Results 201 to 210 of about 41,579 (241)
Research on the mechanism of perceived value of cultural and creative products on consumers' purchase intention. [PDF]
Lu X, Li S, Wang Z.
europepmc +1 more source
Social policies as determinants of health: new evidence, ongoing challenges, and future pathways. [PDF]
Hamad R.
europepmc +1 more source
Unpacking Young Adults' Fact-Checking Intent on Oral Health Misinformation: Parallel Mediating Roles of Need for Cognition and Perceived Seriousness-A Cross-Sectional Study. [PDF]
Chung D, Zhang Y, Wang J, Meng Y.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Recognition intent and visual word recognition
Consciousness and Cognition, 2009This study adopted a change detection task to investigate whether and how recognition intent affects the construction of orthographic representation in visual word recognition. Chinese readers (Experiment 1-1) and nonreaders (Experiment 1-2) detected color changes in radical components of Chinese characters.
Man-Ying, Wang, Chi-Le, Ching
openaire +2 more sources
Intentions and intention recognition in intelligent agents
Proceedings of the 10th Performance Metrics for Intelligent Systems Workshop, 2010PerMIS 2009 included a special session that explored R&D work using the Theory of Mind (ToM) concept. Simply stated the ToM hypothesis is that intelligent agents attribute mental states to other agents in order to reason in a theory-like fashion about the causal relation between these unobservable mental states and the agents' subsequent behavior [53].
Gary Berg-Cross, Christopher Crick
openaire +1 more source
Attack Intention Recognition Techniques
Advances in Multidisciplinary and scientific Research Journal Publication, 2022When sensitive information is transmitted over computer networks, it faces serious risks. Existing security systems are still limited in their ability to ensure the confidentiality, integrity, and availability of network data. The rapid advancement of network technologies has only aided in the proliferation of network attacks and the concealment of ...
openaire +1 more source

