A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Juries
2016
Computers & society
In this paper we present a new methodological approach to promote digital literacy and positively influence the way in which young people interact with the Internet: iRights Youth Juries. ...
These juries offer a solution for the challenge of how to engage children and young people in activities that, rather than simply promoting Internet safety, aim to provide the knowledge and the confidence ...
to and maximise their ecological validity. ...
doi:10.1145/2874239.2874252
fatcat:ug2lirhffvfmpeyyaq7morgbw4
The Jury Trial Reinvented
2021
Texas A&M Law Review
As an institution, the jury trial is purpose-built to engage citizens in the process of deliberative, participatory democracy with ground rules. ...
A reinvented, modernized jury institution can better serve its purposes by increasing citizen engagement, better fostering civic education and democratic deliberation, improving accuracy in sorting truth ...
trial has heretofore been granted in an action at law in federal court . . . ."); see Cassandra Burke Robertson, Judging Jury Verdicts, 83 TUL. ...
doi:10.37419/lr.v9.i1.3
fatcat:vmypbyzcafb4pjpuahpqk3ydnu
Jury Still Out on Pioneering Treatment
1995
Science
Drug effects on excitation-contraction coupling in cardiac muscle cells. Requires experience in cardiac cell function and/or electrophysiology. ...
Investigation of the antigenicity of phospholipid metabolites in animals and humans exposed to alcohol. Requires experience in antibody characterization and production. ...
s
properties of neural circuits, networks and systems. ...
doi:10.1126/science.269.5227.1051
fatcat:uqpd7d7i7bgx7fdic6s4lmtnw4
Judge, Jury Encryptioner: Exceptional Device Access with a Social Cost
[article]
2020
arXiv
pre-print
We present Judge, Jury and Encryptioner (JJE) an exceptional access scheme for unlocking devices that does not give unilateral power to any single authority. ...
JJE distributes maintenance of the protocol across a network of "custodians" such as courts, government agencies, civil rights watchdogs, and academic institutions. ...
One can view participation in JJE as an extension of jury duty in the digital sphere. ...
arXiv:1912.05620v3
fatcat:tuxaalerbfff7kzcqtbrsgrfsi
Corpus Juris, Habeas Corpus, and the "Corporeal Turn" in the Humanities
2016
Law and Literature
Corpus Juris, Habeas corpus, and the "corporeal turn" in the humanities. Law and Literature 28 (3) , pp. ...
Central to belief in the justice of the verdicts of this law is the separation of literal fact from legal significance and their allocation in the jury trial to different readers. ...
individual human control across the entire corpus or a sub-set thereof. ...
doi:10.1080/1535685x.2016.1232923
fatcat:lsdqegyvm5bb3bnypie6pmznbm
Tech Effect and Generational Age Implications on Jury Verdicts
2015
Foresic Research & Criminology International Journal
In addition, although juries are cross-generational, past studies have been conducted primarily using college age students as mock jurors. ...
Past research has been conducted on certain demographic variables and their effect on jury verdicts, but there has been little research on the impact of age on jury decisions. ...
This framework used to define technology is something that needs to be considered in future research. ...
doi:10.15406/frcij.2015.01.00016
fatcat:7dxmywzhzfdmpaqc7roixk55tq
Guess Who? Reducing the Role of Juries in Determining Libel Plaintiffs' Identities
2019
Social Science Research Network
Network, Inc., 702 N.E.2d 149, 152-54 (Ohio Ct. ...
App. 1997) (dismissing claims based on alleged defamatory statements about a software company, made in newspaper and on television, brought by operator of company).115 410 F. ...
doi:10.2139/ssrn.3422956
fatcat:eilweczlljeofilyjycu5svedq
The jury is still out: Psychoemotional support in peer e-mentoring for transition to university
2012
The Internet and higher education
Highlights The jury is still out: psychoemotional support in peer e-mentoring for transition to university Abstract This study investigates how computer mediated communication (CMC) can sustain nourishing ...
A peer electronic mentoring program was implemented in an Irish university to facilitate freshmen's transition to college. ...
Baker and Siryk, 1999) which was previously validated in the institution (Morley et al., 2006) . ...
doi:10.1016/j.iheduc.2011.11.003
fatcat:u4cyugpynjhspnexuibu7uvvve
Rule-Based Policy Representations and Reasoning
[chapter]
2009
Lecture Notes in Computer Science
part of this chapter is devoted to the description of the Protune framework, a system for specifying and cooperatively enforcing security and privacy policies on the Semantic Web developed within the network ...
Policies are a well-known approach to protecting security and privacy of users in the context of the Semantic Web: in the last years a number of policy languages were proposed to address different application ...
Ponder defines a specific kind of policies in order to deal with delegation: the field valid allows positive delegation policies to specify constraints (e.g., time restrictions) to limit the validity of ...
doi:10.1007/978-3-642-04581-3_4
fatcat:jfydzx7ysffi7fvguxxv4queze
Virtual Inertia Control Methods in Islanded Microgrids
2021
Energies
In this survey, recent works related to virtual inertia control methods in islanded microgrids are reviewed. ...
numerical challenges, and which control strategies will predominate in the following years. ...
according to current policy and disturbances exploration 7: Execute action a t of the actor network 8: Observe reward r t and state s t+1 using the critic network 9: if r ≥ r target then Controller training ...
doi:10.3390/en14061562
fatcat:6fcls2c75nfwfkvvzxnfobxxfy
After the Gold Rush - Part II: Hamdi, the Jury Trial, and Our Degraded Public Sphere
2007
Social Science Research Network
a storyline of democracy in action. ...
The judiciary has a role, too, in this story of democracy in action. It engages in a different sort of calibration. ...
doi:10.2139/ssrn.1012678
fatcat:ldn3hb2gjfggpfxpzremmbqvrm
After the Gold Rush, Part II: Hamdi, the Jury Trial, and Our Degraded Public Sphere
2007
Social Science Research Network
a storyline of democracy in action. ...
The judiciary has a role, too, in this story of democracy in action. It engages in a different sort of calibration. ...
doi:10.2139/ssrn.1012355
fatcat:zpbcmrn4snaptktdvggbllsglm
A Security Architecture for 5G Networks
2018
IEEE Access
Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defined networking. ...
In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of large numbers of IoT devices and network softwarisation. ...
best practises [19] . 6) Implement defined security controls and validate achieved network security objectives. ...
doi:10.1109/access.2018.2827419
fatcat:qlfa4443yjandm72tmjjic26fa
Early Detection of Network Attacks Using Deep Learning
[article]
2022
arXiv
pre-print
The network is trained in a supervised manner to extract relevant features from raw network traffic data instead of relying on a manual feature selection process used in most related approaches. ...
In this paper, we propose an end-to-end early intrusion detection system to prevent network attacks before they could cause any more damage to the system under attack while preventing unforeseen downtime ...
The era of controlled communication in closed networks for restricted purposes is over. ...
arXiv:2201.11628v2
fatcat:vvsmvt7p2rb23mx43cty4eat6y
Resilience Analysis for Double Spending via Sequential Decision Optimization
2020
Applied System Innovation
One of the innovations in this technology is the use of the proof-of-work (PoW) concept for reaching a consensus within a distributed network of autonomous computer nodes. ...
In this context, the analysis of attack vectors, which represent potentially successful deviations from the honest behavior, turns out to be the most crucial question. ...
Their software realizations are based on a mixture of traditional techniques (peer-to-peer networking, data encryption) and modern concepts (consensus protocols). ...
doi:10.3390/asi3010007
fatcat:7n6zumaanfgyfefrb3eexskguq
« Previous
Showing results 1 — 15 out of 6,017 results