نتایج جستجو برای: multiple identities

تعداد نتایج: 781070  

The concept of sustainability is encouraged to preserve natural resources, social values, cultural heritage, and economic capital, which already exist to make available them for the next generations. Moreover, to enhance the level of sustainability in communities, numerous scholars indicated both individual and community identities play a crucial role. Sustainability is attainable and successfu...

2002
John R. Douceur

Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these “Sybil attacks” is to have a trusted ag...

Journal: :Int. J. Game Theory 2014
Liad Wagman Vincent Conitzer

In open, anonymous settings such as the Internet, agents can participate in a mechanism multiple times under different identities. A mechanism is false-name-proof if no agent ever benefits from participating more than once. Unfortunately, the design of false-name-proof mechanisms has been hindered by a variety of negative results. In this paper, we show how some of these negative results can be...

2015
Michele F. Margolis Michelle Torres Pacheco Steven Smith Betsy Sinclair

Identification with a social group can operate as a powerful heuristic, allowing an individual to easily make political judgments. But, a person can identify with multiple groups, which may be mobilized toward different political ends. How do opinions and behaviors change when a person’s identities are in competition with each other, creating cross-pressures? The Evangelical Immigration Table (...

2006
Wojciech Zajdel Ali Taylan Cemgil Ben J. A. Kröse

This paper presents a surveillance system for tracking multiple people through a wide area with sparsely distributed cameras. The computational core of the system is an adaptive probabilistic model for reasoning about peoples’ appearances, locations and identities. The system consists of two processing levels. At the low-level, individual persons are detected in the video frames and tracked at ...

2015
Kenneth Joseph Wei Wei Matthew Benigni Kathleen M. Carley

We describe a new methodology to infer sentiments held towards identities and behaviors from social events that we extract from a large corpus of newspaper text. Our approach draws on Affect Control Theory, a mathematical model of how sentiment is encoded in social events and culturally-shared views towards identities and behaviors. While most sentiment analysis approaches evaluate concepts on ...

2010
Dina Birman Irena Persky Wing Yi Chan

The current paper explores the salience and impact of ethnic and national identities for immigrants that are negotiating more than two cultures. Specifically, we were interested in the ways in which Jewish immigrant adolescents from the former Soviet Union integrate their Russian, Jewish, and American identities, and to what extent identification with these three cultures predicts adaptation to...

2016
Louise Neil Giulia Cappagli Themelis Karaminis Rob Jenkins Elizabeth Pellicano

Unfamiliar face recognition follows a particularly protracted developmental trajectory and is more likely to be atypical in children with autism than those without autism. There is a paucity of research, however, examining the ability to recognize the same face across multiple naturally varying images. Here, we investigated within-person face recognition in children with and without autism. In ...

2011
Ross J. Anderson

There has been much academic discussion of federated authentication, and quite some political manoeuvring about ‘e-ID’. The grand vision, which has been around for years in various forms but was recently articulated in the US National Strategy for Trustworthy Identities in Cyberspace (NSTIC), is that a single logon should work everywhere [1]. You should be able to use your identity provider of ...

2005
Jesse Davis Inês Dutra David Page

Identity Equivalence or Alias Detection is an important topic in Intelligence Analysis. Often, terrorists will use multiple different identities to avoid detection. We apply machine learning to the task of determining Identity Equivalence. Two challenges exist in this domain. First, data can be spread across multiple tables. Second, we need to limit the number of false positives. We present a t...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید