نتایج جستجو برای: semilocally small generated

تعداد نتایج: 1061916  

2010
Ingo Stengel Oliver Schneider Udo Bleimann

Learner preferences of students have been analysed within two modules that have been given in the department of media using Röll’s learner preference model. A qualitative analysis of the results of an online learner preference test based on this model has been conducted. This analysis showed that for the majority of the students the revealed results were valid. Starting from current methods use...

2010
Denis Teyssou

This paper presents the approach of the Glocal European funded project towards the co-production of news on World events, on an information marketplace involving both amateurs and professionals. It discuss the rise of user-generated content amongst worldwide media and how event modelling and technology usage may help to foster this pro-am collaboration. Glocal: Event-based Retrieval of Networke...

2015
Danny Hayes Jennifer L. Lawless

We propose a two-stage process to explain the relationship between the local news environment and citizen engagement. Our original content analysis of newspaper coverage in every US House district during the 2010 midterms reveals that districts with uncompetitive races and those served by large-circulation outlets see significantly less, and less substantive, coverage than hotly contested distr...

2010
Sangyoon Lee Gordon S. Carlson Steve Jones Andrew E. Johnson Jason Leigh Luc Renambot

The human ability to express and recognize emotions plays an important role in face-to-face communication, and as technology advances it will be increasingly important for computer-generated avatars to be similarly expressive. In this paper, we present the detailed development process for the Lifelike Responsive Avatar Framework (LRAF) and a prototype application for modeling a specific individ...

Journal: :Electr. J. Comb. 1996
Shalosh B. Ekhad J. E. Majewicz

Using a certification procedure for Abel-type sums, we present a computerized proof of Abel’s identity. Abel’s identity [1],[2] can be proved in many ways, including the elegant combinatorial methods of [3]. Here we present the first computer-generated proof using the methods introduced in [4]. Theorem([1]; [2], p.128). For n ≥ 0:

Journal: :Int. J. Hum.-Comput. Stud. 2018
Kevin Crowston Isabelle Fagnot

2014
Frederik Hermans Hjalmar Wennerström Liam McNamara Christian Rohner Per Gunningberg

During phases of transient connectivity, sensor nodes receive a substantial number of corrupt packets. These corrupt packets are generally discarded, losing the sent information and wasting the energy put into transmitting and receiving. Our analysis of one year’s data from an outdoor sensor network deployment shows that packet corruption follows a distinct pattern that is observed on all links...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید