• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 94
Next 10 →

Trust and Provenance You Can’t Have One Without The Other

by Krzysztof Janowicz
"... Abstract. On the social web content is no longer generated by a small number of established authorities but by a huge number of mostly anonymous users. On the semantic web new content is created by combining existing information from different sources on the fly. In both cases trust is of fundamenta ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Abstract. On the social web content is no longer generated by a small number of established authorities but by a huge number of mostly anonymous users. On the semantic web new content is created by combining existing information from different sources on the fly. In both cases trust

The Bulging Pocket and the Rule of Law: Corruption, Inequality, and Trust

by Eric M. Uslaner, Eric M. Uslaner
"... Corruption is generally considered to be a curse. It flouts rules of fairness and gives some people advantages that others don’t have. Corruption transfers resources from the mass public to the elites–and generally from the poor to the rich. It acts as an extra tax on citizens, leaving less money fo ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
. On the other hand, inequality and trust–like corruption–are also sticky over time. The connection between inequality and the quality of government is not necessarily so simple: As the former Communist nations of Central and Eastern Europe show, you can have plenty of corruption without economic inequality

Assessing secure base behavior in adulthood: Development of a measure, links to adult attachment representations, and relationships to couples’ communication and reports of relationships.

by Judith A Crowell , Dominique Treboux , Yuan Gao , Celene Fyffe , Helen Pan , Everett Waters - Developmental Psychology, , 2002
"... A focus on the secure base phenomenon creates a framework for exploring the function of the attachment system in adulthood. Engaged couples (N ϭ 157) were videotaped in a problem-solving interaction and assessed using the Secure Base Scoring System (SBSS), a system based on Ainsworth's analyse ..."
Abstract - Cited by 27 (4 self) - Add to MetaCart
behaviors are given when the adult uses an attachment or secure base explanatory framework in his or her remarks, for example, "Our relationship is supposed to help us each be better than we can be on our own," or "I feel like I can't trust you to be there for us when you spend the money

Formal Analysis of a Privacy-Preserving Billing Protocol

by Ro Arm, Roberto Carbone, Alessio Merlo
"... Abstract. We provide a formal model and a security analysis of the Private Billing Protocol. This formal analysis allowed us to spell out precisely the details of the protocol, the security assumptions as well as the expected security goals. For the formal analysis we used SATMC, a model checker for ..."
Abstract - Add to MetaCart
Abstract. We provide a formal model and a security analysis of the Private Billing Protocol. This formal analysis allowed us to spell out precisely the details of the protocol, the security assumptions as well as the expected security goals. For the formal analysis we used SATMC, a model checker

Semantic Slack page 1 in Foundations of Speech Act Theory, S. L. Tsohatzidis (ed.), Routledge (1994) SEMANTIC SLACK: What is said and more

by Kent Bach
"... Like Humpty Dumpty, many philosophers take pride in saying what they mean and meaning what they say. Literalism does have its virtues, like when you're drawing up a contract or programming a computer, but generally we prefer to speak loosely and leave a lot to inference. Language works far more ..."
Abstract - Add to MetaCart
? ” Was Mrs. Unger stretching the truth? In a way, yes. She could have said, “You're not going to die from this cut, ” which would have been more to the point, but she didn't. She didn't bother saying that because she saw no reason to spell out what she meant. She wasn’t being obscure and she

LIES, DAMN LIES, AND STATISTICS A Rejoinder to the Comment

by Stuart Jay Deutsch
"... t t one time or another in the past, I have used the saying &dquo;I don’t~,~~care what you say about me as long as you spell the name right.&dquo; After reading the article by Hay and McCleary, about the only thing that can be said is they certainly have spelled the name right (some 56 times ..."
Abstract - Add to MetaCart
t t one time or another in the past, I have used the saying &dquo;I don’t~,~~care what you say about me as long as you spell the name right.&dquo; After reading the article by Hay and McCleary, about the only thing that can be said is they certainly have spelled the name right (some 56

guidance of Prof. Raj Jain)

by A Survey Of Kerberos V, Public-key Kerberos
"... Kerberos was initially developed at MIT as a part of Project Athena and in these days it is widely deployed single sign-on protocol that is developed to authenticate clients to multiple networked services. Furthermore, Cross-realm authentication is a useful and interesting component of Kerberos aime ..."
Abstract - Add to MetaCart
Kerberos was initially developed at MIT as a part of Project Athena and in these days it is widely deployed single sign-on protocol that is developed to authenticate clients to multiple networked services. Furthermore, Cross-realm authentication is a useful and interesting component of Kerberos aimed at enabling secure access to services astride organizational boundaries. Also, Kerberos has continued to evolve as new functionalities are added to the basic protocol and one of well-known these protocols is PKINIT. First, I review and analyze the structure of Kerberos recently proposed and the cross-realm authentication model of Kerberos. Also, I discuss PKINT, an extension version of Kerberos, which modifies the basic protocol to allow public-key authentication. Although Kerberos has been proven its strengths so far, it also has a number of limitations and some flaws. I dedicate my efforts to an analysis of PKINIT and mainly focus on a number of vulnerability, flaws and attacks lately discovered on Kerberos as well as PKINIT in this paper. Lastly, I introduce several possible solutions to

Acknowledgements

by Silviu I. Baluti , 2005
"... Eighteen months of long hours work is now contained into this tome. It was fulfilled with the support of people involved with it either directly, or indirectly. They are those to whom I dedicate this thesis. My thanks and gratitude to my thesis advisor, Dr. Susan Krumdieck. You helped me with the sc ..."
Abstract - Add to MetaCart
me coming late at night, after long days of struggle with theoretical flow dynamics and vacuum theory concepts, or stubborn experiments. You always trusted me, and can see now that your trust wasn’t in vane. The laboratory technicians and workshop tradesmen, thanks for helping me making things work

2 The Circle of Leadership Integrity Within Business Organizations

by Avraham Cohen, Karen Fiorini, Tom Culham, Heesoon Bai
"... In recent times, the economic crisis and associated meltdowns of companies have contributed to an increasingly negative perception of business and industry. Numerous corporate scandals and failures have motivated people to ask questions about the leaders at the forefront of these organizations, and ..."
Abstract - Add to MetaCart
). If a leader cannot demonstrate the values that he/ she expects from others, it often ruptures the trust between her/him and the people she/he is leading. Without trust, there is no leadership. A break in trust can create damage from which it is almost impossible to recover. When people begin to lose

To minister: to attend to the needs (of)Portfolio: a flat case, esp. of leather, usedfor carrying maps, drawings etc.

by Collins English Dictionary
"... “Good morning. Please sit down. Thank you for coming for your appraisal. Can I see what evidence of your good medical practice you have brought with you?” By 31 March 2002 all consultant oph-thalmologists practising in the United Kingdom should have been appraised. As appraisal has been an essential ..."
Abstract - Add to MetaCart
, but don’t expect me to engage in it ” category (2) The “if I have to do it, I may as well see if I can get something out of it” category. Whatever category you feel you are in as you read this, the following, which is largely drawn from the Association for
Next 10 →
Results 1 - 10 of 94
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University