نتایج جستجو برای: multiple identities
تعداد نتایج: 781070 فیلتر نتایج به سال:
The rising popularity of social computing systems has managed to attract rampant forms of service abuse that negatively affects the sustainability of these systems and degrades the quality of service experienced by their users. The main factor that enables service abuse is the weak identity infrastructure used by most sites, where identities are easy to create with no verification by a trusted ...
Rigid thinking is associated with less creativity, suggesting that priming a flexible mind-set should boost creative thought. In three studies, we investigate whether priming multiple social identities predicts more creativity in domains unrelated to social identity. Study 1 asked monoracial and multiracial participants to write about their racial identities before assessing creativity. Priming...
Recently, starting from two infinite summation formulae for Hall-Littlewood polynomials, two of the present authors [7] have generalized a method due to Macdonald [9] to obtain new finite summation formulae for these polynomials. This approach permits them to extend Stembridge’s list of multiple qseries identities of Rogers-Ramanujan type [12]. Conversely these symmetric functions identities ca...
The hypothesis that possessing multiple subordinate-group identities renders a person “invisible” relative to those with a single subordinate-group identity is developed. We propose that androcentric, ethnocentric, and heterocentric ideologies will cause people who have multiple subordinategroup identities to be defined as non-prototypical members of their respective identity groups. Because pe...
Scholars and practitioners are interested in board effectiveness, yet we know relatively little about directors’ engagement in the boardroom. We integrate identity theory and social identity theory research with literature on board monitoring and resource provision to model how directors’ multiple identities affect their behavior. We propose that directors’ strength of identification with multi...
q-Analogues of the coefficients of x in the expansion of ∏N j=1(1 + x + · · · + x )j are proposed. Useful properties, such as recursion relations, symmetries and limiting theorems of the “q-supernomial coefficients” are derived, and a combinatorial interpretation using generalized Durfee dissection partitions is given. Polynomial identities of boson–fermion-type, based on the continued fraction...
On online social media, users join new online social networks (OSNs) to exploit variety of services while maintaining their old identities on other OSNs. A user maintains an identity on each OSN mentioning metadata (e.g. profile information) about her. Heterogeneity of metadata shared by user across OSNs leads to a problem of finding if two online identities on multiple OSNs belong to the same ...
Security is one of the most challenging issues in Mobile ad-hoc networks (MANETs). Most of the routing protocols in MANETs do not have an inbuilt mechanism to fight security attacks. Sybil attack is one such attack in which a single physical device takes on multiple identities in network thus behaving as multiple independent devices. With the help of these forged identities, the attacker can dr...
Computers have introduced into our common experience ‘‘ideas about the instability of meanings and the lack of universal and knowable truths.’’ Online education, in particular, serves as a site for alternative enactments of the self, that is, the embodiment of multiple identities in learners. These multiple identities are rather complex: they are enactments of the self implicated in the politic...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید