نتایج جستجو برای: basic trust

تعداد نتایج: 329153  

Journal: :مدیریت اطلاعات سلامت 0
سید حمیدرضا شاوران دکتری، مدیریت آموزشی، دانشکده ی علوم تربیتی، دانشگاه اصفهان، اصفهان، ایران سعید رجایی پور استادیار، مدیریت آموزش عالی، دانشکده ی علوم تربیتی، دانشگاه اصفهان، اصفهان، ایران ایرج کاظمی استادیار، آمار کاربردی، دانشکده ی علوم، دانشگاه اصفهان، اصفهان، ایران بی بی عشرت زمانی دانشیار، تکنولوژی آموزشی، دانشکده ی علوم تربیتی، دانشگاه اصفهان، اصفهان، ایران

introduction: universities and their faculty members are responsible for educating students for social responsibilities. if the faculty members are to contribute to the attainment of university and societal goals, they should trust their dean, colleagues, and students. this will facilitate the collective efficacy of faculty members. if faculty members believe in their collective abilities, the ...

Journal: :J. Comput. Syst. Sci. 2014
Aarthi Nagarajan Vijay Varadharajan Nathan Tarr

a r t i c l e i n f o a b s t r a c t In this paper, we propose a trust enhanced distributed authorisation architecture (TEDA) that provides a holistic framework for authorisation taking into account the state of a user platform. The model encompasses the notions of 'hard' and 'soft' trust to determine whether a platform can be trusted for authorisation. We first explain the rationale for the o...

2017
Andrea Ballini Salvatore Scacco Dario Coletti Stefano Pluchino Marco Tatullo

Department of Basic Medical Sciences, Neurosciences and Sense Organs, University of Bari “Aldo Moro”, Bari, Italy Institut de Biologie-Biology of Adaptation and Aging (B2A), Université Pierre et Marie Curie Paris 6, Paris, France Department of Clinical Neurosciences-Division of Stem Cell Neurobiology, Wellcome Trust-Medical Research Council Stem Cell Institute and NIHR Biomedical Research Centr...

1995
Paul T. Boggs Jon W. Tolle Anthony J. Kearsley

In (Boggs, Tolle and Kearsley 1994b) the authors introduced an eeective algorithm for general large scale nonlinear programming problems. In this paper we describe the theoretical foundation for this method. The algorithm is based on a trust region, sequential quadratic programming (SQP) technique and uses a special auxiliary function, called a merit function or line-search function, for assess...

Journal: :JAMA 2017
Alia Crum Barry Zuckerman

Duringthepast fewdecades,significantbiomedicaladvances have increased diagnostic and treatment effectiveness.Recentresearchfrompsychologyprovidesaspecialopportunitytoaddvaluetothetraditionalcornerstone ofmedicine: the patient-clinician relationship. What is it about the conversation between patient and physician that gives it therapeutic value? At the most basic level, physicians and other clin...

Journal: :تحقیقات فرهنگی ایران 0
سیدمهدی اعتمادی فرد استادیار جامعه شناسی دانشگاه تهران

social system based on mutual trust among members continues to exist. social trust in modem era is more important than earlier periods. subject of current report is focused on the trust of iranian students in different aspects. main question in this investigation is about social-political trust of these students (based on trust in islamic republic of iran) at the past and present. this matter e...

Journal: :Computers & Chemical Engineering 2014
Gene A. Bunin

In this short note, the recently popular modifier-adaptation framework for real-time optimization is discussed in tandem with the well-developed trustregion framework of numerical optimization, and it is shown that the basic version of the former is simply a special case of the latter. This relation is then exploited to propose a globally convergent modifier-adaptation algorithm using already d...

2011
Nicolas Liebau Andreas Mauthe Vasilios Darlagiannis Ralf Steinmetz

Trustworthy applications in fully decentralized systems require a trust anchor. This paper describes how such an anchor can be implemented efficiently in p2p systems. The basic concept is to use threshold cryptography in order to sign messages by a quorum of peers. The focus is put on advanced mechanisms to secure the shares of the secret key over time, using proactive secret sharing. This mech...

Journal: :Advances in Psychological Science 2021

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید