Results 351 to 360 of about 16,785,403 (406)
Some of the next articles are maybe not open access.

The theory of planned behavior: Frequently asked questions

Human Behavior and Emerging Technologies, 2020
The theory of planned behavior (TPB — Ajzen, Organizational Behavior and Human Decision Processes, 1991, 50, 179 – 211; Ajzen, Handbook of theories of social psychology, 2012, 1, 438 – 459) has been widely applied to the prediction and change of behavior,
I. Ajzen
semanticscholar   +1 more source

The "What" and "Why" of Goal Pursuits: Human Needs and the Self-Determination of Behavior

, 2000
Self-determination theory (SDT) maintains that an understanding of human motivation requires a consideration of innate psychological needs for competence, autonomy, and relatedness.
E. Deci, Richard M. Ryan
semanticscholar   +1 more source

Density-functional exchange-energy approximation with correct asymptotic behavior.

Physical review. A, General physics, 1988
Current gradient-corrected density-functional approximations for the exchange energies of atomic and molecular systems fail to reproduce the correct 1/r asymptotic behavior of the exchange-energy density.
A. Becke
semanticscholar   +1 more source

Observational study of behavior: sampling methods.

Behaviour, 1974
Seven major types of sampling for observational studies of social behavior have been found in the literature. These methods differ considerably in their suitability for providing unbiased data of various kinds. Below is a summary of the major recommended
J. Altmann
semanticscholar   +1 more source

Behavioral contracts and behavioral subtyping

ACM SIGSOFT Software Engineering Notes, 2001
Component-based software manufacturing has the potential to bring division-of-labor benefits to the world of software engineering. In order to make a market of software components viable, however, producers and consumers must agree on enforceable software contracts.
Mario Latendresse   +2 more
openaire   +2 more sources

Cooperative diversity in wireless networks: Efficient protocols and outage behavior

IEEE Transactions on Information Theory, 2004
We develop and analyze low-complexity cooperative diversity protocols that combat fading induced by multipath propagation in wireless networks. The underlying techniques exploit space diversity available through cooperating terminals' relaying signals ...
J. N. Laneman, David Tse, G. Wornell
semanticscholar   +1 more source

Behavioral Analysis in Behavioral Medicine

Behavior Modification, 1985
That the application of behavioral procedures to the treatment and prevention of physical illness has proliferated cannot be disputed. A number of factors have contributed to this growth. This article examines the application of behavior analytic methods as a major contributing factor.
William H. Redd, Frank R. Rusch
openaire   +3 more sources

Adolescence-limited and life-course-persistent antisocial behavior: a developmental taxonomy.

Psychology Review, 1993
A dual taxonomy is presented to reconcile 2 incongruous facts about antisocial behavior: (a) It shows impressive continuity over age, but (b) its prevalence changes dramatically over age, increasing almost 10-fold temporarily during adolescence.
T. Moffitt
semanticscholar   +1 more source

Theory of games and economic behavior

100 Years of Math Milestones, 1945
This is the classic work upon which modern-day game theory is based. What began more than sixty years ago as a modest proposal that a mathematician and an economist write a short paper together blossomed, in 1944, when Princeton University Press ...
W. E. Deming   +2 more
semanticscholar   +1 more source

Theory of Games and Economic Behavior

, 2006
The nature of the problems investigated and the techniques employed in this book necessitate a procedure which in many instances is thoroughly mathematical.
Robert Leonard
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy