Search results for "Rust"

showing 10 items of 1659 documents

A Small Special Needs Class or a Smaller Class at the Beginning of the Educational Path?

2016

<p>This article is based on the case study which focuses on the small class (in this article used to describe a small special needs class) operation of one medium-sized Finnish town. In the study an attempt was made to clarify what kind of alternative the small class is to the first grade of general education at the beginning of the child's educational path, what kind of experiences the teachers had of the pupils of the small class, of multi-vocational cooperation and of pupils' integration and success in general education. The results of the study showed that a large part of the pupils who come to the small classes had learning difficulties, and attention and behavioural disorders. I…

Class (computer programming)05 social sciences050301 educationGeneral educationSpecial needsquality of life I00 generalBehavioural disordersperustarpeetI00 generalbasic needsquality of lifeI31 general welfareI21 analysis of educationSmall classPedagogyPath (graph theory)Mathematics educationta5160501 psychology and cognitive sciencesPsychology0503 education050104 developmental & child psychology
researchProduct

La tutela del convivente non intestatario con riguardo agli apporti conferiti per l’acquisto della casa familiare. Confronti comparatistici.

2013

The essay deals with the financial consequences of the breakdown in relationships between cohabitants through the use of the comparative method applied to English and Italian legal systems. In particular, it explores the case in which the property of family home is conveyed into the sole name of one party, while the other party contributed directly (e.g. through financial contributions to mortgage payments) or indirectly (e.g. payments of the domestic bills) to the payment of the purchase price. Under Italian law, the remedy available for the non-owner cohabitant is identified with unjust enrichment, but it will be accessible only when that contributions to the acquisition of property lacks…

Cohabitation trustConvivenza trustSettore IUS/02 - Diritto Privato Comparato
researchProduct

Magnetization and magnetoresistive response of LiMn2O4 near the charge ordering transition

2000

We report magnetization and magnetoresistance studies of the geometrically frustrated spinel compound LiMn2O4 near its charge ordering temperature. The effect of a 7 T magnetic field is to very slightly shift the transition in the resistivity to lower temperatures resulting in large negative magnetoresistance with significant hysteresis. This hysteresis is not reflected in the magnetization. These observations are compared with what is found in the colossal magnetoresistance and charge ordering perovskite manganese oxides. The manner in which geometric frustration influences the coupling of charge and spin degrees of freedom is examined.

Colossal magnetoresistanceCondensed matter physicsMagnetoresistanceChemistrymedia_common.quotation_subjectFrustrationGeneral ChemistryMagnetic susceptibilityCondensed Matter::Materials ScienceHysteresisMagnetizationCharge orderingMaterials ChemistryCondensed Matter::Strongly Correlated Electronsmedia_commonPerovskite (structure)Journal of Materials Chemistry
researchProduct

Psychodynamiques de la vie au travail: la qualité des relations verticales en tant que promoteurs d’engagement, de justice et de confiance organisati…

2008

Commitment Justice Feelings Trust
researchProduct

Anatomy of Cartel Contracts

2013

We study cartel contracts using data on 18 contract clauses of 109 legal Finnish manufacturing cartels. One third of the clauses relate to raising profits; the others deal with instability through incentive compatibility, cartel organization, or external threats. Cartels use three main approaches to raise profits: Price, market allocation, and specialization. These appear to be substitutes. Choosing one has implications on how cartels deal with instability. Simplifying, we find that large cartels agree on prices, cartels in homogenous goods industries allocate markets, and small cartels avoid competition through specialization.

Competition (economics)Microeconomicsjel:K12antitrust; cartels; competition policy; contracts; industry heterogeneityIncentive compatibilitySpecialization (functional)CartelCartels; contracts; antitrust; competition policy; industry heterogeneity.Businessjel:L40jel:L41Competition policyIndustrial organization
researchProduct

Slacking with the Bot: Programmable Social Bot in Virtual Team Interaction

2021

Nonhuman communicators are challenging the prevailing conceptualizations of technology-mediated team communication. Slackbot is a social bot that can be configured to respond to trigger words and, thus, take part in discussions on the platform. A set of 84 bot-related communication episodes were identified from a journalistic team's Slack messages (N=45,940) and analyzed utilizing both qualitative content analysis and interaction process analysis (IPA). This integrated mixed-methods analysis revealed novel insights into the micro-level dynamics of human-machine communication in organizational teams. In response to Slackbot's greetings, acclamations, work-related messages, and relational mes…

Computer Networks and Communications518 Media and communicationsSocial Bots050801 communication & media studiesCOMMUNICATIONchattibotityhteisöviestintäfasilitointi0508 media and communicationsMICROBIOLOGY PROCEDURES0502 economics and businessTECHNOLOGYVirtual TeamsSlackbotConceptualization05 social sciencesVirtual teamtiimityöTeam CommunicationComputer Science ApplicationsEngineering managementOrganizational CommunicationWork teamsInteraction Process AnalysisQualitative AnalysisTRUSTverkkoviestintäPsychology050203 business & managementJournal of Computer-Mediated Communication
researchProduct

Hypervisor-based Protection of Code

2019

The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…

Computer Networks and CommunicationsComputer science0211 other engineering and technologiesCryptography02 engineering and technologysecurityComputer securitycomputer.software_genreEncryptionkryptografiaObfuscationCode (cryptography)tietoturvavirtual machine monitorsSafety Risk Reliability and QualitySystem bustrusted platform moduleta113021110 strategic defence & security studiescode protectioncryptographybusiness.industryHypervisorVirtualizationObfuscation (software)businesscomputerIEEE Transactions on Information Forensics and Security
researchProduct

Location of navigation menus in websites: an experimental study with Arabic users

2015

Published online: 31 October 2015 While Arabic users represent by far the fastest growing language population on the Internet, research about how the peculiarities of Arabic language may shape users’ web interactions is still scarce. The preferences of Arabic users for menu location in websites have been studied. Two competing arguments have been proposed regarding the best location of menus in websites: conventional design (navigation menu should be placed on that side where users expect it based on previous experience) and reading direction (navigation menu should be placed on that side where readers are used to start off reading, so that the navigation menu is likely to be attended first…

Computer Networks and CommunicationsComputer scienceArabicFirst languagemedia_common.quotation_subjectWebsite designPopulation050105 experimental psychologyWorld Wide WebReading (process)0501 psychology and cognitive scienceseducationComputer communication networks050107 human factorsmedia_commoneducation.field_of_studybusiness.industry05 social sciencesUsabilitylanguage.human_languageHuman-Computer InteractionTrustworthinessArabic Internet userslanguageThe InternetbusinessMenu locationSoftwareInformation SystemsUniversal Access in the Information Society
researchProduct

Identifying relevant segments of AI applications adopters : Expanding the UTAUT2’s variables

2021

Artificial intelligence (AI) is a future-defining technology, and AI applications are becoming mainstream in the developed world. Many consumers are adopting and using AI-based apps, devices, and services in their everyday lives. However, research examining consumer behavior in using AI apps is scant. We examine critical factors in AI app adoption by extending and validating a well-established unified theory of adoption and use of technology, UTAUT2. We also explore the possibility of unobserved heterogeneity in consumers’ behavior, including potentially relevant segments of AI app adopters. To augment the knowledge of end users’ engagement and relevant segments, we have added two new antec…

Computer Networks and CommunicationsComputer scienceunified theory of adoption and use of technology050801 communication & media studiesconsumer trusttekoälysovellusohjelmatGeneralLiterature_MISCELLANEOUS0508 media and communications0502 economics and businessMainstreamSegmentationElectrical and Electronic EngineeringUTAUT2käyttöönottoConsumer behaviourEnd user05 social sciencesCritical factorssegmentationkuluttajakäyttäytyminenartificial intelligenceData scienceheterogeenisuusAntecedent (grammar)segmentointiluottamuskuluttajat050211 marketingSurvey instrumentApplications of artificial intelligencetechnology fearheterogeneity
researchProduct

A Cognitive Model of Trust for Biological and Artificial Humanoid Robots

2018

This paper presents a model of trust for biological and artificial humanoid robots and agents as antecedent condition of interaction. We discuss the cognitive engines of social perception that accounts for the units on which agents operate and the rules they follow when they bestow trust and assess trustworthiness. We propose that this structural information is the domain of the model. The model represents it in terms of modular cognitive structures connected by a parallel architecture. Finally we give a preliminary formalization of the model in the mathematical framework of the I/O automata for future computational and human-humanoid application.

Computer Science (all)TrustworthineAndroid RobotCognitive ArchitectureTrustHuman-Humanoid interaction
researchProduct