نتایج جستجو برای: practical identity

تعداد نتایج: 347233  

1999
ALLAN FELDMAN

The work of science teachers can be viewed from a variety of perspectives. In this article, teaching is seen as an activity in which teachers deliberate in the practical domain to decide on actions and goals. In the first part of the article, it is argued that, because practical reasoning is similar to scientific reasoning, a model of practical conceptual change can be developed that is analogo...

2005
Hak Soo Ju Dae Youb Kim Dong Hoon Lee Jongin Lim Kilsoo Chun

Recently, Libert and Quisquater showed that the fast revocation method using a SEcurity Mediator(SEM) in a mRSA can be applied to the Boneh-Franklin identity based encryption and GDH signature scheme. In this paper we propose a mediated identity based signature(mIBS) scheme which applies the SEM architecture to an identity based signature. The use of a SEM offers a number of practical advantage...

Journal: :IACR Cryptology ePrint Archive 2006
Eike Kiltz David Galindo

We describe a new and practical identity-based key encapsulation mechanism that is secure in the standard model against chosen-ciphertext (CCA2) attacks. Since our construction is direct and not based on hierarchical identity-based encryption, it is more efficient than all previously proposed schemes. Furthermore, we give the first chosen-ciphertext secure identity-based key encapsulation mecha...

Journal: :American Indian and Alaska native mental health research 2016
Barbara Gfellner

This study investigated associations between ego strengths (psychosocial development), racial/ethnic identity using Multi-Ethnic Identity Measure-Revised (exploration, commitment) and Multidimensional Measure of Racial Identity (centrality, private regard, public regard) dimensions, and personal adjustment/well-being among 178 North American Indian/First Nations adolescents who resided and atte...

2014
Wouter Beek Stefan Schlobach Frank van Harmelen

Identity relations are at the foundation of the Linked Open Data initiative and on the Semantic Web in general. They allow the interlinking of alternative descriptions of the same thing. However, many practical uses of owl:sameAs are known to violate its formal semantics. We propose a method that assigns meaning to (the subrelations of) an identity relation using the predicates of the dataset s...

2008
ONG SING

Interactive conversation agents or CAs are computer programs or application software designed to simulate conversation with one or more human users in natural language. Providing CAs with knowledge, intelligence and humanoid interface has allowed them to be used in several practical applications. This paper presented the development and its performance of the interactive CAs called Artificial I...

2005
Paul C. van Oorschot Stuart G. Stubblebine

One of today’s fastest growing crimes is identity theft – the unauthorized use and exploitation of another individual’s identity-corroborating information. It is exacerbated by the availability of personal information on the Internet. Published research proposing technical solutions is sparse. In this paper, we identify some underlying problems facilitating identity theft. To address the proble...

2008
Uri Gal Tina Blegind Jensen

In this paper we explore the interplay between organisational identity and information systems (IS). More specifically, we examine how the appropriation of new IS may influence established patterns of identity enactment and inter-organisational practices. We report on findings from three in-depth case studies that depict the adoption and use of a new collaborative 3D modelling technology by a m...

Journal: :Psychological science 2006
Cheryl R Kaiser S Brooke Vick Brenda Major

Two studies examined whether chronic and situational expectations about being stigmatized predict attention toward cues that are threatening to social identity. In Study 1, women's chronic expectations about experiencing sexism were positively associated with their attention toward subliminal cues threatening to their social identity. In Study 2, women were vigilant toward subliminal cues threa...

2016
Wouter Beek Stefan Schlobach Frank van Harmelen

Identity relations are at the foundation of the Semantic Web and the Linked Data Cloud. In many instances the classical interpretation of identity is too strong for practical purposes. This is particularly the case when two entities are considered the same in some but not all contexts. Unfortunately, modeling the specific contexts in which an identity relation holds is cumbersome and, due to ar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید