Search
Now showing items 11161-11170 of 11724
Audit as evidence : the effectiveness of '123 magic' programmes
(2010)
This paper reports on an audit to determine the effectiveness of '123 Magic', a group-based parenting programme that encourages parents to explore, discuss and practice strategies to manage child behaviour. The audit's use ...
Deformation Quasi-Hopf Algebras of Non-semisimple Type from Cochain Twists
(2010)
One way to obtain Quantized Universal Enveloping Algebras (QUEAs) of non-semisimple Lie algebras is by contracting QUEAs of semisimple Lie algebras. We prove that every contracted QUEA in a certain class is a cochain twist ...
Augmented reality stereoscopic visualization for intuitive robot teleguide
(Institute of Electrical and Electronics Engineers (IEEE), 2010)
This paper proposes a method to simultaneously and coherently present visual and laser sensors information through an augmented reality visualization interface further enhanced by stereoscopic viewing. The use of graphical ...
Exploration with Two Cooperating Mobile Robots
(2010)
In this paper a new exploration algorithm using two cooperating robots is introduced. The new technique is a combination of wall-following exploration algorithm and frontier-based exploration algorithm. Furthermore, robots ...
Midpoint ratings on personal constructs : constriction or the middle way?
(2010)
Midpoint ratings of elements on personal constructs have been given various interpretations, and the placement of the ideal self at the midpoint of a construct has been viewed as violating Kelly's (1955) dichotomy and ...
Food and family practices : teenagers, eating and domestic life in differing socio-economic circumstances
(2010)
This paper draws on accounts from young teenagers and their parents in two linked qualitative studies of families living in Scotland in differing socio-economic circumstances. We compare and contrast teenager experiences ...
A non-transitive trust model for key distribution
(2010)
Key distribution mechanisms such as PKI or PGP implicitly assume trust to be transitive. This can be a problematic assumption. The user relies indirectly (often implicitly) on the remote entities to satisfy its trust ...
Delayed switching in memristors and memristive systems
(2010)
It was found that the switching in a memristor takes place with a time delay (this peculiar feature is named “the delayed switching”). This feature has been verified by a circuit-based experiment. The physical interpretation ...
Software defect prediction using static code metrics underestimates defect-proneness
(Institute of Electrical and Electronics Engineers (IEEE), 2010)
Many studies have been carried out to predict the presence of software code defects using static code metrics. Such studies typically report how a classifier performs with real world data, but usually no analysis of the ...