نتایج جستجو برای: authenticity

تعداد نتایج: 6831  

2016
Catherine E. Connelly Ofir Turel

Members of virtual teams lack many of the visual or auditory cues that are usually used as the basis for impressions about fellow team members. We focus on the effects of the impressions formed in this context, and use social exchange theory to understand how these impressions affect team performance. Our pilot study, using content analysis (n = 191 students), suggested that most individuals be...

Journal: :Psychological science 2015
Francesca Gino Maryam Kouchaki Adam D Galinsky

The five experiments reported here demonstrate that authenticity is directly linked to morality. We found that experiencing inauthenticity, compared with authenticity, consistently led participants to feel more immoral and impure. This link from inauthenticity to feeling immoral produced an increased desire among participants to cleanse themselves and to engage in moral compensation by behaving...

2017
Ning Zhang Lin Zhang Zaixi Cheng

To train and evaluate fog/haze removal models, it is highly desired but burdensome to collect a large-scale dataset comprising well-aligned foggy/hazy images with their fog-free/haze-free versions. In this paper, we propose a framework, namely Foggy and Hazy Images Simulator (FoHIS for short), to simulate more realistic fog and haze effects at any elevation in images. What’s more, no former stu...

Z. Piravi Vanak

The issue of the integrity of edible oils and fats can be considered in three main areas of safety, authenticity and quality in accordance with the standardization approach. Safety is the most essential part of the food, including edible oils, due to effects on health of consumers. Authenticity equivalent to purity is also an important aspect of this approach. The nature and prevention of fraud...

2012
Dipankar Maitra

The paper explores the usage of complaint registration system in India. In many cases, people want to file a complaint or be whistleblower but fear consequences from disclosure of identity. On the other hand, authorities though focused on authenticity of the complaint and not identity of complainant yet it is difficult to establish authenticity of the complaint registered in case of anonymous o...

2010
Michele Bugliesi Stefano Calzavara Damiano Macedonio

We introduce a calculus with mobile names, distributed principals and primitives for secure remote communication, without any reference to explicit cryptography. The calculus is equipped with a system of types and effects providing static guarantees of secrecy and authenticity in the presence of a Dolev-Yao intruder. The novelty with respect to existing type systems for security is in the struc...

2014
Kavitha K J

The rapid growth in information and communication technologies has advances the medical data management systems immensely. In this regard, many different techniques and also the advanced equipment like Magnetic Resonance Imaging (MRI) Scanner, Computer Tomography (CT) scanner, Positron Emission of Tomography (PET), mammography, ultrasound, radiography etc. are used. Nowadays there is a rise of ...

Journal: :Concurrency and Computation: Practice and Experience 2003
Peter Müller Arnd Poetzsch-Heffter Gary T. Leavens

ion. The only restriction is that the field names of the dependees must be specified in the depends clauses. 5.1.2.2. Locality Rule. The locality rule is fairly natural: Usually, abstractions of dynamic components abstract from the states of their interface and representation objects. As long as these objects are reachable from an interface object via read-write references, such abstractions me...

Journal: :Cosmopolitan Civil Societies: An Interdisciplinary Journal 2009

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید