Results 1 to 10 of about 31 (29)

Application of Securitization of Leasing Assets

open access: yesVestnik MGIMO-Universiteta, 2014
Securitization of leasing assets was widely adopted abroad within the last decades. Securitization of leasing assets usually is meant as process of formation of a portfolio based on future leasing payments of one and (or) more leasing company and sale of
Igor Viktorovich Linev
doaj   +5 more sources

Carceral algorithms and the history of control: An analysis of the Pennsylvania additive classification tool

open access: yesBig Data & Society, 2022
Scholars have focused on algorithms used during sentencing, bail, and parole, but little work explores what we term “carceral algorithms” that are used during incarceration.
Vanessa A. Massaro   +3 more
doaj   +1 more source

Credit Risk Evaluation of Asset Securitization of PPP Project of Sports Public Service Venues Based on Random Forest Algorithm

open access: yesComputational Intelligence and Neuroscience, 2022
Due to the characteristics of sports public service venues, there are still some financing difficulties under the PPP (public-private partnership) operation mode. Although asset securitization can solve its corresponding problems and enhance the standardization of PPP projects, its many participants, complex transaction structure, and other influencing
openaire   +2 more sources

Information and communication components of diplomatic missions’ work

open access: yesІнтегровані комунікації, 2018
The urgency of the topic of research is determined by global trends in the development of world politics in general and the algorithm of forming the national security model of Ukraine in the context of hybrid warfare with Russia in particular.
Yuliia Sedliar, Olha Stadnichenko
doaj   +1 more source

Blockchain-enabled asset-backed securitization and digital transformation in E-commerce supply chains: a game-theoretic approach

open access: yesFrontiers in Blockchain
IntroductionThe development and growth of Asset-Backed Securitization (ABS) finance in the e-commerce supply chain is of great value in alleviating the capital constraints of enterprises.
Lei Yang   +3 more
doaj   +1 more source

Securitizing the algorithm: a quantitative analysis of liberalization and securitization logics in the EU Artificial Intelligence Act

open access: yesFrontiers in Political Science
IntroductionThe EU Artificial Intelligence Act (AI Act) represents a global landmark in digital governance, yet the underlying political rationale structuring its provisions—securitization versus liberalization—remains underexplored.
Athanasios Raptis, Nikolaos Papadakis
doaj   +1 more source
Some of the next articles are maybe not open access.

Algorithmic extremism? The securitization of artificial intelligence (AI) and its impact on radicalism, polarization and political violence

Technology in Society, 2023
Artificial intelligence is often framed as a tool to be used to counter violent extremism. This paper seeks to make a contribution to scholarship on the use of AI by considering the other side of the debate: how AI and algorithms themselves can and are being used to radicalize, polarize, and spread racism and political instability. The central argument
openaire   +1 more source

When Big Data Meet Securitization. Algorithmic Regulation with Passenger Name Records

European Journal for Security Research, 2018
This contribution deals with big data as a resource for state regulation. The academic interest in the specificities of contemporary technology-based regulation has generated the concept of “algorithmic regulation” (Yeung, Regulat Govern 347(6):1–19, 2017), which yet needs to be refined empirically. This article sets out to analyze the use of passenger
openaire   +1 more source

Algorithmes gloutons et fonctions surmodulaires: Théorie et application à un problème de sécurité dans les réseaux de télécommunications

Annales des Télécommunications, 1980
Apres un rappel des algorithmes gloutons, cet article presente deux methodes de resolution accelerees et exactes des problemes de recherche de sousensembles optimaux maximisant une fonction objectif surmodulaire: une premiere methode fournit de tres bonnes solutions approchees et un encadrement (au sens de l’inclusion) de l’optimum exact; une deuxieme ...
openaire   +2 more sources

Home - About - Disclaimer - Privacy