Results 21 to 30 of about 2,392,451 (238)

Is Google the next Microsoft? Competition, Welfare and Regulation in Internet Search [PDF]

open access: yes, 2008
Internet search (or perhaps more accurately `web-search') has grown exponentially over the last decade at an even more rapid rate than the Internet itself. Starting from nothing in the 1990s, today search is a multi-billion dollar business. Search engine
Pollock, Rufus
core   +3 more sources

Assisting Movement Training and Execution With Visual and Haptic Feedback

open access: yesFrontiers in Neurorobotics, 2018
In the practice of motor skills in general, errors in the execution of movements may go unnoticed when a human instructor is not available. In this case, a computer system or robotic device able to detect movement errors and propose corrections would be ...
Marco Ewerton   +8 more
doaj   +1 more source

State youth policy: search for an integrative model formation

open access: yesНаука. Культура. Общество, 2023
A period has come in Russia when institutional transformations in matters of state youth policy (GMP) are objectively necessary. They presuppose the formation and development of a coherent system of youth affairs bodies, ensuring coordination of efforts ...
Andrey V. Kochetkov
doaj   +1 more source

A Markov chain Monte Carlo algorithm for Bayesian policy search

open access: yesSystems Science & Control Engineering, 2018
Policy search algorithms have facilitated application of Reinforcement Learning (RL) to dynamic systems, such as control of robots. Many policy search algorithms are based on the policy gradient, and thus may suffer from slow convergence or local optima ...
Vahid Tavakol Aghaei   +2 more
doaj   +1 more source

Fine Grained and Efficient Searchable Encryption Scheme Based on Attribute Policy Hiding inCloud Environment [PDF]

open access: yesJisuanji kexue, 2023
Attribute based encryption provides flexible and fine-grained access control for outsourced data stored in the cloud.The traditional attribute based ciphertext policy encryption scheme(CP-ABE),whose access policy often appears in the form of plaintext,is
ZHOU Yihua, LI Meiqi, HU Xinyu, YANG Yuguang
doaj   +1 more source

Consumer Search and Public Policy

open access: yesJournal of Consumer Research, 1981
Consumers acquire information from a variety of internal and external sources. Sources differ in their abilities to convey different kinds of information. This paper examines the implications of these sources for designing government information programs.
Beales, J. Howard.   +3 more
openaire   +2 more sources

Cities in search of Policy

open access: yesMétropoles, 2013
Studies of urban public policy in Italy heretofore have highlighted the absence of attention to urban questions in the national political agenda until 1990, and afterwards the fragmentation of public initiatives, due to the lack of effective tools for ...
Massimo Allulli, Walter Tortorella
doaj   +1 more source

Attribute-based proxy re-encryption with keyword search. [PDF]

open access: yesPLoS ONE, 2014
Keyword search on encrypted data allows one to issue the search token and conduct search operations on encrypted data while still preserving keyword privacy.
Yanfeng Shi   +5 more
doaj   +1 more source

Common contributing factors to COVID-19 and inflammatory bowel disease

open access: yesToxicology Reports, 2021
The devastating complications of coronavirus disease 2019 (COVID-19) result from an individual’s dysfunctional immune response following the initial severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) infection.
Ronald Neil Kostoff   +6 more
doaj   +1 more source

Assessing Economic Policy Uncertainty Using Search Queries [PDF]

open access: yesФинансовый журнал
This study analyzes international experience in measuring fiscal policy uncertainty and provides quantitative estimates of government spending uncertainty and tax policy uncertainty for Russia from April 2011 to June 2024.
Diana A. Petrova
doaj   +1 more source

Home - About - Disclaimer - Privacy