Results 231 to 240 of about 33,844 (282)
Swedish farmers' approval of nudges
Abstract Interest in the use of behavioral policy approaches, such as nudges, has strongly increased over the past years, including in the domains of food, agricultural and environmental policies. While the approval of nudges among the general public has been studied extensively, we know little about the attitude of farmers toward nudging. Farmers may (
Liesbeth Colen +2 more
wiley +1 more source
Price Premiums for Single‐Name and Compound‐Name Geographical Indications in Swiss Cheese Trade
ABSTRACT Geographical indications (GIs) have become increasingly important in agri‐food markets, especially in Europe. For Swiss cheese imports and exports, we analyze whether GIs are associated with higher trade prices. We find that price premiums can be obtained for both exports and imports. However, this is only the case for cheeses with single name
Judith Irek
wiley +1 more source
ABSTRACT Contract farming is a viable strategy agribusinesses rely on to strengthen coordination across actors in the value chain. However, low contract compliance remains a significant setback to agribusinesses' contract performance in low‐ and middle‐income country context.
Umar Shehu Umar +2 more
wiley +1 more source
Traceability of Agri‐Food Products: The Key to Conscious Trade
ABSTRACT Globalization and growing concerns about sustainability have led to improvements in product traceability, quality, and sustainability. Traceability contributes to environmental protection and supports sustainable development by fostering transparency in agricultural practices and encouraging the responsible use of resources.
Scarlett Queen Almeida Bispo +5 more
wiley +1 more source
[T2.3] This deliverable will report the designed privacy-preserving methods for application of GDPR-compliant ML.
openaire +1 more source
ABSTRACT Market‐based solutions are increasingly tested to address aflatoxin issues in peanuts in developing countries. Although previous studies have found that Haitian grocery store shoppers are willing to pay a 21% premium for peanut butter with levels of aflatoxin that meet international standards, no information is available for the much larger ...
Phendy Jacques +2 more
wiley +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
SSRN Electronic Journal, 2023
A signal is privacy‐preserving with respect to a collection of privacy sets if the posterior probability assigned to every privacy set remains unchanged conditional on any signal realization. We characterize the privacy‐preserving signals for arbitrary state space and arbitrary privacy sets.
Strack, Philipp, Yang, Kai Hao
openaire +2 more sources
A signal is privacy‐preserving with respect to a collection of privacy sets if the posterior probability assigned to every privacy set remains unchanged conditional on any signal realization. We characterize the privacy‐preserving signals for arbitrary state space and arbitrary privacy sets.
Strack, Philipp, Yang, Kai Hao
openaire +2 more sources
Privacy-Preserving Database Fingerprinting
Proceedings 2023 Network and Distributed System Security Symposium, 2023When sharing relational databases with other parties, in addition to providing high quality (utility) database to the recipients, a database owner also aims to have (i) privacy guarantees for the data entries and (ii) liability guarantees (via fingerprinting) in case of unauthorized redistribution.
Tianxi, Ji +4 more
openaire +2 more sources
Data Mining and Knowledge Discovery, 2007
We describe two algorithms, BiBoost (Bipartite Boosting) and MultBoost (Multiparty Boosting), that allow two or more participants to construct a boosting classifier without explicitly sharing their data sets. We analyze both the computational and the security aspects of the algorithms.
Gambs, Sebastien +2 more
openaire +2 more sources
We describe two algorithms, BiBoost (Bipartite Boosting) and MultBoost (Multiparty Boosting), that allow two or more participants to construct a boosting classifier without explicitly sharing their data sets. We analyze both the computational and the security aspects of the algorithms.
Gambs, Sebastien +2 more
openaire +2 more sources

