نتایج جستجو برای: proactive reaction

تعداد نتایج: 425491  

2012
Joonhee Kwon

Pervasive systems are becoming increasingly popular, with the appearance and penetration of mobile devices such as smart phones. Proactive service is one of the most important fields of research in pervasive computing. We propose a method for an effective proactive service in pervasive computing environment. Most of previous researches do not consider characteristics of both social network and ...

Journal: :Journal of child psychology and psychiatry, and allied disciplines 2006
Edward D Barker Richard E Tremblay Daniel S Nagin Frank Vitaro Eric Lacourse

BACKGROUND Different developmental courses have been postulated for proactive and reactive aggression. OBJECTIVE Investigated the developmental course of proactive and reactive aggression in a large sample of adolescent boys from low socioeconomic areas. METHOD A dual group-based joint trajectory method was used to identify distinct trajectories as well as similarities and differences in in...

2015
Marcela Ribeiro Ana de Ávila Jurandir Zullo Caetano Traina

A framework to develop proactive BI is presented and discussed in this chapter. In a proactive process, analysis develops as a scientific investigation or research, where analysts must discover an initial set of hypotheses and then test or evaluate the hypotheses. The steps of the framework are presented and ways to perform each step are discussed. Data mining techniques are associated to this ...

2008
Adam M. Grant Susan J. Ashford

As the organizational literature on specific proactive behaviors grows, researchers have noted inefficiencies and redundancies in the separate study of different proactive behaviors when their underlying nature, antecedents, processes, and consequences may be similar. We develop a framework designed to generalize across specific manifestations of proactivity, describing the nature, dimensions, ...

Journal: :Journal of experimental psychology. Learning, memory, and cognition 2015
Lauren L Richmond Thomas S Redick Todd S Braver

The dual mechanisms of control framework postulates that cognitive control can operate in 2 distinct modes: a "proactive" preparatory mode and a "reactive" wait-and-see mode. Importantly, the 2 modes are associated with both costs and benefits in cognitive performance. Here we explore this framework, in terms of its relationship with working memory capacity (WMC). We hypothesize that high-WMC i...

2015
Stanley Loh

A framework to develop proactive BI is presented and discussed in this chapter. In a proactive process, analysis develops as a scientific investigation or research, where analysts must discover an initial set of hypotheses and then test or evaluate the hypotheses. The steps of the framework are presented and ways to perform each step are discussed. Data mining techniques are associated to this ...

Journal: :IACR Cryptology ePrint Archive 1996
Yair Frankel Peter Gemmell Philip D. MacKenzie Moti Yung

The notion of \proactive security" of basic primitives and cryptosystems has been introduced by Ostrovsky and Yung to deal with a very strong \mobile adversary" who may corrupt all participants (servers, each with private memory) throughout the lifetime of the system in a non-monotonic fashion (i.e. recoveries are possible), but who is not able to corrupt too many participants during any short ...

2010
Kyle Ristig

This research empirically examines the relationship between trust and voice, proactive personality and voice, and whether proactive personality moderates the relationship between trust and voice. A total of 105 employees were surveyed using a 14 item instrument to assess the subjects’ responses to the factors under investigation, as well as demographic characteristics. Based on regression analy...

2010
Marius Iulian Corici Dragos Vingarzan Thomas Magedanz Cornel Pampu Qing Zhou

Mobility in a wireless heterogeneous scenario in which the mobile devices are able to connect to more than one access technology available in their vicinity requires a re-consideration of the access network reselection mechanisms as to ensure seamless handovers for real deployments. This paper describes and evaluates a new proactive vertical handover optimization which enables a fast reselectio...

2012
Vaibhav Kumar R. P. Ojha

This research paper introduces a scheme to secure any secret value in cloud network by Mobile Proactive Secret Sharing (MPSS). This is an extension of proactive secret sharing, where contributing parties of a network hold the shares of a secret value. Mobile proactive secret sharing is much more flexible than proactive secret sharing in terms of group membership: instead of the group of shareho...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید