نتایج جستجو برای: proactive

تعداد نتایج: 13365  

2008
Junwei Cao Xingchen Chu Srikumar Venugopal Rajkumar Buyya

This chapter presents the design and implementation of seamless integration of two complex systems component-based distributed application framework ProActive and Gridbus Resource Broker. The integration solution provides: (i) the potential ability for component-based distributed applications developed using ProActive framework, to leverage the economy-based and dataintensive scheduling algorit...

1999
Douglas R. Stinson Ruizhong Wei

Verifiable secret sharing schemes (VSS) are secret sharing schemes dealing with possible cheating by the participants. In this paper, we propose a new unconditionally secure VSS. Then we construct a new proactive secret sharing scheme based on that VSS. In a proactive scheme, the shares are periodically renewed so that an adversary cannot get any information about the secret unless he is able t...

2005
Jamie A. Gruman Alan M. Saks

The purpose of this study was to integrate research on organizational socialization tactics and newcomer proactive tactics. Based on the work term experiences of a sample of co-op management students, the results indicate that organizational socialization tactics are positively related to newcomer proactive tactics (feedback seeking, information seeking, networking, boss relationship building, ...

2012
Joonhee Kwon

Pervasive systems are becoming increasingly popular, with the appearance and penetration of mobile devices such as smart phones. Proactive service is one of the most important fields of research in pervasive computing. We propose a method for an effective proactive service in pervasive computing environment. Most of previous researches do not consider characteristics of both social network and ...

Journal: :Journal of child psychology and psychiatry, and allied disciplines 2006
Edward D Barker Richard E Tremblay Daniel S Nagin Frank Vitaro Eric Lacourse

BACKGROUND Different developmental courses have been postulated for proactive and reactive aggression. OBJECTIVE Investigated the developmental course of proactive and reactive aggression in a large sample of adolescent boys from low socioeconomic areas. METHOD A dual group-based joint trajectory method was used to identify distinct trajectories as well as similarities and differences in in...

2015
Marcela Ribeiro Ana de Ávila Jurandir Zullo Caetano Traina

A framework to develop proactive BI is presented and discussed in this chapter. In a proactive process, analysis develops as a scientific investigation or research, where analysts must discover an initial set of hypotheses and then test or evaluate the hypotheses. The steps of the framework are presented and ways to perform each step are discussed. Data mining techniques are associated to this ...

2008
Adam M. Grant Susan J. Ashford

As the organizational literature on specific proactive behaviors grows, researchers have noted inefficiencies and redundancies in the separate study of different proactive behaviors when their underlying nature, antecedents, processes, and consequences may be similar. We develop a framework designed to generalize across specific manifestations of proactivity, describing the nature, dimensions, ...

Journal: :Journal of experimental psychology. Learning, memory, and cognition 2015
Lauren L Richmond Thomas S Redick Todd S Braver

The dual mechanisms of control framework postulates that cognitive control can operate in 2 distinct modes: a "proactive" preparatory mode and a "reactive" wait-and-see mode. Importantly, the 2 modes are associated with both costs and benefits in cognitive performance. Here we explore this framework, in terms of its relationship with working memory capacity (WMC). We hypothesize that high-WMC i...

2015
Stanley Loh

A framework to develop proactive BI is presented and discussed in this chapter. In a proactive process, analysis develops as a scientific investigation or research, where analysts must discover an initial set of hypotheses and then test or evaluate the hypotheses. The steps of the framework are presented and ways to perform each step are discussed. Data mining techniques are associated to this ...

Journal: :IACR Cryptology ePrint Archive 1996
Yair Frankel Peter Gemmell Philip D. MacKenzie Moti Yung

The notion of \proactive security" of basic primitives and cryptosystems has been introduced by Ostrovsky and Yung to deal with a very strong \mobile adversary" who may corrupt all participants (servers, each with private memory) throughout the lifetime of the system in a non-monotonic fashion (i.e. recoveries are possible), but who is not able to corrupt too many participants during any short ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید