Results 161 to 170 of about 7,840 (201)
Some of the next articles are maybe not open access.

OPPOSITION REPERTOIRES UNDER AUTHORITARIAN RULE: VIETNAM'S 2016 SELF-NOMINATION MOVEMENT

Journal of East Asian Studies, 2021
AbstractCivil society actors collectively organized online and offline to nominate themselves and oppose the Vietnamese Communist Party in the 2016 legislative election. The level of opposition coordination among these independent self-nominees exceeded and qualitatively differed from previous atomized attempts in the 2011 election.
openaire   +1 more source

Should Self-Nominations Be Allowed in Peer Nomination Forms?

Gifted Child Quarterly, 1996
The present study addressed the problem of self-nomination in peer nomination forms (PNF) used with children to designate classroom peers who have superior abilities or talents. Its goal was to assess the incidence and worth of that information. The sample consisted of 391 students from 17 classes, almost evenly divided by gender and grade (4 to 8 ...
Line Massé, Françoys Gagné
openaire   +1 more source

Self-nominating: a robust affordable routing for wireless sensor networks

2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484), 2003
In this paper we present a new routing approach, self-nominating, for wireless sensor networks. A time-based self-maintained mechanism is used to improve the routing efficiency in terms of both delay and power consumption. It guarantees one and only one of the most promising next-hop nodes to relay broadcasted data packets.
null Yuecheng Zhang, null Liang Cheng
openaire   +1 more source

IMI's Aspire program feeds its senior leader pipeline through self‐nominations

Global Business and Organizational Excellence, 2009
AbstractSelf‐nominations, combined with sophisticated assessment and selection tools, have produced a more diverse pool of highly qualified talent that IMI, a worldwide engineering company, is now grooming for its top 40 senior leadership roles. A three‐step nomination and selection process for the enterprise‐level Aspire program includes 360‐degree ...
Victoria Stage, Russell Houghton
openaire   +1 more source

A distributed clustering scheme with self nomination: proposal and application to critical monitoring

Wireless Networks, 2014
0 ...
CHITI, FRANCESCO   +5 more
openaire   +3 more sources

Sexology as a Profession in Portugal: Sociographical Composition and Self-nomination of Portuguese Sexologists

International Journal of Sexual Health, 2015
ABSTRACTObjectives: The objective of this study was to describe the socio-demographic characteristics, the initial profession and training in sexology, sex therapy and psychotherapeutic techniques of Portuguese sexologists. Methods: As part of an European survey on sexology as a profession (Euro-Sexo), a questionnaire was mailed to all Portuguese ...
Alarcão, Violeta   +3 more
openaire   +3 more sources

Self-nomination and autonomy: a reply to Ben Trott

Global Discourse, 2013
This is a reply to:Trott, Ben. 2013. “From the precariat to the multitude.” Global Discourse. 3 (3–4): 406–425. http://dx.doi.org/10.1080/23269995.2013.876714.
openaire   +1 more source

Self-nominated peer crowds, school achievement, and psychological adjustment in adolescents: Longitudinal analysis

Personality and Individual Differences, 2008
Abstract We assessed the extent to which identification with peer crowds in the first year of high school predicted scholastic achievement, teacher-rated adjustment, and self-reported emotional experience in the third year of high school. Unlike previous studies, we controlled for initial levels of our criterion variables.
Heaven, Patrick C   +2 more
openaire   +3 more sources

Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks

Peer-to-Peer Networking and Applications, 2015
Security is a critical constraint for the expansion of Peer-to-Peer (P2P) networks. The autonomy, dynamic and distribution natures benefit both valid and malicious users and also lead that P2P networks are extremely susceptible to malicious users. Exploiting a reputation-based trust model is a feasible solution in such an open environment to build ...
Qiyi Han   +4 more
openaire   +1 more source

Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks

2014 IEEE/CIC International Conference on Communications in China (ICCC), 2014
Security is one of the most critical constraints for the expansion of P2P networks. The autonomy, dynamic and distribution natures benefit both valid and malicious users. Exploiting a reputation-based trust model is a feasible solution in such an open environment to build trust relationship among peers.
Qiyi Han, Hong Wen, Ting Ma, Bin Wu
openaire   +1 more source

Home - About - Disclaimer - Privacy