Sciweavers

4233 search results - page 663 / 847
» Three Paths to Effectiveness
Sort
View
115
Voted
COGSCI
2002
60views more  COGSCI 2002»
15 years 4 months ago
Memory for goals: an activation-based model
Goal-directed cognition is often discussed in terms of specialized memory structures like the "goal stack." The goal-activation model presented here analyzes goal-direct...
Erik M. Altmann, J. Gregory Trafton
125
Voted
CSL
2000
Springer
15 years 4 months ago
Detection of phonological features in continuous speech using neural networks
We report work on the first component of a two stage speech recognition architecture based on phonological features rather than phones. The paper reports experiments on three phon...
Simon King, Paul Taylor
JOC
2000
130views more  JOC 2000»
15 years 4 months ago
A Detailed Analysis of SAFER K
In this paper we analyze the block cipher SAFER K. First, we show a weakness in the key schedule, that has the effect that for almost every key there exists on the average three an...
Lars R. Knudsen
126
Voted
JSCIC
2000
187views more  JSCIC 2000»
15 years 4 months ago
A Boundary Condition Capturing Method for Multiphase Incompressible Flow
In [6], the Ghost Fluid Method (GFM) was developed to capture the boundary conditions at a contact discontinuity in the inviscid compressible Euler equations. In [11], related tec...
Myungjoo Kang, Ronald Fedkiw, Xu-Dong Liu
IEPOL
2002
85views more  IEPOL 2002»
15 years 4 months ago
New Economy and ICT development in China
The rapid development and diffusion of the information and communications technology (ICT) is the major driving force of the New Economy. While there is ample evidence to suggest ...
Qingxuan Meng, Mingzhi Li