نتایج جستجو برای: conflict detection

تعداد نتایج: 645994  

Journal: :Memory & cognition 2006
Sander Nieuwenhuis John F Stins Danielle Posthuma Tinca J C Polderman Dorret I Boomsma Eco J de Geus

The conflict-control loop theory proposes that the detection of conflict in information processing triggers an increase in cognitive control, resulting in improved performance on the subsequent trial. This theory seems consistent with the robust finding that conflict susceptibility is reduced following correct trials associated with high conflict: the conflict adaptation effect. However, despit...

2016
Kaijuan Yuan Fuyuan Xiao Liguo Fei Bingyi Kang Yong Deng

Wireless sensor network plays an important role in intelligent navigation. It incorporates a group of sensors to overcome the limitation of single detection system. Dempster-Shafer evidence theory can combine the sensor data of the wireless sensor network by data fusion, which contributes to the improvement of accuracy and reliability of the detection system. However, due to different sources o...

Journal: :Neuroreport 2011
Xiao Xiao Junlong Luo Ming Lei Qian Cui Lei Jia Qinglin Zhang

The size incongruity effect refers to an increase in response time when the physical size of the letters in which the name of an object is written conflicts with the actual size of the object named. The electrophysiological correlates of the size incongruity effect were investigated in 13 healthy individuals through event-related potentials in this study. Scalp event-related potential analysis ...

2014
Yannis Panagakis Stefanos Zafeiriou Maja Pantic

In this paper, the automatic detection of conflict in audiovisual recordings of political debates is addressed. In contrast to the current state of the art in social signal processing, where only the audio modality is employed for analysing the human non-verbal behavior, we propose to use additionally visual features capturing certain facial behavioral cues such as head nodding, fidgeting and f...

2001
Ulrich Junker

Existing conflict detection methods for CSP’s such as [de Kleer, 1989; Ginsberg, 1993] cannot make use of powerful propagation which makes them unusable for complex real-world problems. On the other hand, powerful constraint propagation methods lack the ability to extract dependencies or conflicts, which makes them unusable for many advanced AI reasoning methods that require conflicts, as well ...

Journal: :Inf. Process. Manage. 2006
Cheng-Yu Lee Von-Wun Soo

Semantic annotation of images is an important step to support semantic information extraction and retrieval. However, in a multi-annotator environment, various types of conflicts such as converting, merging, and inference conflicts could arise during the annotation. We devised conflict detection patterns based on different data, ontology at different inference levels and proposed the correspond...

Journal: :J. Inf. Sci. Eng. 2009
Changwoo Byun Ilkook Yun Seog Park

When numerous users and applications work concurrently on Extensible Markup Language (XML) documents, the transaction management of these XML documents becomes an important issue. The detection of conflicts between operations becomes vital in the query optimization for a query compiler and concurrency for a transaction manager. XML data require tailor-made conflict detection mechanisms since tr...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه یزد - دانشکده علوم اجتماعی 1392

this study aims to investigate value conflicts between mothers and their daughters among families and influential factors on this conflict in yazd city. this study adopted a survey method and a questionnaire was used that its validity through construct validity (factor analysis) and its reliability by cronbach alpha were measured. the population of this study consists of all yazdian families th...

Journal: :IJEIS 2010
Kerstin Altmanninger Wieland Schwinger Gabriele Anderst-Kotsis

In collaborative software development, the utilization of Version Control Systems (VCSs) is a must. For this, a multitude of pessimistic as well as optimistic VCSs for model artifacts emerged. Pessimistic approaches follow the lock-edit-unlock paradigm whereas optimistic approaches allow parallel editing of one resource, which are therefore the preferred ones. To be flexible for the ever increa...

2008
Arrvindh Shriraman Sandhya Dwarkadas

In the search for high performance, most transactional memory (TM) systems execute atomic blocks concurrently and must thus be prepared for data conflicts. These conflicts must be detected and the system must choose a policy in terms of when and how to manage the resulting contention. Conflict detection essentially determines when the conflict manager is invoked, which can be dealt with eagerly...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید