) of a based smooth manifold (M, ∗) and construct categorical holonomies, being smooth morphisms P2(M, ∗) → C(G), where C(G) is a Lie categorical group, by using a notion of categorical connections, which we define. As a result, we are able to define Wilson spheres in this context.

2010
Ping Zhu Guiyi Wei Athanasios V. Vasilakos Hung-Yu Wei

Stimulating is an important mechanism in Virtual Community (VC) during the Knowledge Sharing (KS) process. In this paper, we combine the power of game theory and stimulating mechanism together to optimize the KS process in Social Network (SN). We first model the basic stimulating mechanism as a static game of complete information, under which the stimulating threshold for Nash Equilibrium (NE) ...

1997
Richard M Young Richard L Lewis

(3) Soar does not currently include any capacity limits on its dynamic memory (SDM), but is compatible with certain such limitations. In particular, a constraint that SDM can hold at most two items of the same “type” (suitably defined) yields a coherent explanation for many psycholinguistic phenomena in the comprehension of sentences. This constraint is motivated by computational efficiency con...

1996
CELIA M. LOMBARDI STUART H. HURLBERT

In a recent study Dugatkin & Wilson (1992) tested for cognitive abilities in bluegill sunfish. They found that when a focal fish was allowed to forage with different companions, it was able to remember with which ones it had had greatest success and to use this information in future interactions. Moreover, fish seemed to prefer to associate with familiar conspecifics over unfamiliar ones. A num...

2004
Xiaocheng Ge Fiona A. C. Polack Régine Laleau

Information systems are vulnerable to accidental or malicious attacks. Security models for commercial computer systems exist, but information systems security is often ignored or added at or after implementation. The paper explores common security models, and their relevance to databases. It demonstrates how security-relevant concepts can be extracted during a conventional database development....

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید