Showing 161 - 180 results of 743 for search 'Uproxx~', query time: 1.84s Refine Results
  1. 161

    Sobre la domesticación obrera a través de la vivienda higiénica. Algunos hallazgos (Santiago, 1931-1936) by Diego Morales Barrientos

    Published 2022-07-01
    “…Through the analysis of some hygienic neighborhoods built in Santiago between the decades of the 1920s and 1930s it is possible to recognize circumstances that determined the constant yearly mobility of dozens of their occupants. And, by proxy, it is possible to determine the capacity that these residential complexes had to change the way of living of the working class family.…”
    Get full text
    Article
  2. 162

    Remaining Innovative: The Role of Past Performance, Absorptive Capacity, and Internationalization by Ivan Lapuente Garrido, Ronaldo Couto Parente, Cláudio Reis Gonçalo, Sílvio Luís de Vasconcellos

    Published 2017-01-01
    “…To address this gap we propose and test a framework that integrates the role of past performance as a proxy to investment capacity, realized and potential absorptive capacity and internationalization and their influences on innovativeness, through a survey of 202 Brazilians firms from the Information Technology industry. …”
    Get full text
    Article
  3. 163

    Conference Calls: an Empirical Analysis of Information Content and the Type of Disclosed News by Nadia Cardoso Moreira, Felipe Ramos, Juliana Kozak-Rogo, Rafael Rogo

    Published 2016-01-01
    “…This article analyzes whether the type of news and the earnings persistence influence the amount of in formation that is voluntarily disclosed by the companies. As a proxy for voluntary disclosure we use the information content of the conference calls of the companies listed on the BM&F Bovespa from 2008 to 2015. …”
    Get full text
    Article
  4. 164

    Strong wind is one of the important factors that trigger landslides by Yuan-Chien Lin, Jui-Yun Hsieh, Hua-San Shih, Wen-Hsin Wang

    Published 2025-01-01
    “…In landslide-prone forest regions, typhoon-induced strong winds can uproot trees and destabilize their root systems, potentially triggering shallow landslides. …”
    Get full text
    Article
  5. 165

    Solving the choice puzzle: Financial and non-financial stakeholders preferences in corporate disclosures by Oleh Pasko, Li Zhang, Alvina Oriekhova, Nataliia Gerasymenko, Olena Polishchuk

    Published 2023-12-01
    “…Employing an accrual-based proxy for accounting conservatism and the social contribution value per share from the Shanghai Stock Exchange as a proxy for CSP, the study utilizes a sample of 25,490 year-company observations of A-share listed companies on China’s Shanghai and Shenzhen stock exchanges spanning from 2008 to 2019. …”
    Get full text
    Article
  6. 166

    Influencing factors of health-related quality-of-life perceived by both children/adolescents patients with type-1 diabetes mellitus and their parents: A North-African study [versio... by Jihene Bouguila, Hichem Ben Said, Lamia Boughamoura, Helmi Ben Saad, Khansa Derbel, Raoudha Kebeili, Imen Ben Abdesselem

    Published 2025-01-01
    “…The dependent data were the patients’ self-report and the parents’ proxy-report of the PedsQL4.0 total scores, and the independent data were the patients and parents characteristics. …”
    Get full text
    Article
  7. 167

    Research on protection technology for location privacy in VANET by Jian-ming ZHANG, Yu-juan ZHAO, Hao-bin JIANG, Xue-dan JIA, Liang-min WANG

    Published 2012-08-01
    “…Location-based services in VANET solved the problem of road safety,and provided the convenient services to drivers and passengers.But it also brought new problems of privacy protection.The content of privacy protection was analyzed,and put emphasis on two kinds of privacy protection technology based on pseudonyms and signature respectively.Pseudonym-based schemes were classified as special-area based,silence-period,cryptographic mix-zones and mix-zones communication proxy based schemes.Signature-based schemes were also divided into two classes:group-signature and ring-signature.The evaluation methods for privacy protection level were surveyed,in which anonymity set,entropy metric,mathematical analysis theory and formal analysis were discussed and compared.…”
    Get full text
    Article
  8. 168

    AONT-and-NTRU-based rekeying scheme for encrypted deduplication by Chunfu JIA, Guanxiong HA, Shaoqiang WU, Hang CHEN, Ruiqi LI

    Published 2021-10-01
    “…Rekeying is a good way to protect against key exposure.Most of the existing encrypted deduplication systems are implemented based on message-locked-encryption, in which multiple users with the identical data share the same encryption key.When a user updates keys, that update must be followed by all other data owners, which will incur large computational and communicational overheads.To solve this problem, an AONT-and-NTRU-based rekeying scheme was proposed, a variant of AONT was designed to solve the synchronization problem of multi-user rekeying, and a proxy re-encryption algorithm based on NTRU was introduced to reduce the communicational overhead for the system and computational overhead for clients during rekeying.The efficiency analysis and experimental results show that the proposed scheme has better encryption and decryption efficiency than existing schemes and the time cost of rekeying is significantly reduced.…”
    Get full text
    Article
  9. 169

    Automated class student counting through image processing by Agyan Panda, Azadeh Shemshad

    Published 2021-03-01
    “…These procedures take time, are prone to errors, and require proxy attendance. Furthermore, digital record assimilation is time-consuming since teachers must manually put in the entries in the database to generate reports. …”
    Get full text
    Article
  10. 170

    Load balance multicast routing algorithms on overlay network by ZHANG Xiao-yu, ZHANG Guang-zhao

    Published 2009-01-01
    “…Overlay networks had been recently developed to support multicast framework.Specially,overlay architec-tures based on proxies and leased lines could provide applications with optimal performance in terms of bandwidth,reliability,delay guarantee,etc.A balanced multicast routing algorithm for these proxy-based overlay architectures was proposed to utilize the network resources efficiently while keeping the delay guarantee for each multicast session.First,the routing problem was modeled as a delay-constraint Steiner tree problem.Then,a balanced solution with the aid of precomputing was proposed.The precomputing performed once with high complexity.However,its outcome was used multiple times in the later low complexity tree forming algorithm.Hence,the overall complexity was low-ered.Extensive simulations show that the multicast routing algorithm provides superior performance with respect to other heuristics.…”
    Get full text
    Article
  11. 171

    Authentication Scheme Based on Agents for Heterogeneous Cloud by Jiwen Guo, Xianwei Zhou

    Published 2013-03-01
    “…Considering the comp1exity of dep1oying network nodes, 1arge amount of ca1cu1ation and frequent mutua1 messages for heterogeneous c1oud, two service patterns, i.e.authentication agent and service agent were proposed, A1so, the proxy digita1 signature schemes with 1ower handshaking numbers were devised and the efficiency of authentication imp1ementation was improved.In addition, the scheme can effective1y guard against the rep1ay attack, the impersonation attack and the man-in-the-midd1e attack of the ma1icious nodes,and so on.…”
    Get full text
    Article
  12. 172

    Emisiones de CO2 en hogares urbanos. El caso del Distrito Federal by Ignacio César Cruz Islas

    Published 2016-01-01
    “…Atendiendo a ello, en este trabajo se estudian los principales determinantes del consumo de energía en los hogares y se estima un proxy del volumen de emisiones de dióxido de carbono asociado, usando datos de la Encuesta Nacional de Ingresos y Gastos de los Hogares para el Distrito Federal.…”
    Get full text
    Article
  13. 173

    À la recherche des « voix » des fallāhīn dans un dossier d’archives judiciaires égyptiennes by Anne Clément

    Published 2012-05-01
    “…More precisely, the analysis of the traces—quotations between brackets and petitions in appendices—left by the negotiation that unfolded throughout the procedure between the victim’s family and the legal authorities over the nature of the crime as a proxy murder and the action to be taken against those responsible, reveals both the conflictual and highly political dimension of the legal professionals’ decision-making process and an unsuspected ability on the part of the fallāhīn to express themselves and challenge the system.…”
    Get full text
    Article
  14. 174

    Weibo Attention and Stock Market Performance: Some Empirical Evidence by Minghua Dong, Xiong Xiong, Xiao Li, Dehua Shen

    Published 2018-01-01
    “…In this paper, we employ Weibo Index as the proxy for investor attention and analyze the relationships between investor attention and stock market performance, i.e., trading volume, return, and volatility. …”
    Get full text
    Article
  15. 175

    Use of Active Learning to Design Wind Tunnel Runs for Unsteady Cavity Pressure Measurements by Ankur Srivastava, Andrew J. Meade

    Published 2014-01-01
    “…In this work, the feasibility of an active machine learning technique to design wind tunnel runs using proxy data is tested. The proposed active learning scheme used scattered data approximation in conjunction with uncertainty sampling (US). …”
    Get full text
    Article
  16. 176

    Assessing costs and constraints of forest residue disposal by pile burning by Jake Barker, Jake Barker, Jimmy Voorhis, Sinéad M. Crotty

    Published 2025-01-01
    “…Geospatial analyses supported interviewee-identified cost drivers, district road density (a proxy for accessibility) and district maximum elevation (a proxy for terrain). …”
    Get full text
    Article
  17. 177

    Patient experience and burden of haemolytic disease of the foetus and newborn: a systematic review by P. Maurice, J. McCallion, M. Fitzgibbon, J. N. Barthelmes, W. Karmous, E. J. Hardy, S. A. Mitchell, C. R. Mitchell, J. Lee, W. Noel, Andras Borsi, J. M. Jouannic

    Published 2025-02-01
    “…Neurodevelopment, academic development, behaviour and personality were assessed as proxy outcomes for patient burden given the limited identification of patient-reported outcome data. …”
    Get full text
    Article
  18. 178

    MULTI-OBJECTIVE OPTIMAL DESIGN OF ALUMINUM CELL by YANG EChuan, HUANG Lu, PANG Tong, ZHANG ZhenHua, YUAN TianXun

    Published 2021-01-01
    “…The orthogonal experiment was completed with full factor experimental design method,and the nine-lattice energy absorption box was determined as a follow-up research object,explore the effect of wall thickness on the crashworthiness of crash box,A neural network model was used to construct the proxy model,and the multi-objective optimization design was completed using the NSGA-II genetic algorithm. …”
    Get full text
    Article
  19. 179

    TETRA Backhauling via Satellite: Improving Call Setup Times and Saving Bandwidth by Anton Donner, Jawad Ahmed Saleemi, Javier Mulero Chaves

    Published 2014-01-01
    “…In order to cope with the signal delay of the satellite link, the paper proposes and analyzes a suitable solution based on the use of a performance enhancing proxy (PEP). Additionally, robust header compression (ROHC) is discussed as suitable technology to transmit TETRA voice via IP-based satellite networks.…”
    Get full text
    Article
  20. 180

    Optimization method for attribute-based cryptographic access control in mobile cloud computing by Jian LIU, Ming XIAN, Huimei WANG, Hong RONG

    Published 2018-07-01
    “…For the problem of secure data sharing and access control in mobile cloud,the drawback of traditional cryptographic access control schemes was deeply analyzed.Considering the truth that mobile devices were usually equipped with limited resources,an optimized attribute-based cryptographic access control scheme was proposed in this study.In the proposed scheme,a third party proxy was introduced into the system model,and the two-layer encryption method was applied.Combining traditional attribute-based encryption (ABE) algorithm with multi-secret sharing and split measurement of ABE encryption,the scheme could greatly reduce the cost of mobile users in terms of data publish and access management.Theoretical and experimental analysis shows that the contribution can well meet the requirements of mobile cloud in terms of security,computational complexity and communication cost,which means that it is promising for future applications.…”
    Get full text
    Article