6,017 Hits in 6.0 sec


Elvira Perez Vallejos, Kruakae Pothong, Stephen Coleman, Ansgar Koene, Chris James Carter, Ramona Statache, Tom Rodden, Derek McAuley, Monica Cano, Svenja Adolphs, Claire O'Malley
2016 Computers & society  
In this paper we present a new methodological approach to promote digital literacy and positively influence the way in which young people interact with the Internet: iRights Youth Juries.  ...  These juries offer a solution for the challenge of how to engage children and young people in activities that, rather than simply promoting Internet safety, aim to provide the knowledge and the confidence  ...  to and maximise their ecological validity.  ... 
doi:10.1145/2874239.2874252 fatcat:ug2lirhffvfmpeyyaq7morgbw4

The Jury Trial Reinvented

Christopher Robertson, Michael Elias Shammas
2021 Texas A&M Law Review  
As an institution, the jury trial is purpose-built to engage citizens in the process of deliberative, participatory democracy with ground rules.  ...  A reinvented, modernized jury institution can better serve its purposes by increasing citizen engagement, better fostering civic education and democratic deliberation, improving accuracy in sorting truth  ...  trial has heretofore been granted in an action at law in federal court . . . ."); see Cassandra Burke Robertson, Judging Jury Verdicts, 83 TUL.  ... 
doi:10.37419/lr.v9.i1.3 fatcat:vmypbyzcafb4pjpuahpqk3ydnu

Jury Still Out on Pioneering Treatment

E. M.
1995 Science  
Drug effects on excitation-contraction coupling in cardiac muscle cells. Requires experience in cardiac cell function and/or electrophysiology.  ...  Investigation of the antigenicity of phospholipid metabolites in animals and humans exposed to alcohol. Requires experience in antibody characterization and production.  ...  s properties of neural circuits, networks and systems.  ... 
doi:10.1126/science.269.5227.1051 fatcat:uqpd7d7i7bgx7fdic6s4lmtnw4

Judge, Jury Encryptioner: Exceptional Device Access with a Social Cost [article]

Sacha Servan-Schreiber, Archer Wheeler
2020 arXiv   pre-print
We present Judge, Jury and Encryptioner (JJE) an exceptional access scheme for unlocking devices that does not give unilateral power to any single authority.  ...  JJE distributes maintenance of the protocol across a network of "custodians" such as courts, government agencies, civil rights watchdogs, and academic institutions.  ...  One can view participation in JJE as an extension of jury duty in the digital sphere.  ... 
arXiv:1912.05620v3 fatcat:tuxaalerbfff7kzcqtbrsgrfsi

Corpus Juris, Habeas Corpus, and the "Corporeal Turn" in the Humanities

Martin A. Kayman
2016 Law and Literature  
Corpus Juris, Habeas corpus, and the "corporeal turn" in the humanities. Law and Literature 28 (3) , pp.  ...  Central to belief in the justice of the verdicts of this law is the separation of literal fact from legal significance and their allocation in the jury trial to different readers.  ...  individual human control across the entire corpus or a sub-set thereof.  ... 
doi:10.1080/1535685x.2016.1232923 fatcat:lsdqegyvm5bb3bnypie6pmznbm

Tech Effect and Generational Age Implications on Jury Verdicts

Joseph Lobo
2015 Foresic Research & Criminology International Journal  
In addition, although juries are cross-generational, past studies have been conducted primarily using college age students as mock jurors.  ...  Past research has been conducted on certain demographic variables and their effect on jury verdicts, but there has been little research on the impact of age on jury decisions.  ...  This framework used to define technology is something that needs to be considered in future research.  ... 
doi:10.15406/frcij.2015.01.00016 fatcat:7dxmywzhzfdmpaqc7roixk55tq

Guess Who? Reducing the Role of Juries in Determining Libel Plaintiffs' Identities

Nat S. Stern
2019 Social Science Research Network  
Network, Inc., 702 N.E.2d 149, 152-54 (Ohio Ct.  ...  App. 1997) (dismissing claims based on alleged defamatory statements about a software company, made in newspaper and on television, brought by operator of company).115 410 F.  ... 
doi:10.2139/ssrn.3422956 fatcat:eilweczlljeofilyjycu5svedq

The jury is still out: Psychoemotional support in peer e-mentoring for transition to university

Angelica Risquez, Marife Sanchez-Garcia
2012 The Internet and higher education  
Highlights The jury is still out: psychoemotional support in peer e-mentoring for transition to university Abstract This study investigates how computer mediated communication (CMC) can sustain nourishing  ...  A peer electronic mentoring program was implemented in an Irish university to facilitate freshmen's transition to college.  ...  Baker and Siryk, 1999) which was previously validated in the institution (Morley et al., 2006) .  ... 
doi:10.1016/j.iheduc.2011.11.003 fatcat:u4cyugpynjhspnexuibu7uvvve

Rule-Based Policy Representations and Reasoning [chapter]

Piero Andrea Bonatti, Juri Luca De Coi, Daniel Olmedilla, Luigi Sauro
2009 Lecture Notes in Computer Science  
part of this chapter is devoted to the description of the Protune framework, a system for specifying and cooperatively enforcing security and privacy policies on the Semantic Web developed within the network  ...  Policies are a well-known approach to protecting security and privacy of users in the context of the Semantic Web: in the last years a number of policy languages were proposed to address different application  ...  Ponder defines a specific kind of policies in order to deal with delegation: the field valid allows positive delegation policies to specify constraints (e.g., time restrictions) to limit the validity of  ... 
doi:10.1007/978-3-642-04581-3_4 fatcat:jfydzx7ysffi7fvguxxv4queze

Virtual Inertia Control Methods in Islanded Microgrids

Vjatseslav Skiparev, Ram Machlev, Nilanjan Roy Chowdhury, Yoash Levron, Eduard Petlenkov, and Juri Belikov
2021 Energies  
In this survey, recent works related to virtual inertia control methods in islanded microgrids are reviewed.  ...  numerical challenges, and which control strategies will predominate in the following years.  ...  according to current policy and disturbances exploration 7: Execute action a t of the actor network 8: Observe reward r t and state s t+1 using the critic network 9: if r ≥ r target then Controller training  ... 
doi:10.3390/en14061562 fatcat:6fcls2c75nfwfkvvzxnfobxxfy

After the Gold Rush - Part II: Hamdi, the Jury Trial, and Our Degraded Public Sphere

Daniel R. Williams
2007 Social Science Research Network  
a storyline of democracy in action.  ...  The judiciary has a role, too, in this story of democracy in action. It engages in a different sort of calibration.  ... 
doi:10.2139/ssrn.1012678 fatcat:ldn3hb2gjfggpfxpzremmbqvrm

After the Gold Rush, Part II: Hamdi, the Jury Trial, and Our Degraded Public Sphere

Daniel R. Williams
2007 Social Science Research Network  
a storyline of democracy in action.  ...  The judiciary has a role, too, in this story of democracy in action. It engages in a different sort of calibration.  ... 
doi:10.2139/ssrn.1012355 fatcat:zpbcmrn4snaptktdvggbllsglm

A Security Architecture for 5G Networks

Ghada Arfaoui, Pascal Bisson, Rolf Blom, Ravishankar Borgaonkar, Hakan Englund, Edith Felix, Felix Klaedtke, Prajwol Kumar Nakarmi, Mats Naslund, Piers O'Hanlon, Juri Papay, Jani Suomalainen (+3 others)
2018 IEEE Access  
Key technology concepts are network slicing and network softwarisation, including network function virtualisation and software-defined networking.  ...  In a smart city use case setting, we illustrate its utility; we examine the high-level security aspects stemming from the deployment of large numbers of IoT devices and network softwarisation.  ...  best practises [19] . 6) Implement defined security controls and validate achieved network security objectives.  ... 
doi:10.1109/access.2018.2827419 fatcat:qlfa4443yjandm72tmjjic26fa

Early Detection of Network Attacks Using Deep Learning [article]

Tanwir Ahmad, Dragos Truscan, Juri Vain, Ivan Porres
2022 arXiv   pre-print
The network is trained in a supervised manner to extract relevant features from raw network traffic data instead of relying on a manual feature selection process used in most related approaches.  ...  In this paper, we propose an end-to-end early intrusion detection system to prevent network attacks before they could cause any more damage to the system under attack while preventing unforeseen downtime  ...  The era of controlled communication in closed networks for restricted purposes is over.  ... 
arXiv:2201.11628v2 fatcat:vvsmvt7p2rb23mx43cty4eat6y

Resilience Analysis for Double Spending via Sequential Decision Optimization

Juri Hinz
2020 Applied System Innovation  
One of the innovations in this technology is the use of the proof-of-work (PoW) concept for reaching a consensus within a distributed network of autonomous computer nodes.  ...  In this context, the analysis of attack vectors, which represent potentially successful deviations from the honest behavior, turns out to be the most crucial question.  ...  Their software realizations are based on a mixture of traditional techniques (peer-to-peer networking, data encryption) and modern concepts (consensus protocols).  ... 
doi:10.3390/asi3010007 fatcat:7n6zumaanfgyfefrb3eexskguq
« Previous Showing results 1 — 15 out of 6,017 results