Author of the publication

A comparison of reinforcer assessment methods: The utility of verbal and pictorial choice procedures

, , , , and . Journal of Applied Behavior Analysis, 29 (2): 201--212 (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Leg with rotational joint that mimics elastic characteristics of human leg in running stance phase., , , , , , , , , and 3 other author(s). Humanoids, page 481-486. IEEE, (2014)A comparison of reinforcer assessment methods: The utility of verbal and pictorial choice procedures, , , , and . Journal of Applied Behavior Analysis, 29 (2): 201--212 (1996)Signaling System 7 (SS7) Message Transfer Part 2 (MTP2) - User Peer-to-Peer Adaptation Layer (M2PA), , , , and . RFC 4165 (Proposed Standard), (September 2005)Transmission electron microscopy characterization of the initial stage of epitaxial growth of GaP on Si by low-pressure metalorganic chemical vapor deposition, , , , , and . Appl.~Phys.~Lett., (1991)A Comparative Study of Lossless Compression Algorithms on Multi-spectral Imager Data., , , , , , and . DCC, page 447. IEEE Computer Society, (2009)Performance evaluation of GSM and GPRS systems based on measurement campaigns and statistical analysis., , , , , , and . GLOBECOM, page 1522-1526. IEEE, (2002)Mixed anti-jamming strategies in fixed-rate wireless systems over fast fading channels., and . ISIT, page 2522-2526. IEEE, (2009)Multimedia Modular Training Packages by EUAIN., , and . ELPUB, page 91-100. (2007)Automatic content-based analysis of georeferenced image data: Detection of Beggiatoa mats in seafloor video mosaics from the Håkon Mosby Mud Volcano., , , and . Comput. Geosci., 33 (2): 202-218 (2007)Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication., , , , and . CoRR, (2020)