• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 3,349
Next 10 →

Tor: The secondgeneration onion router,”

by Roger Dingledine - in 13th USENIX Security Symposium. Usenix, , 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract - Cited by 1229 (33 self) - Add to MetaCart
, and efficiency. We briefly describe our experiences with an international network of more than 30 nodes. We close with a list of open problems in anonymous communication. Overview Onion Routing is a distributed overlay network designed to anonymize TCP-based applications like web browsing, secure shell

Motivation through the Design of Work: Test of a Theory. Organizational Behavior and Human Performance,

by ] Richard Hackman , Grec R Oldham , 1976
"... A model is proposed that specifies the conditions under which individuals will become internally motivated to perform effectively on their jobs. The model focuses on the interaction among three classes of variables: (a) the psychological states of employees that must be present for internally motiv ..."
Abstract - Cited by 622 (2 self) - Add to MetaCart
of research, and inspired several successful change projects involving the redesign of work (e.g., For one, a number of researchers have been unable to provide empirical support for the major tenets of the two-factor theory itself (see, for example, Moreover, the theory does not provide for differences

the review on

by Manoj Kumar Pandey, Æ Reena Rani, Æ Suraksha Agrawal, Immunotherapy Æ Immunoglobulin (ivig - D0 −D0 Mixing” in this Review
"... Abstract Recurrent spontaneous abortion (RSA) is de-fined as three or more consecutive pregnancy losses prior to the 20th week of gestation. The etiology of recurrent spontaneous abortion is often unclear and may be multifactorial, with much controversy regarding diag-nosis and treatment. Reasonably ..."
Abstract - Cited by 361 (4 self) - Add to MetaCart
-Bf) antibodies that may play major role in the immunologic failure of pregnancy and may lead to abortion. Alter-ation in the expression of HLA-G molecules, T-helper-1 (Th-1) pattern of cytokines and natural killer (NK) cells activity may also induce abortion. Various forms of treatment like antithrombotic

A principal-components analysis of the Narcissistic Personality Inventory and further evidence of its construct validity.

by Robert Raskin , Howard Terry , Kenneth Craik , John Kamp , Jill Novacek , Dan Ozer - Journal of Personality and Social Psychology, , 1988
"... We examined the internal and external validity of the Narcissistic Personality Inventory (NPI). Study 1 explored the internal structure of the NPI responses of 1,018 subjects. Using principal-components analysis, we analyzed the tetrachoric correlations among the NPI item responses and found eviden ..."
Abstract - Cited by 209 (1 self) - Add to MetaCart
to refer to "a tendency for the sexual emotions to be lost and almost entirely absorbed in self admiration" (Ellis, 1898). Shortly after this reference appeared, Nacke (1899) wrote a German summary of the Ellis paper in which he used the term Narcismus to refer to a sexual perversion whereby a

How much can we boost IQ and scholastic achievement

by Arthur R. Jensen - Harvard Educational Review , 1969
"... Arthur Jensen argues that the failure of recent compensatory education efforts to produce lasting effects on children's IQ and achievement suggests that the premises on which these efforts have been based should be reexamined. He begins by questioning a central notion upon which these and other ..."
Abstract - Cited by 193 (4 self) - Add to MetaCart
.e., genetic factors are much more important than environmental factors in producing IQ differences). After arguing that environmental factors are not nearly as important in determining IQ as are genetic

Rogue Decryption Failures: Reconciling AE Robustness Notions

by Guy Barwell, Martijn Stam
"... Abstract. An authenticated encryption scheme is deemed secure (AE) if ciphertexts both look like random bitstrings and are unforgeable. AE is a much stronger notion than the traditional IND–CCA. One shortcom-ing of AE as commonly understood is its idealized, all-or-nothing de-cryption: if decryption ..."
Abstract - Add to MetaCart
Abstract. An authenticated encryption scheme is deemed secure (AE) if ciphertexts both look like random bitstrings and are unforgeable. AE is a much stronger notion than the traditional IND–CCA. One shortcom-ing of AE as commonly understood is its idealized, all-or-nothing de-cryption

Cycle-Oriented Distributed Preconfiguration: Ring-Like Speed with . . .

by Wayne D. Grover, Senior Member Ieee, Demetrios Stamatelakis, Member Ieee , 1998
"... : Cycle-oriented preconfiguration of spare capacity is a new idea for the design and operation of mesh-restorable networks. It offers a sought-after goal: to retain the capacityefficiency of a mesh-restorable network, while approaching the speed of line-switched self-healing rings. We show that thro ..."
Abstract - Cited by 129 (14 self) - Add to MetaCart
restoration path. Although spares are connected into cycles, the method is different than self-healing rings because each preconfigured cycle contributes to the restoration of more failure scenarios than can a ring. Additionally, two restoration paths may be obtained from each pre-formed cycle, whereas a ring

Inequality among World Citizens: 1820 1992

by Francois Bourguignon, Christian Morrisson , 2003
"... This paper investigates the distribution of well being among world citizens during the last two centuries. The estimates show that inequality of world distribution of income worsened from the beginning of the 19th century to World War II and after that seems to have stabilized or to have grown mo ..."
Abstract - Cited by 146 (2 self) - Add to MetaCart
capita across countries goes beyond theoretical issues of the determinants of the economic growth of nations. It deals with the world distribution of income and with whether the distribution between rich and poor is likely to equalize or to become more polarized in the long run

Breakdown of Will

by George Ainslie , 2001
"... Short Abstract Behavioral science has long been puzzled by the experience of temptation, the resulting impulsiveness, and the variably successful control of this impulsiveness. Breakdown of Will Ainslie--Breakdown of Will 3 Long Abstract Behavioral science has long been puzzled by the experience o ..."
Abstract - Cited by 142 (2 self) - Add to MetaCart
of temptation, the resulting impulsiveness, and the variably successful control of this impulsiveness. In conventional theories a governing faculty like the ego evaluates future choices consistently over time, discounting their value for delay exponentially, that is, by a constant rate; impulses arise when

Depression and preference for self-focusing stimuli after success and failure

by Tom Pyszczynski, Jeff Greenberg - Journal of Personality and Social Psychology , 1985
"... Depressed individuals, who tend to have large perceived-self/ideal-self discrepancies, have been shown to be particularly high in private self-consciousness. On the bases of this finding and of several converging theoretical perspectives, we hypothesized that depressives, unlike nondepressives, do n ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
success than after failure, depressed subjects did not; depressed subjects tended to like the mirror-associated puzzle more after failure than after success. Nondepressed subjects also exhibited a self-serving pattern of attributions, viewing the test as less valid and luck as more responsible
Next 10 →
Results 1 - 10 of 3,349
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University