نتایج جستجو برای: applying bordieus theory
تعداد نتایج: 911375 فیلتر نتایج به سال:
Although numerous studies have attempted to understand the causes of various forms of police misconduct, there is still no clear theoretical explanation of police misbehavior. Akers’ social learning theory posits that peer associations, attitudes, reinforcement, and modeling are predictors of delinquency and crime in general. With this article, we seek to determine if the theory can account for...
The problem of autonomous navigation of a mobile device is at the heart of the more general issue of spatial awareness and is now a well-studied problem in the robotics community. Following a plethora of approaches throughout the history of this research, recently, implementations have been converging towards vision-based methods. While the primary reason for this success is the enormous amount...
With existing technology, it is already possible for personal agents to schedule meetings for their users, to write the small print of an agreement, and for agents to search the Internet for the cheapest price. But serious negotiation cranks the difficulty of the problem up several notches. In this paper, we review what game theory has to offer in the light of experience gained in programming a...
The aim of this study was to propose and validate the new scaling method, fuzzy partial credit scaling (FPCS), which combines fuzzy set theory with the partial credit model (PCM) to score rating scales. To achieve this goal, the Chinese version of BDI (Beck Depression Inventory-II) was administrated to a depressed sample of patients and a non-depressed sample. The depressed sample consisted of ...
This paper analyzes the three most common interpretations of probability (frequentist, subjective, and logical) in the context of AGI, and argues that probability theory cannot serve a central role in the theoretical foundation of AGI. 1 Probability and Its Interpretations Probability theory is the most mature formal model for uncertainty representation and calculation, and has been successfull...
The tools currently available in each of these domains are not powerful enough alone to account for the diversity and complexity of content typical of real everyday life egocentric videos. Current maps, composed of meaningless geometric entities, are quite poor for performing high-level tasks such as object manipulation. Focusing on functional human activities (that often involve interactions w...
Data in the world, and more specifically on the Internet is growing to massive sizes. In order to make this information more useful, it must first be more accessible. The INEX Initiative competition is aimed with the goal of identifying and comparing methodologies for categorizing information into clusters. The competition will be run on 60 gigabytes of data from Wikipedia, with the ultimate go...
We introduce a new connection between formal language theory and proof theory. One of the most fundamental proof transformations in a class of formal proofs is shown to correspond exactly to the computation of the language of a certain class of tree grammars. Translations in both directions, from proofs to grammars and from grammars to proofs, are provided. This correspondence allows theoretica...
This research evaluates the human impact that password authentication issues have on the security of information systems within organizations. This research resulted in the creation of password guidelines for authentication with passwords based on Miller’s (1956) and Cowan’s (2001) chunking theory research and a model for predicting the vulnerability that a particular set of conditions have on ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید