627 results on '"SHARING"'
Search Results
2. Constructing linked systems of relative difference sets via Schur rings.
- Author
-
Muzychuk, Mikhail and Ryabov, Grigory
- Subjects
DIFFERENCE sets ,FINITE groups ,EXPONENTS ,SHARING - Abstract
In the present paper, we study relative difference sets (RDSs) and linked systems of them. It is shown that a closed linked system of RDSs is always graded by a group. Based on this result, we also define a product of RDS linked systems sharing the same grading group. Further, we generalize the Davis-Polhill-Smith construction of a linked system of RDSs. Finally, we construct new linked system of RDSs in a Heisenberg group over a finite field and family of RDSs in an extraspecial p-group of exponent p 2 . All constructions of new RDSs and their linked systems make usage of cyclotomic Schur rings. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Estimating a model of inefficient cooperation and consumption in collective households.
- Author
-
Lewbel, Arthur and Pendakur, Krishna
- Subjects
CONSUMPTION (Economics) ,BARGAINING power ,HOUSEHOLDS ,COOPERATION ,SHARING - Abstract
Lewbel and Pendakur (2021) propose a model of consumption inefficiency in collective households, based on "cooperation factors". We simplify that model to make it empirically tractable, and apply it to identify and estimate household member resource shares, and to measure the dollar cost of inefficient levels of cooperation. Using data from Bangladesh, we find that increased cooperation among household members yields the equivalent of a 13% gain in total expenditures, with most of the benefit of this gain going towards men. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. A survey on counting-based secret sharing schemes for resource-constrained environments: techniques, security, challenges, and future directions.
- Author
-
Parihar, Bhawana, Rawat, Arjun Singh, and Deshmukh, Maroti
- Subjects
- *
BLOCKCHAINS , *SUPPLY chain management , *ACCESS control , *DEFENSIVE (Military science) , *SHARING - Abstract
Secret sharing schemes play a vital role in securely distributing a secret among multiple participants, ensuring confidentiality and access control. However, traditional secret sharing schemes face limitations in resource-constrained environments, such as IoT devices, embedded systems, and low-power sensors, due to constraints in computational power, memory, energy, and communication capabilities. To address these challenges, lightweight secret sharing schemes have emerged as a promising solution, aiming to provide efficient techniques for secret sharing while maintaining an acceptable level of security. One such lightweight scheme is the counting-based secret sharing scheme, specifically designed to meet the needs of resource-constrained devices and environments. This scheme leverages parallel bits counting operations to reconstruct the secret and introduces innovative techniques for generating shares, optimizing the trade-off between security and computational efficiency. This survey provides a comprehensive overview of counting-based secret sharing schemes for resource-constrained environments. It highlights recent advancements in the field, identifies promising research directions, and discusses the open challenges that lie ahead in the development and utilization of counting-based secret sharing schemes. Additionally, potential applications of counting-based secret sharing schemes in various domains such as IoT, embedded systems, low-power sensors, secure multi-party computation, cloud computing, healthcare systems, financial services, supply chain management, military and defense, smart grids, and blockchain technology are discussed to emphasize the relevance and versatility of these schemes in real-world scenarios. Through this survey, researchers gain a comprehensive understanding of counting-based secret sharing schemes. This survey aims to inspire further innovation and advancements in the field of counting-based secret sharing schemes, ultimately contributing to the development and utilization of efficient and secure secret sharing techniques in resource-constrained environments. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. Multi-party codebook distribution strategy based on secret sharing.
- Author
-
She, Wei, Feng, Haige, Tian, Zhao, Rong, Xinpeng, Ma, Tianxiang, and Liu, Wei
- Subjects
- *
COMPUTER passwords , *SHARING , *INFORMATION technology security , *PUBLIC key cryptography , *DECEPTION - Abstract
The paper addresses the issue of secure distribution of codebooks in the field of information security, particularly in the domain of covert communication. We propose a codebook distribution technique based on secret sharing. Secret sharing is a method of dividing and storing secrets that can withstand certain levels of external intrusion and internal deception. In this technique, the sender encrypts the codebook using a private key and uploads it to the IPNS. Each recipient can then obtain the public key for downloading the codebook through a mechanism based on password-protected secret sharing. Based on experimental results and security analysis, the scheme exhibits high time efficiency and stable memory usage. Furthermore, it can withstand various attacks, ensuring the security of codebook transmission. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Spreading and correspondence in Huave vowel copy.
- Author
-
Kim, Yuni
- Subjects
PHONOLOGY ,VOWELS ,SHARING ,FORECASTING - Abstract
Assimilation is a central phenomenon in phonology, yet there is little consensus on either its representation or computation. In particular, the empirical distinction between spreading (feature sharing) and correspondence (feature copying) is disputed. In this paper, I identify novel diagnostics from two interacting assimilation processes in San Francisco del Mar Huave (isolate: Mexico). First, vowel-copy epenthesis displays a previously unattested blocking pattern that is problematic for spreading, but predicted by feature-copying approaches like Agreement By Correspondence. Second, in CV agreement, I argue that only feature sharing driven by Dep and Specify constraints can insightfully account for the role of underspecification, which produces a range of directionality effects. Huave shows that both spreading and correspondence are needed in phonological theory, and also demonstrates that monolithically assimilation-mandating constraints like Agree can be decomposed to derive assimilation from the interaction of more elementary, independently motivated principles of markedness and faithfulness. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Verifiable Changeable Threshold Secret Image Sharing Scheme Based on LWE Problem.
- Author
-
Hadian Dehkordi, Massoud, Mashhadi, Samaneh, Farahi, Seyed Taghi, and Noorallahzadeh, Mohammad Hossein
- Subjects
PROBLEM-based learning ,SHARING - Abstract
In common threshold secret image sharing (t, n) schemes, each of n shareholders has a share of secret image S. By having at least t shares, the dealer D will be able to retrieve the secret. In such traditional schemes, it is not possible to change the threshold value. However, the security policy of the secret recovery phase may change, and the number of shareholders present at the phase of secret recovery may need to change. In such cases, a secret sharing scheme with changeable threshold can be applied. In this paper, we introduce the first changeable threshold secret image sharing scheme based on Learning With Error problem. It employs Bloom Filter to provide non-interactive verification of participants' shares. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Multipartite standard nonlocality sharing by m-sided independent sequential observers.
- Author
-
Sun, Hao, Guo, Fenzhuo, Dong, Haifeng, and Gao, Fei
- Subjects
- *
QUBITS , *SHARING , *MEASUREMENT - Abstract
The sharing of quantum nonlocality has been the subject of much recent research for two-qubit and three-qubit entangled systems. In this paper, we discuss nonlocality sharing with unsharp measurement based on Mermin–Ardehali–Belinskii–Klyshko (MABK) inequality for the N-qubit generalized Greenberger–Horne–Zeilinger (GHZ) system. In the one-sided sequential measurements scenario, we determine a state range associated with k within which k + 1 independent observers can share the standard N-partite nonlocality with the other (N - 1) sides, as well as a state range where arbitrarily many independent observers can do the same. Similarly, as to the m-sided sequential measurements scenario, we also identify a state range influenced by k within which k + 1 independent observers in each of m sides can share the standard N-partite nonlocality with the other (N - m) sides, and a state range where arbitrarily many independent observers can do so. Crucially, all of our nonlocality sharing findings result from a measurement strategy in which every sequential observer employs unequal sharpness measurements. As a special case, for the three-qubit maximally entangled GHZ state, we demonstrate that an unbounded number of observers can share the nonlocality in the one-sided sequential measurements scenario. This outcome further underscores the importance of unequal sharpness measurements in recycling qubits for generating quantum nonlocality. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Changeable essential threshold secret image sharing scheme with verifiability using bloom filter.
- Author
-
Hadian Dehkordi, Massoud, Mashhadi, Samaneh, Farahi, Seyed Taghi, and Noorallahzadeh, Mohommad Hosein
- Subjects
STOCKHOLDERS ,SHARING ,STOCKS (Finance) - Abstract
In threshold secret image sharing schemes (k, n), the secret image S is distributed among n shareholders. To recover the secret image, at least k shareholders must be present during the restoration phase. In the traditional secret image sharing schemes, there is no ability to change the threshold or define a share for essential and non-essential shareholders. In certain circumstances, it may be necessary for certain shareholders to be present during the secret recovery phase and surrender their shares. This requires the use of essential secret sharing schemes. Additionally, if the security policy for the recovery phase changes, the number of shareholders required to be present may change as well, necessitating the use of changeable secret sharing schemes. In this paper, a changeable threshold secret image sharing scheme with the presence of essential shareholders is introduced for the first time. In this scheme, the threshold of essential and non-essential shareholders can be increased or decreased based on the chosen policy. Also, the shares of the shareholders are verified using the Bloom Filter. Tables 7 and 8 outline the advantages and features of the proposed scheme in comparison to other schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. On the Merits of Separate Spaces: Why Institutions Isolate Cooperation and Division Tasks.
- Author
-
Bokemper, Scott E. and Huber, Gregory A.
- Subjects
- *
COOPERATION , *SHARING , *POSSIBILITY , *ARGUMENT - Abstract
Do institutions shape the possibility of sustaining cooperation when the same individuals must first divide resources and then attempt to cooperate? It could be that simply having received an inequitable division undermines cooperative behavior, reducing aggregate welfare. Alternatively, it might be that only when interacting with the same individual or group does this spillover occur, in which case separating tasks across institutions may prevent this negative spillover. To test these arguments, we designed a two-stage incentivized experiment in which participants interact in a division task and then in a task in which cooperation improves aggregate welfare. In two experiments, individuals were randomly assigned to interact either with the same individual for both tasks or with a different individual for each task. In the second experiment, individuals could also interact with a person who was in the same arbitrary group as their partner in the division task. Holding constant both past history and past partner behavior, the results of these experiments provide support for a Partner History effect in which the mechanism that produces spillover is interacting with the same individual in both decisions. We also find evidence for a weaker Group History effect in which negative spillover occurs when the partner in the cooperative task is a member of the same group as the partner from the division task. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Knowledge as a Social Kind.
- Author
-
Lossau, Tammo
- Subjects
- *
SHARING , *QUALITY standards , *INFORMATION sharing - Abstract
I argue that knowledge can be seen as a quality standard that governs our sharing and storing of information. This standard satisfies certain functional needs, namely it allows us to share and store trustworthy information more easily. I argue that this makes knowledge a social kind, similar in important ways to other social kinds like money. This provides us with a way of talking about knowledge without limiting ourselves to the concept of knowledge. I also outline three ways in which this view of knowledge can shed light on familiar epistemological problems: it can explain why knowledge is the norm of assertion, it can help us carve out the harm associated with testimonial injustice, and it can provide us with a clear analysis of the dangers associated with spreading misinformation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. A New Colony and an Old Spanish City: Ceramic Consumption in British St. Augustine, Florida.
- Author
-
Sullivan, Myles
- Subjects
- *
MATERIAL culture , *HISTORIC districts , *COLONIES , *CERAMICS , *INNER cities , *SHARING ,SPANISH colonies - Abstract
After nearly two hundred years of continuous occupation, the Spanish port town of St. Augustine, Florida, came under British control in 1763. With the arrival of the new regime, noticeable changes occurred in the colony, including the mass exodus of Spanish residents and a new emphasis on plantation agriculture as in other areas of British America. Yet, Florida's "British Period" lasted only until 1784, and this article examines the evidence for it in St. Augustine collections at the Florida Museum of Natural History. Vessel form analysis of ceramics from four different sites in the city are compared to both Spanish St. Augustine and the nearby British urban center of Charleston to understand the material signatures of these two different colonial societies. By building an analytical focus on ceramics through the lens of consumption, the meaning of the archaeological trends is considered through questions of identity and colonialism in a more marginal locale in the British Atlantic world. Given that the British St. Augustine assemblages shared similarities, and all had distinctly "British" ceramics, their use in facilitating shared dining practices that formed social identities in the newly formed colony is further examined in local documents. Examining how material culture functioned in the social performances of dining practices in British St. Augustine can distinguish how mass-produced goods were made meaningful in different colonial societies. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Mining bike sharing trip record data: a closer examination of the operating performance at station level.
- Author
-
Bi, Hui, Ye, Zhirui, and Zhu, He
- Subjects
CYCLING ,DATA recorders & recording ,BICYCLES ,SHARING ,SYSTEMS design ,BUILT environment - Abstract
Bike sharing systems gain traction worldwide, but previous research pay less attention to the more detailed operating characteristics at station level. This study aims to fill this void in the literature by looking into the stations' performance with considering systemic intervention and user-driven usage. Methodologically, an innovative approach that captures the underlying relevance of trip records is proposed firstly to identify the bicycle-based operating states in its lifecycle, such as being redistributed, parked, or used. From bike to station, all the bicycle-based operating status information can be linked to associated stations, consequently, station vitality and station pattern are refined into stations' operating performance. In addition to rational classification and discussion of operating features, this study has explored the impact of surrounding built environment on these specific operating features instead of simple trip intensity. To test the proposed methodology, trip record data from the bike sharing system of Boston in 2019 is used. The results indicate that user-driven and manual-scheduling bike movements are all particularly relevant to keeping stations' sustainable daily operation, but vary across the stations in their ratio. In terms of station vitality and station pattern, some stations would embody the nature of high-output-scheduling, low-bike-turnover, or high-input-scheduling relative to the baseline scenario of operating performance. Heterogeneity of stations in operating is also proved to be caused by the surrounding built environment. The outcomes and methodological framework would facilitate the assessment of bike sharing system operating state at station level, as well as instilling new insights into bike sharing system design. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Can document characteristics affect motivations for literature usage?
- Author
-
Peng, ↓Xia, Xiong, Zequan, and Yang, Li
- Abstract
Beyond citations, the impact of scientific publications is often measured by usage metrics, such as downloads, save counts and sharing counts. However, the motivations behind the utilization of these publications and their influencing factors have not yet been well studied. Therefore, it remains questionable whether and to what extent usage metrics can reflect the impact of publications. Based on expectancy-value theory, the aim of the present study was to examine the differences in behavioral characteristics and driving factors between article downloading, sharing, and saving, especially document characteristics. For the present study, survey data from 480 respondents across Chinese universities were collected and investigated in terms of the frequency and purpose of three literature usage behaviors, namely, downloading, sharing, and saving. Additionally, 11 document characteristics were used to construct three variables in the research models: intrinsic interest value, attainment value, and utility value. Their effects on three usage behaviors were examined based on path analysis via SmartPLS. The results showed that the overall frequency of article downloading and saving was greater than that of article sharing. The primary purposes of downloading and saving were closely related to scientific research, such as for review and citing. The sharing of articles on social media was mainly for agreeing with their opinions. Both intrinsic interest value and utility value exhibited a significant positive influence on article-downloading, whereas attainment value and intrinsic interest value showed a significant relationship with sharing and saving, respectively. In conclusion, different literature usage behaviors can be triggered and driven by the distinct values of research articles. The results obtained in this study could help to clarify the determinants of different usage behaviors; additionally, they might promote the reasonable application of usage metrics or altmetrics in scientific evaluation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. Young children's trust and sharing decisions.
- Author
-
Kotaman, Hüseyin and Aslan, Mustafa
- Subjects
- *
TRUST , *RESEARCH assistants , *SHARING , *KINDERGARTEN children , *FOOD preferences - Abstract
The purpose of this study is to investigate how young children define trust and to find out if there is a relationship between the people whom they trust and the people with whom they share their favorite food and toy. The participants consist of 273 kindergarteners enrolled in five public kindergartens. Research assistants asked the participants questions such as what they think trust is, who they trust, with whom they want to share their favorite food and favorite toy, and why. Findings did not reveal age or gender as factors for children's trust and sharing decisions. Children's trust decisions were not associated with their sharing decisions. Accordingly, it appears that children perceive trust and sharing as two separate concepts. This might be due to the abstract nature of trust and the social nature of sharing, in which immediate reciprocity might play a more important role in children's sharing decisions. Children mentioned reciprocity as the second highest reason for their sharing decisions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Enhanced block based progressive visual secret sharing scheme for grayscale and color image.
- Author
-
Panchbhai, Vishal V. and Varade, Suchita W.
- Subjects
GRAYSCALE model ,SHARING ,PERFORMANCE standards ,VISUAL cryptography ,PROBLEM solving - Abstract
Block by block, the secret image will be retrieved from user-friendly and noise-like shares in the Block Based Progressive Secret Sharing (BPVSS) scheme. The majority of existing BPVSS schemes had issues such as schemes that were not appropriate for grayscale and color secret image types, poor contrast in the rebuilt secret image, pixel expansion, more computational power and time required for post processing at the receiver side to recover the secret image, and some schemes that introduced blocking artifact in the rebuilt secret image. To solve the problems described above, we suggested a noise-like and meaningful share generation strategy based on BPVSS and the bit-slicing approach in this study. When compared to previous analogous systems, the proposed method exhibits several benefits, such as (1) it works for both color and grayscale secret images; (2) the contrast of both the rebuilt image and original secret image is exactly the same; (3) there is no pixel expansion issue; (4) the amount of time and computing power required to retrieve the secret image is very low; and (5) there is no blocking artifact issue. With the proposed algorithm for noise-like and meaningful share generation, the average time required to retrieve a secret image of size 256 × 384x3 is 0.1902s and 0.5399 s, respectively. Experimental results show that the suggested system gives better standard performance parameter readings than the BPVSS and Randomized Visual Secret Sharing (RVSS) schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. An efficient controlled semi-quantum secret sharing protocol with entangled state.
- Author
-
Houshmand, Monireh, Hassanpour, Shima, and Haghparast, Majid
- Subjects
- *
QUBITS , *TRUST , *SHARING , *EAVESDROPPING - Abstract
In this paper, we present an entangled state controlled semi-quantum secret sharing CSQSS protocol for the first time. In this scheme, with the permission of a trusted classical user, B o b 1 , Alice, as a quantum user, can share a one-bit specific message with n classical users, and the secret can only be recovered by the cooperation of all classical users. Then, the protocol is extended where m-bit specific messages, K (k 1 , k 2 ,... , k m) , can be shared with n classical users. The security of the proposed protocol against common attacks is analysed in detail, which shows that the proposed protocol is theoretically secure. Compared with previous SQSS protocols, the proposed protocol can achieve a lower cost because it does not use returning qubits for producing the secret message, uses fewer returning qubits for eavesdropping check, and does not perform entangled state measurement. Moreover, the proposed protocol has the highest qubit efficiency among the previous SQSS schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. What We Do and Don't Know About Joint Attention.
- Author
-
Moll, Henrike
- Subjects
DYADIC communication ,SHARING ,ATTENTION ,SOCIAL perception - Abstract
Joint attention is an early-emerging and uniquely human capacity that lies at the foundation of many other capacities of humans, such as language and the understanding of other minds. In this article, I summarize what developmentalists and philosophers have come to find out about joint attention, and I end by stating that two problems or questions of joint attention require additional research: 1) the relation between joint attention and the skills for dyadic sharing or affect exchange in young infants, and 2) the evolution of joint attention. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Fitting and sharing multi-task learning.
- Author
-
Piao, Chengkai and Wei, Jinmao
- Subjects
TASK performance ,SHARING - Abstract
Multi-Task Learning is an effective method for learning cross-task knowledge. However, existing methods cannot fairly treat each task, their public parts are prone to continuously fit new tasks and decrease the performances of previous tasks. In this paper, we propose the Fitting-sharing Multi-Task Learning method to address this problem. In the Fitting step, a group of indicator parameters are trained to extract task-specific features and store them into an in-task template matrix. After all models converge, the indicators and templates are frozen to protect the learned knowledge. In the Sharing step, a group of connector parameters are trained to acquire information from other templates and to reason cross-task knowledge. Since the learning and sharing processes are separate, each model can acquire the learned knowledge from other tasks without affect them, and the imbalanced cross-task knowledge problem can be naturally avoided. Experimental results on public datasets illustrate that the proposed method can insistently improve the performance compared with existing methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Accelerating randomized image secret sharing with GPU: contrast enhancement and secure reconstruction using progressive and convolutional approaches.
- Author
-
M, Raviraja Holla, D, Suma, and Pais, Alwyn R.
- Subjects
GRAPHICS processing units ,HIGH resolution imaging ,SHARING - Abstract
Image Secret Sharing (ISS) is a cryptographic technique used to distribute secret images among multiple users. However, current Visual Secret Sharing (VSS) schemes produce a halftone image with only 50% contrast when reconstructing the original image. To overcome this limitation, the Randomized Image Secret Sharing (RISS) scheme was introduced. RISS achieves a higher contrast of 70% when extracting the secret image but comes with a high computational cost. This research paper presents a novel approach called Graphics Processing Unit (GPU)-based Randomized Image Secret Sharing (GRISS), which utilizes data parallelism within the RISS pipeline. The proposed technique also incorporates an Autoencoder-based Single Image Super-Resolution (ASISR) to enhance the contrast of the recovered image. The performance of GRISS is evaluated against RISS, and the contrast of the ASISR images is compared to current benchmark models. The results demonstrate that GRISS outperforms state-of-the-art models in both efficiency and effectiveness. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. Dual-task interference: Bottleneck constraint or capacity sharing? Evidence from automatic and controlled processes.
- Author
-
Wu, Yanwen and Wang, Qiangqiang
- Subjects
- *
SHARING - Abstract
This study investigated whether the interference between two tasks in dual-task processing stems from bottleneck limitations or insufficient cognitive resources due to resource sharing. Experiment 1 used tone discrimination as Task 1 and word or pseudoword classification as Task 2 to evaluate the effect of automatic versus controlled processing on dual-task interference under different SOA conditions. Experiment 2 reversed the task order. The results showed that dual-task interference persisted regardless of task type or order. Neither experiment found evidence that automatic tasks could eliminate interference. This suggests that resource limitations, rather than bottlenecks, may better explain dual-task costs. Specifically, when tasks compete for limited resources, the processing efficiency of both tasks is significantly reduced. Future research should explore how cognitive resources are dynamically allocated between tasks to better account for dual-task interference effects. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. First vs. Lasting Impressions: How Cognitive and Affective Trust Cues Coordinate Match-Making in Online Sharing Platforms.
- Author
-
Teubner, Timm, Dann, David, Hawlitschek, Florian, and Möhlmann, Mareike
- Subjects
- *
TRUST , *AFFECT (Psychology) , *VALUE creation , *DIGITAL technology , *SHARING - Abstract
Digital platforms facilitate the coordination, match making, and value creation for large groups of individuals. In consumer-to-consumer (C2C) online sharing platforms specifically, trust between these individuals is a central concept in determining which individuals will eventually engage in a transaction. The majority of today's online platforms draw on various types of cues for group coordination and trust building among users. Current research widely accepts the capacity of such cues but largely ignores their changing effectiveness over the course of a user's lifetime on the platform. To address this gap, we conduct a laboratory experiment, studying the interplay of cognitive and affective trust cues over the course a multi-period trust experiment for the coordination of groups. We find that the trust-building capacity of affective trust cues is time-dependent and follows an inverted u-shape form, suggesting a dynamic complementarity of cognitive and affective trust cues. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Unconditionally secure non-malleable secret sharing and circular external difference families.
- Author
-
Veitch, Shannon and Stinson, Douglas R.
- Subjects
SHARING ,FAMILIES ,DEFINITIONS - Abstract
Various notions of non-malleable secret sharing schemes have been considered. In this paper, we review the existing work on non-malleable secret sharing and suggest a novel game-based definition. We provide a new construction of an unconditionally secure non-malleable threshold scheme with respect to a specified relation. To do so, we introduce a new type of algebraic manipulation detection code and construct examples of new variations of external difference families, which are of independent combinatorial interest. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
24. Transfer and share: semi-supervised learning from long-tailed data.
- Author
-
Wei, Tong, Liu, Qian-Yu, Shi, Jiang-Xin, Tu, Wei-Wei, and Guo, Lan-Zhe
- Subjects
SUPERVISED learning ,SECURE Sockets Layer (Computer network protocol) ,LOGITS ,SHARING - Abstract
Long-Tailed Semi-Supervised Learning (LTSSL) aims to learn from class-imbalanced data where only a few samples are annotated. Existing solutions typically require substantial cost to solve complex optimization problems, or class-balanced undersampling which can result in information loss. In this paper, we present the TRAS (TRAnsfer and Share) to effectively utilize long-tailed semi-supervised data. TRAS transforms the imbalanced pseudo-label distribution of a traditional SSL model via a delicate function to enhance the supervisory signals for minority classes. It then transfers the distribution to a target model such that the minority class will receive significant attention. Interestingly, TRAS shows that more balanced pseudo-label distribution can substantially benefit minority-class training, instead of seeking to generate accurate pseudo-labels as in previous works. To simplify the approach, TRAS merges the training of the traditional SSL model and the target model into a single procedure by sharing the feature extractor, where both classifiers help improve the representation learning. According to extensive experiments, TRAS delivers much higher accuracy than state-of-the-art methods in the entire set of classes as well as minority classes. Code for TRAS is available at https://github.com/Stomach-ache/TRAS. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. Spectrum sharing for LTE and 5G-NR coexistence.
- Author
-
Busari, Sherif Adeshina, Correia, Noélia, Saghezchi, Firooz B., Mumtaz, Shahid, and Rodriguez, Jonathan
- Subjects
TRAFFIC patterns ,5G networks ,NETWORK performance ,LONG-Term Evolution (Telecommunications) ,SHARING - Abstract
Spectrum sharing provides a rapid migration pathway toward 5G by enabling the coexistence of 4G LTE and 5G new radio (NR) that share the same spectrum. Due to significant differences in the LTE and 5G-NR air interfaces, several enablers are required to facilitate the spectrum sharing. In this study, we explore the coexistence features and investigate their impacts on network performance. For static and dynamic spectrum sharing scenarios, we assess the impacts of different spectrum sharing ratios, user ratios, MIMO configurations, mixed numerology profiles and traffic patterns on the user throughput and network capacities of spectrum sharing networks, compared with the LTE only and 5G-NR only networks with exclusive spectrum access. The key results show that spectrum sharing leads to a marginal capacity gain over LTE only network and achieves considerably lower capacity than the 5G-NR only network. Also, the results show that mixed numerology profiles between the LTE and 5G-NR lead to capacity losses due to inter-numerology interference. In addition, user and spectrum sharing ratios between LTE and 5G-NR have critical impacts on performance. Reduced spectrum per device as the number of 5G devices increases, higher signaling overhead and higher scheduling complexity are other limiting factors for spectrum sharing networks. The results show limited capacity benefits and reinforce spectrum sharing between LTE and 5G-NR as mainly an evolutionary path to accommodate 5G users in the same LTE spectrum while migrating to the fully-fledged 5G networks. For significant capacity increase, other features such as carrier aggregation, overlay of small cells and higher order MIMO would need to be incorporated into the network. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
26. Does corporate digital transformation restrain ESG decoupling? Evidence from China.
- Author
-
Chen, Xiangyu, Wan, Peng, Ma, Zhefeng, and Yang, Yu
- Subjects
DIGITAL transformation ,INFORMATION asymmetry ,CHIEF information officers ,ECONOMIC impact ,INFORMATION processing ,SHARING ,SOCIAL responsibility of business - Abstract
This paper empirically examines the efficacy of corporate digital transformation on a firm's environmental, social, and governance (ESG) decoupling. Adopting the text analysis method and using a sample of Chinese A-share listed firms from 2010 to 2019, this paper finds that digital transformation can significantly alleviate ESG decoupling, and this relationship persists after robustness tests. Mechanism analysis reveals that digital transformation reduces ESG decoupling by improving information processing ability and relieving information asymmetry. The relationship between corporate digital transformation and ESG decoupling is stronger among companies in eastern China and firms that do not follow GRI guidance. The economic consequence analysis suggests that corporate digital transformation promotes firms' high-quality development by reducing ESG decoupling. This study helps reveal corporate digital transformation's empowering role and governance role in ESG decoupling and contributes to the growing literature on ESG decoupling and corporate digital transformation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. Maternal hostility, moral reasoning and sharing in children.
- Author
-
Er-Vargün, Gamze and Akgün, Serap
- Subjects
MORAL reasoning ,HOSTILITY ,REASONING in children ,CHILD behavior ,PROSOCIAL behavior ,STRUCTURAL equation modeling - Abstract
Maternal hostility is a risk factor for children's prosocial behavior. However, the mediating mechanisms underlying the relation between maternal hostility and children's sharing behavior remain unknown. The present study primarily aimed to examine the relations among moral reasoning, maternal hostility, and sharing behavior during early and middle childhood. The sample consisted of 206 children (91 boys, 115 girls) aged between 4 and 9 years old (M = 84.27 (month), SD = 16.86) living in Turkey. Children's sharing behavior was measured by the number of stickers they gave to other children in the dictator game. Children's moral reasoning abilities were evaluated with several questions asked after reading four stories containing moral violations. Lastly, children's perceptions of hostile behaviors of their mothers were evaluated with the Child-Puppet Interview. The results of the mediation analysis conducted with structural equation modeling showed that the relationship between maternal hostility and children's sharing behavior was fully mediated by children's moral reasoning abilities. Maternal hostility was negatively related to children's moral reasoning, and children's moral reasoning was found to be positively linked with sharing. The findings showed that hostile behaviors of mothers towards their children impaired children's moral reasoning abilities and, in turn, decreased sharing. Highlights: Maternal hostility is a risk factor for children's moral reasoning and prosocial behaviors. Maternal hostility is indirectly (via moral reasoning) associated with low sharing behavior in children. There is an urgent need to implement intervention approaches and social policies to reduce parent's hostile behaviors toward children. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Stereo image encryption using vector decomposition and symmetry of 2D-DFT in quaternion gyrator domain.
- Author
-
Shao, Zhuhong, Li, Leding, Zhao, Xiaoxu, Li, Bicao, Liu, Xilin, and Shang, Yuanyuan
- Abstract
This paper introduces a novel encryption framework for stereo image. Firstly, both views of a stereo image are decomposed into four plates, which are constituted into a full quaternion matrix. Followed by block-wise quaternion gyrator transform, then different parts of the interim results are shared by orthogonal matrix and spliced together. According to the conjugate symmetry of two-dimensional discrete Fourier spectrum, a real-valued ciphertext can be obtained by superposing real and imaginary parts of the half spectrum. Among them, two-dimensional logistic-Sine-coupling map is employed for generating phase masks, rotation angles and shared coefficients, which greatly enhances the security of the cryptosystem. Numerical simulation results demonstrate the feasibility and reliability of the proposed encryption scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Employee sensemaking in organizational change via knowledge management: leadership role as a moderator.
- Author
-
Saeed, Imran, Khan, Jawad, Zada, Muhammad, and Zada, Shagufta
- Subjects
ORGANIZATIONAL change ,KNOWLEDGE management ,SHARING ,SOCIAL responsibility of business - Abstract
Grounding on sensemaking theory, this study examines how employees' sensemaking counters organizational changes with the help of knowledge management. Further, this study examines how effective leadership role in the corporate sector redefine their goals and values due to the current uncertain global situation to ensure their survival in a competitive environment. Our hypotheses were supported by a time-lagged examination of 403 employees working in Pakistan corporate sector organizations. Hierarchical regression was used to evaluate the study hypotheses. We also used the Hayes (2017) PROCESS macro model 7 to examine moderation mediation. The results show that employee sensemaking positively affects organizational change, and knowledge management mediates this relationship. Further, an effective leadership role is a buffering mechanism that strengthens the model. As a result, employees who use the broad pattern of sensemaking strategies increase their knowledge about unexpected changes. This research explains the study's findings and delves into their practical and theoretical implications. Furthermore, this study also shows a limitations. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Parameter sharing and multi-granularity feature learning for cross-modality person re-identification.
- Author
-
Chan, Sixian, Du, Feng, Tang, Tinglong, Zhang, Guodao, Jiang, Xiaoliang, and Guan, Qiu
- Subjects
INFRARED imaging ,IMAGE registration ,SHARING ,LEARNING modules ,LEARNING ,IDENTIFICATION - Abstract
Visible-infrared person re-identification aims to match pedestrian images between visible and infrared modalities, and its two main challenges are intra-modality differences and cross-modality differences between visible and infrared images. To address these issues, many advanced methods attempt to design new network structures to extract modality-sharing features, mitigate modality differences, or learn part-level features to overcome background interference. However, they ignore the parameter sharing of the convolutional layers to obtain more modality-sharing features. At the same time, only using part-level features lack discriminative pedestrian representations such as body structure and contours. To handle these problems, a parameter sharing and feature learning network is proposed in this paper to mitigate modality differences and further enhance feature discrimination. Firstly, a new two-stream parameter sharing network is proposed, by sharing the convolutional layers parameters to obtain more modality-sharing features. Secondly, a multi-granularity feature learning module is designed to reduce modality differences at both coarse and fine-grained levels while further enhancing feature discriminability. In addition, a center alignment loss is proposed to learn relationships between identities and to reduce modality differences by clustering features into their centers. For the part-level feature learning, the hetero-center triplet loss is adopted to alleviate the strict constraints of triplet loss. Finally, extensive experiments are conducted to validate our method outperforms state-of-the-art methods on two challenging datasets. In the SYSU-MM01 dataset, the Rank-1 and mAP reach 74.0 % and 70.51 % in the all-search mode, which is an increase of 3.4 % and 3.61 % to baseline, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. CFP: A Coherence-Free Processor Design.
- Author
-
Yang, Franklin
- Subjects
COST effectiveness ,CACHE memory ,MULTIPROCESSORS ,DESIGN ,COMPUTER software ,SHARING - Abstract
This paper presents the design of a Coherence-Free Processor (CFP) that enables a scalable multiprocessor by eliminating cache coherence operations in both hardware and software. The CFP uses a coherence-free cache (CFC) that can improve the cost-effectiveness and performance-effectiveness of the existing multiprocessors for commonly used workloads. The CFC is feasible because not all program data that reside in a multiprocessor cache need to be accessed by other processors, and private caches at level 1 (L1) and level 2 (L2) facilitate this method of sharing. Reentrant programs are specifically designed to protect their data from modification by other tasks. Program data that are modified but not shared with other tasks do not require a coherence protocol. Adding processors reduces the multitasking queue, reducing elapsed time. Simultaneous execution replaces concurrent execution. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. Joint extraction model of entity relations based on decomposition strategy.
- Author
-
Li, Ran, La, kaijun, Lei, Jingsheng, Huang, Liya, Ouyang, Jing, Shu, Yu, and Yang, Shengying
- Subjects
- *
NATURAL language processing , *IDENTIFICATION , *CLASSIFICATION , *SHARING - Abstract
Named entity recognition and relation extraction are two important fundamental tasks in natural language processing. The joint entity-relationship extraction model based on parameter sharing can effectively reduce the impact of cascading errors on model performance by performing joint learning of entities and relationships in a single model, but it still cannot essentially get rid of the influence of pipeline models and suffers from entity information redundancy and inability to recognize overlapping entities. To this end, we propose a joint extraction model based on the decomposition strategy of pointer mechanism is proposed. The joint extraction task is divided into two parts. First, identify the head entity, utilizing the positive gain effect of the head entity on tail entity identification.Then, utilize a hierarchical model to improve the accuracy of the tail entity and relationship identification. Meanwhile, we introduce a pointer model to obtain the joint features of entity boundaries and relationship types to achieve boundary-aware classification. The experimental results show that the model achieves better results on both NYT and WebNLG datasets. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Knowledge graph representation method for semantic 3D modeling of Chinese grottoes.
- Author
-
Yang, Su and Hou, Miaole
- Subjects
- *
KNOWLEDGE graphs , *KNOWLEDGE representation (Information theory) , *REPRESENTATIONS of graphs , *NATURAL language processing , *CAVES , *EXPERTISE , *SHARING - Abstract
The integration of 3D geometric models with semantic information significantly improves the applicability and comprehensibility of cultural heritage. The semantic 3D modeling of Chinese grottoes poses challenges for individuals without expertise in cultural heritage due to gaps in domain knowledge and discrepancies in understanding. However, the existing domain ontology and knowledge graph provide an insufficient representation of the knowledge of Chinese grottoes. To overcome these obstacles, we propose a knowledge graph representation method to provide explicit knowledge for participants at different stages of semantic 3D modeling of Chinese grottoes, which includes schema layer construction and data layer construction. On the schema layer, we design a domain ontology named ChgOnto (Chinese Grottoes Ontology) that consists of four high-level concept classes: spatial object, informational object, digital device, and temporal object. Among the classes in the ChgOnto, the components (e.g., cliff wall, cave roof, cliff wall footing), elements (e.g., primary Buddha statue, pedestal, decoration), the properties (e.g., length, width, depth) of caves and niches in Chinese grottoes as well as the spatial relationships between them are all precisely defined. ChgOnto also reuse the classes from the renowned CIDOC CRM ontology in the cultural heritage field and GeoSPARQL in the geospatial domain, facilitating integration between the two subjects. Considering the schema layer as the conceptual data model, the data layer extracts knowledge from unstructured text through natural language processing tools to instantiate the abstract classes and fill the properties of the schema layer. Finally, the knowledge required for semantic 3D modeling of Chinese grottoes is expressed in the data layer by a knowledge graph in a fixed expression form. Dazu Rock Carvings, a World Heritage site in China, is selected as a case study to validate the practicality and effectiveness of the proposed method. The results reveal that our method offers a robust knowledge-sharing platform for the semantic 3D modeling of Chinese grottoes and demonstrates excellent scalability. The method proposed in this paper can also serve as an informative reference for other types of cultural heritage. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
34. Unraveling the dynamics and identifying the "superstars" of R&D alliances in IUR collaboration: a two-mode network analysis in China.
- Author
-
Xing, Zeyu, Wang, Li, and Fang, Debin
- Subjects
INTERORGANIZATIONAL networks ,TECHNOLOGY transfer ,KNOWLEDGE transfer ,RESEARCH institutes ,COMMERCIALIZATION ,UNIVERSITY rankings ,SHARING ,PSYCHOTHERAPIST-patient relations ,THERAPEUTIC alliance - Abstract
The collaborations between industry, university, and research institutes have become more relevant with the trend of knowledge commercialization, while whether there exists a "superstar" in R&D alliance networks, who played a key role in the diffusion and transfer of technology and knowledge, remains unexplored. Based on R&D activities information of joint patents in China, this study applied two-mode network analysis to understand the R&D alliance network of the industry-university-research institute (IUR) collaboration. Three types of networks, collaboration networks, knowledge networks, and inter-organizational technology networks among IUR are developed, and their evolution process is analyzed at different levels, including overall structure, individual characteristics, and temporal evolution among IUR. The results show that no permanent superstar is being the dominant position. Distinct modes have been emerging in different periods: in the formation period, the mode is U-R, I-U, U, R, I; in the growth period, the mode is I-R, I-U, I-U-R; in the mature period, the mode is I-U-R. In addition, different technology classes were aggregated in different periods. This paper attempts to provide countermeasures and recommendations for enterprises, universities, and research institutions to enable the success of their collaborations. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
35. Justice, power, and truth: Plato and twentieth-century biopower in Karl Popper and Jan Patočka.
- Author
-
Cimino, Antonio
- Subjects
- *
JUSTICE , *TWENTIETH century , *CULTURAL history , *POLITICS & culture , *TOTALITARIANISM , *GENEALOGY , *INTELLECTUAL history , *SHARING - Abstract
The aim of this article is to demonstrate that even if Popper's and Patočka's interpretations of Plato originate in philosophical and intellectual traditions that have nothing or very little to do with each other, they share a common target, that is, modern biopower, which culminated in twentieth-century totalitarianism. If we examine Popper's and Patočka's interpretations of Plato from a biopolitical angle, it is possible to view them in a new light, that is, as two different, even opposing, intellectual and philosophical approaches to the very same tragic events that European culture and politics experienced in the twentieth century. Despite the radically divergent results of their readings, Popper and Patočka share a starting point, that is, the effort to outline a genealogy of European cultural and intellectual history in the light of Plato. The first section of this article explains why and to what extent Popper's and Patočka's interpretations can be considered genealogical readings. The second section elaborates on their different approaches to the relationship between justice and power in Plato. The third section concentrates on the relationship between Plato and twentieth-century biopower. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
36. Differences in the Social Motivations and Emotions of Humans and Other Great Apes.
- Author
-
Tomasello, Michael
- Subjects
- *
HOMINIDS , *EMOTIONS , *SHAME , *MOTIVATION (Psychology) , *INGROUPS (Social groups) , *RESENTMENT , *SHARING , *FAIRNESS - Abstract
Humans share with other mammals and primates many social motivations and emotions, but they are also much more cooperative than even their closest primate relatives. Here I review recent comparative experiments and analyses that illustrate humans' species-typical social motivations and emotions for cooperation in comparison with those of other great apes. These may be classified most generally as (i) 'you > me' (e.g., prosocial sympathy, informative and pedagogical motives in communication); (ii) 'you = me' (e.g., feelings of mutual respect, fairness, resentment); (iii) 'we > me' (e.g., feelings of obligation and guilt); and (iv) 'WE (in the group) > me' (e.g., in-group loyalty and conformity to norms, shame, and many in-group biases). The existence of these species-typical and species-universal motivations and emotions provides compelling evidence for the importance of cooperative activities in the human species. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
37. Single-minded animals sharing intentionality and norms: Preston Stovall: The single-minded animal: shared intentionality, normativity, and the foundations of discursive cognition. New York: Routledge, 2022, 398 pp, $136.00 HB, $42.36 PB.
- Author
-
Beasley, Brandon
- Subjects
- *
COGNITION , *NORMATIVITY (Ethics) , *SCIENTIFIC method , *NEUROPHYSIOLOGY , *BOOK value , *COGNITIVE neuroscience , *SHARING - Abstract
Preston Stovall's book, "The Single-Minded Animal," offers an interdisciplinary perspective on human cognition, incorporating philosophy, evolutionary biology, psychology, and neuroscience. Stovall argues that what distinguishes human cognition from that of other animals is its normative and discursive character. He introduces the concept of single-mindedness, which involves the rejection of choices incompatible with one's chosen course of thought or action. While the book's ambitious scope and novel ideas are commendable, some critics question the compatibility of Stovall's claims with other philosophical and scientific approaches, as well as the relationship between neurophysiological "picturing" and discursive symbolic meanings. Nonetheless, the book highlights the value of broad-mindedness in philosophical and scientific inquiry. [Extracted from the article]
- Published
- 2023
- Full Text
- View/download PDF
38. Körperpolitik – eine Körperbeziehungsübung.
- Author
-
Pichlhöfer, Christine
- Abstract
Copyright of Zeitschrift für Psychodrama und Soziometrie is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2023
- Full Text
- View/download PDF
39. SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier.
- Author
-
Krishna, Danda Prudhvi, Ramaguru, R., Praveen, K., Sethumadhavan, M., Ravichandran, Kattur Soundarapandian, Krishankumar, Raghunathan, and Gandomi, Amir H.
- Subjects
- *
IDENTITY theft , *SHARING , *BLOCKCHAINS - Abstract
OAuth2.0 is a Single Sign-On approach that helps to authorize users to log into multiple applications without re-entering the credentials. Here, the OAuth service provider controls the central repository where data is stored, which may lead to third-party fraud and identity theft. To circumvent this problem, we need a distributed framework to authenticate and authorize the user without third-party involvement. This paper proposes a distributed authentication and authorization framework using a secret-sharing mechanism that comprises a blockchain-based decentralized identifier and a private distributed storage via an interplanetary file system. We implemented our proposed framework in Hyperledger Fabric (permissioned blockchain) and Ethereum TestNet (permissionless blockchain). Our performance analysis indicates that secret sharing-based authentication takes negligible time for generation and a combination of shares for verification. Moreover, security analysis shows that our model is robust, end-to-end secure, and compliant with the Universal Composability Framework. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
40. Examining the association between social media fatigue, cognitive ability, narcissism and misinformation sharing: cross-national evidence from eight countries.
- Author
-
Ahmed, Saifuddin and Rasul, Muhammad Ehab
- Subjects
- *
COGNITIVE ability , *SOCIAL media , *NARCISSISM , *MISINFORMATION , *PERSONALITY , *SHARING - Abstract
Several studies have explored the causes and consequences of public engagement with misinformation and, more recently, COVID-19 misinformation. However, there is still a need to understand the mechanisms that cause misinformation propagation on social media. In addition, evidence from non-Western societies remains rare. This study reports on survey evidence from eight countries to examine whether social media fatigue can influence users to believe misinformation, influencing their sharing intentions. Our insights also build on prior cognitive and personality literature by exploring how this mechanism is conditional upon users' cognitive ability and narcissism traits. The results suggest that social media fatigue can influence false beliefs of misinformation which translates into sharing on social media. We also find that those with high levels of cognitive ability are less likely to believe and share misinformation. However, those with low cognitive ability and high levels of narcissism are most likely to share misinformation on social media due to social media fatigue. This study is one of the first to provide cross-national comparative evidence highlighting the adverse effects of social media fatigue on misinformation propagation and establishing that the relationship is not universal but dependent on both cognitive and dark personality traits of individuals. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
41. Broadcasting revenue sharing after cancelling sports competitions.
- Author
-
Bergantiños, Gustavo and Moreno-Ternero, Juan D.
- Subjects
- *
SPORTS competitions , *ATHLETIC leagues , *BROADCASTING industry , *COVID-19 pandemic , *SHARING - Abstract
The COVID-19 pandemic forced the partial or total cancellation of most sports competitions worldwide. Sports organizations crucially rely on revenues raised from broadcasting. How should the allocation of these revenues be modified when sports leagues are cancelled? We aim to answer that question in this paper by means of the axiomatic approach. Two extension operators (dubbed zero and leg operators, respectively) will play a major role in our analysis. We show that several combinations of axioms (formalizing ethical or strategic principles) characterize the image via those operators of two focal rules: the equal-split rule and concede-and-divide. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
42. Searching sharing relationship for instance segmentation decoder.
- Author
-
Xi, Yuling, Wang, Ning, Wan, Shaohua, Wang, Xiaoming, Wang, Peng, and Zhang, Yanning
- Subjects
REINFORCEMENT learning ,FEATURE selection ,SHARING ,IMAGE segmentation - Abstract
Instance segmentation is a typical visual task that requires per-pixel mask prediction with a category label for each instance. For the decoder in instance segmentation network, parallel branches or towers are commonly adopted to deal with instance- and dense-level predictions. However, this parallelism ignores inter-branch and inner-branch relationships. Besides, how the different branches are connected is unclear, which is difficult to explore manually in practice. To address the above issues, we introduce Neural Architecture Search (NAS) to automatically search for hardware and memory-friendly feature sharing branch. Concretely, applying to instance segmentation, we design a search space considering both operations and sharing connections of parallel branches. Through a tailored reinforcement learning(RL) paradigm, we can efficiently search multiple architectures with different shared patterns and tap more feature selection possibilities. Our method is generically useful and can be transferred to analogous multi-task networks. The searched architecture shares features in the middle of the head branches and utilizes instance-level head features to generate pixel-level predictions. Extensive experiments demonstrate the effectiveness and surpass classical parallel decoder networks, exceeding BlendMask by 1.2% on bounding box mAP and 0.9% on segmentation mAP. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
43. I Want More! The Role of Child, Family and Maternal Characteristics on Child Dispositional Greed and Sharing Behavior.
- Author
-
van den Heuvel, Marion I., Seuntjes, Terri G., Ang, Dionysius, Lewis, Toni, and Zeelenberg, Marcel
- Subjects
AVARICE ,PROSOCIAL behavior ,MOTHER-child relationship ,MINDFULNESS ,SHARING ,FAMILIES - Abstract
Greed is often regarded as a negative trait that impedes prosocial behavior in adults. Yet, relatively little is known about the development of greed and its effects on children. We examine the effect of dispositional greed on sharing behavior in 4-to-6-year-olds. In addition, we identified potential factors associated with child greed, including child, family, and maternal characteristics. This study with 63 mother–child dyads (Age
child = 5.11, SD = 0.88, 50.8% female) revealed that child greed was associated with less prosocial behavior in an observational sharing task. More specifically, children who were reported as greedier by their mothers shared less than less greedy children. Having fewer siblings, less mindful maternal parenting style, and high maternal trait anxiety was associated with higher dispositional greed in children. Additionally, their mother rated greedier children as having higher negative affectivity. These findings suggest that child greed is an important developmental trait that warrants further investigation. Highlights: • 63 mother–child dyads revealed that child greed was associated with less pro-social behavior in an observational sharing task • Child greed was associated with higher rates of child negative affectivity. • Having fewer siblings, less mindful parenting style, high maternal trait anxiety predicted dispositional greed in 4-to-6-year-old children [ABSTRACT FROM AUTHOR]- Published
- 2023
- Full Text
- View/download PDF
44. "Black people don't love nature": white environmentalist imaginations of cause, calling, and capacity.
- Author
-
Hughey, Matthew W.
- Subjects
- *
BLACK people , *RACIAL identity of white people , *ENVIRONMENTAL disasters , *PATERNALISM , *RACE relations , *MORAL attitudes , *IMAGINATION , *CHARACTER , *SHARING - Abstract
I examine how white British members of a London-area environmental group conceptualize race in relation to ecological disasters. Based on a five-year (2018–2022) ethnographic study, members employed racialized narratives and symbolic boundaries to construct who was the cause of disasters, who had the moral responsibility or calling to remediate disasters, and who possessed the adequate resources and capacity to fix disasters. Together, these narratives formed a tripartite racial imaginary which functioned to demarcate the symbolic boundaries of an ideal, white racial identity that was intimately crocheted with notions of authentic guilt and remorse, responsibility and liability, work ethics, competent knowledge, resource mobilization, moral commitment, and racial paternalism and superiority. Through the pursuit of this White racial ideal, members frequently conceptualized ecological disasters throughout the non-white world as the fault of specific actions by non-White people, identified unique racialized actors as the proper responsible parties for working on the remediation of ecological disasters, and also assigned particular White people from Westernized, industrial, democratic states as the only people in possession of the appropriate knowledge, resources, and character to clean-up and manage a healthy environment. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
45. Tokenization of social media engagements increases the sharing of false (and other) news but penalization moderates it.
- Author
-
Alizadeh, Meysam, Hoes, Emma, and Gilardi, Fabrizio
- Subjects
- *
MONETARY incentives , *SOCIAL media , *USER-generated content , *SHARING , *MASS media industry - Abstract
Some major social media companies are announcing plans to tokenize user engagements, derived from blockchain-based decentralized social media. This would bring financial and reputational incentives for engagement, which might lead users to post more objectionable content. Previous research showed that financial or reputational incentives for accuracy decrease the willingness to share misinformation. However, it is unclear to what extent such outcome would change if engagements instead of accuracy were incentivized, which is a more realistic scenario. To address this question, we conducted a survey experiment to examine the effects of hypothetical token incentives. We find that a simple nudge about the possibility of earning token-based points for the achieved user engagements increases the willingness to share different kinds of news, including misinformation. The presence of penalties for objectionable posts diminishes the positive effect of tokenization rewards on misinformation sharing, but it does not eliminate it. These results have policy implications for content moderation practices if platforms embrace decentralization and engagement tokenization. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
46. ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism.
- Author
-
Shi, Ruonan, Chen, Yuling, Tan, Chaoyue, Luo, Yun, and Li, Tao
- Subjects
REPUTATION ,CLOUD storage ,SHARING ,GAME theory ,CLOUD computing - Abstract
The traditional threshold secret sharing scheme only allows the participants' sub-secret shares to be used once in the reconstruction process. Several multi-secret sharing schemes have been proposed that are related to cloud computing, aiming to improve reconstruction efficiency. Rational secret sharing is a technique that combines secret sharing with game theory. In traditional rational multi-secret sharing, participants must reconstruct all secrets, resulting in unnecessary overhead. Rational participants will act dishonestly to maximize their own interests, leading to a prisoner's dilemma and incomplete secret reconstruction. Additionally, when sharing multiple secrets, the Dealer must distribute the sub-secret shares of all secrets to the participants, increasing overhead. In this paper, we propose a rational optional multi-secret sharing scheme based on a reputation mechanism that selectively reconstructs secrets according to participants' needs in the context of cloud computing. Our scheme introduces a reputation mechanism to evaluate participants' reputation values to avoid their dishonest behaviors. Furthermore, we adopt a broadcast encryption matrix so that participants only need to receive a single sub-secret share to participate in multi-secret reconstruction. Our security analysis shows that the proposed scheme can effectively constrain the self-interested behavior of rational participants and reduce the overhead in the process, thus multi-secret sharing scheme can provide more efficient and secure solutions for secret sharing in key management and distributive storage for the cloud scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
47. Error Disclosure Climate and Safety Climate Trajectories: the Mediating Role of Counterfactual Sharing.
- Author
-
He, Yimin, Lee, Jin, Huang, Yueng-hsiang, Yao, Xiang, and Courtney, Theodore K.
- Subjects
- *
COUNTERFACTUALS (Logic) , *MEDICAL personnel , *CLIMATE change , *ORGANIZATIONAL effectiveness , *SHARING - Abstract
Safety climate evolves in reflection of the effectiveness of organizational safety management efforts. The present study identified patterns of safety climate change over time and examined the role of error disclosure climate and counterfactual sharing in relation to safety climate change patterns. Online surveys were administered in a Chinese hospital three times at approximately 1-month intervals; the final sample included 451 healthcare workers nested within 62 teams. A latent growth mixture modeling approach was adopted to identify representative patterns of safety climate change at both individual and team levels and the predictors of those patterns. Three patterns of safety climate trajectories, declining (16%), improving (39%), and maintaining (45%), were identified at the individual level. Positive error disclosure climate and counterfactual sharing were significantly associated with increased probability of membership in the improving and maintaining trajectories compared to the declining trajectories. Counterfactual sharing mediated the relation between error disclosure climate and membership of safety climate trajectories. At the team level, two patterns of safety climate change, declining (15%) and improving (85%), were identified. Team counterfactual sharing was significantly associated with increased probability of membership in the improving trajectories compared to the declining trajectories. The current study demonstrated that an open and non-judgmental culture and the practice of sharing errors can contribute to improving safety climate over time. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
48. Joint optimisation of drone routing and battery wear for sustainable supply chain development: a mixed-integer programming model based on blockchain-enabled fleet sharing.
- Author
-
Xia, Yang, Zeng, Wenjia, Xing, Xinjie, Zhan, Yuanzhu, Tan, Kim Hua, and Kumar, Ajay
- Subjects
- *
SUPPLY chains , *DATA encryption , *SHARING economy , *BLOCKCHAINS , *DISTRIBUTION planning , *ECONOMIC indicators , *SHARING - Abstract
Alongside the rise of 'last-mile' delivery in contemporary urban logistics, drones have demonstrate commercial potential, given their outstanding triple-bottom-line performance. However, as a lithium-ion battery-powered device, drones' social and environmental merits can be overturned by battery recycling and disposal. To maintain economic performance, yet minimise environmental negatives, fleet sharing is widely applied in the transportation field, with the aim of creating synergies within industry and increasing overall fleet use. However, if a sharing platform's transparency is doubted, the sharing ability of the platform will be discounted. Known for its transparent and secure merits, blockchain technology provides new opportunities to improve existing sharing solutions. In particular, the decentralised structure and data encryption algorithm offered by blockchain allow every participant equal access to shared resources without undermining security issues. Therefore, this study explores the implementation of a blockchain-enabled fleet sharing solution to optimise drone operations, with consideration of battery wear and disposal effects. Unlike classical vehicle routing with fleet sharing problems, this research is more challenging, with multiple objectives (i.e., shortest path and fewest charging times), and considers different levels of sharing abilities. In this study, we propose a mixed-integer programming model to formulate the intended problem and solve the problem with a tailored branch-and-price algorithm. Through extensive experiments, the computational performance of our proposed solution is first articulated, and then the effectiveness of using blockchain to improve overall optimisation is reflected, and a series of critical influential factors with managerial significance are demonstrated. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
49. Advancing Partial Verification of Watermarking for Arabic Text via Utilization of Innovative Counting-Based Secret Sharing.
- Author
-
Gutub, Adnan and Almehmadi, Esraa
- Subjects
- *
WATERMARKS , *DIGITAL watermarking , *ARABIC language , *SHARING , *INFORMATION technology security , *HADITH - Abstract
Digital watermarking may be utilized to identify illicit usage of text as a means to protect its copyright. This research proposes an advanced watermarking method for Arabic text that supports slight verification through the innovative utilization of counting-based secret sharing. The results of the suggested method are compared with several other existing watermarking techniques using applicable tests conducted across identical Arabic benchmarks of the standard Imam Nawawi's Forty Hadiths, as shown to be favorable in terms of speed, capacity, and security. The research further tested its resilience against the majority of conceivable manipulating text assaults showing our anticipated method to be impervious to electronic text attacks. Interestingly, this approach is not limited to Arabic language script only, as it is applicable to any related text-structure such as Urdu and Farsi writings. The work suggests attractive research contributions and exciting findings pointing the way forward to future specific and smart watermarking enhancements. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
50. Combating Misinformation by Sharing the Truth: a Study on the Spread of Fact-Checks on Social Media.
- Author
-
Li, Jiexun and Chang, Xiaohui
- Subjects
MISINFORMATION ,SOCIAL media ,SHARING - Abstract
Misinformation on social media has become a horrendous problem in our society. Fact-checks on information often fall behind the diffusion of misinformation, which can lead to negative impacts on society. This research studies how different factors may affect the spread of fact-checks over the internet. We collected a dataset of fact-checks in a six-month period and analyzed how they spread on Twitter. The spread of fact-checks is measured by the total retweet count. The factors/variables include the truthfulness rating, topic of information, source credibility, etc. The research identifies truthfulness rating as a significant factor: conclusive fact-checks (either true or false) tend to be shared more than others. In addition, the source credibility, political leaning, and the sharing count also affect the spread of fact-checks. The findings of this research provide practical insights into accelerating the spread of the truth in the battle against misinformation online. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.