Results 161 to 170 of about 26,946 (315)
Abstract Inspired by the work of Carmen Diana Deere, this paper examines how an analysis of the work of rural production, even when gendered, is compromised if it does not incorporate reproductive labour. The paper presents estimates of the gender yield gap in agricultural crop productivity in Tanzania, along with the statistical causes of the gender ...
A. Haroon Akram‐Lodhi
wiley +1 more source
Multi-replica provable data possession scheme supporting data dynamic updating
Considering the application demand of multiple replicas data security and data dynamic update,a multi-replica provable data possession scheme was proposed to supporting data dynamic updating.The original data file can be dynamically updated using dynamic
Long CHEN, Yu-zhu LUO
doaj
Things at Work: How Things Contribute to Performing Work
Abstract A crucial question for organizations is what constitutes work performance. While the importance of human competence and motivation to work performance has been established, less well understood is how ‘things’ – such as algorithms, tools, instruments, and raw materials – contribute to work performance.
Jörgen Sandberg +2 more
wiley +1 more source
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing. [PDF]
Zhao M, Chen H.
europepmc +1 more source
Certificateless Proxy Signature Scheme with Provable Security [PDF]
Hu Chen, Futai Zhang, Song Ru-shun
openalex +1 more source
Abstract Our study challenges a commonly held assumption in the legitimacy and organizational change literatures: that the legitimacy of a change project is closely tied to, and dependent upon, the legitimacy of the change agent promoting it. Drawing on an in‐depth, three‐and‐a‐half‐year qualitative study of a major transformation within a French ...
Alaric Bourgoin +2 more
wiley +1 more source
ABSTRACT This study examines how Taiwanese members of parliament (MPs) deploy self‐referring expressions—specifically, the formal first‐person singular běnxí—to negotiate their institutional standing and project political power. By operationalizing access to objective power using the margin of victory (MoV) as one possible proxy, the research shows ...
Tsung‐Lun Alan Wan
wiley +1 more source
A privacy preserving and auditable blockchain framework for seccure securites trading. [PDF]
Zhou E.
europepmc +1 more source
Abstract Understanding the role of information communication technologies (ICTs) in development, especially in relation to marginalized populations, has been the focus of many related disciplinary categories within the broader ecosystem of information sciences.
Chidi Oguamanam
wiley +1 more source

