880 resultados para group membership models
Resumo:
Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP)
Resumo:
The numerical renormalization-group method was originally developed to calculate the thermodynamical properties of impurity Hamiltonians. A recently proposed generalization capable of computing dynamical properties is discussed. As illustrative applications, essentially exact results for the impurity specttral densities of the spin-degenerate Anderson model and of a model for electronic tunneling between two centers in a metal are presented. © 1991.
Resumo:
Reproductive skew theory seeks to integrate social and ecological factors thought to influence the division of reproduction among group-living animals. However, most reproductive skew models only examine interactions between individuals of the same sex. Here, we suggest that females can influence group stability and conflict among males by modifying their clutch size and may do so if they benefit from the presence of subordinate male helpers or from reduced conflict. We develop 3 models, based on concessions-based, restraint, and tug-of-war models, in which female clutch size is variable and ask when females will increase their clutch size above that which would be optimal in the absence of male-male conflict. In concessions-based and restraint models, females should increase clutch size above their optima if the benefits of staying for subordinate males are relatively low. Relatedness between males has no effect on clutch size. When females do increase clutch size, the division of reproduction between males is not influenced by relatedness and does not differ between restraint and concessions-based models. Both of these predictions are in sharp contrast to previous models. In tug-of-war models, clutch size is strongly influenced by relatedness between males, with the largest clutches, but the fewest surviving offspring, produced when males are unrelated. These 3 models demonstrate the importance of considering third-party interests in the decisions of group-living organisms.
Resumo:
"November 1984."
Resumo:
Recentemente sono stati valutati come fisicamente consistenti diversi modelli non-hermitiani sia in meccanica quantistica che in teoria dei campi. La classe dei modelli pseudo-hermitiani, infatti, si adatta ad essere usata per la descrizione di sistemi fisici dal momento che, attraverso un opportuno operatore metrico, risulta possibile ristabilire una struttura hermitiana ed unitaria. I sistemi PT-simmetrici, poi, sono una categoria particolarmente studiata in letteratura. Gli esempi riportati sembrano suggerire che anche le cosiddette teorie conformi non-unitarie appartengano alla categoria dei modelli PT-simmetrici, e possano pertanto adattarsi alla descrizione di fenomeni fisici. In particolare, si tenta qui la costruzione di determinate lagrangiane Ginzburg-Landau per alcuni modelli minimali non-unitari, sulla base delle identificazioni esistenti per quanto riguarda i modelli minimali unitari. Infine, si suggerisce di estendere il dominio del noto teorema c alla classe delle teorie di campo PT-simmetriche, e si propongono alcune linee per una possibile dimostrazione dell'ipotizzato teorema c_{eff}.
Resumo:
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed under various models considering different adversarial actions. However, the analysis of group key exchange (GKE) protocols has not been as extensive as that of 2PKE protocols. Particularly, the security attribute of key compromise impersonation (KCI) resilience has so far been ignored for the case of GKE protocols. We first model the security of GKE protocols addressing KCI attacks by both outsider and insider adversaries. We then show that a few existing protocols are not secure even against outsider KCI attacks. The attacks on these protocols demonstrate the necessity of considering KCI resilience for GKE protocols. Finally, we give a new proof of security for an existing GKE protocol under the revised model assuming random oracles.
Resumo:
Modern Engineering Asset Management (EAM) requires the accurate assessment of current and the prediction of future asset health condition. Suitable mathematical models that are capable of predicting Time-to-Failure (TTF) and the probability of failure in future time are essential. In traditional reliability models, the lifetime of assets is estimated using failure time data. However, in most real-life situations and industry applications, the lifetime of assets is influenced by different risk factors, which are called covariates. The fundamental notion in reliability theory is the failure time of a system and its covariates. These covariates change stochastically and may influence and/or indicate the failure time. Research shows that many statistical models have been developed to estimate the hazard of assets or individuals with covariates. An extensive amount of literature on hazard models with covariates (also termed covariate models), including theory and practical applications, has emerged. This paper is a state-of-the-art review of the existing literature on these covariate models in both the reliability and biomedical fields. One of the major purposes of this expository paper is to synthesise these models from both industrial reliability and biomedical fields and then contextually group them into non-parametric and semi-parametric models. Comments on their merits and limitations are also presented. Another main purpose of this paper is to comprehensively review and summarise the current research on the development of the covariate models so as to facilitate the application of more covariate modelling techniques into prognostics and asset health management.
Resumo:
Advertising research has generally not gone beyond offering support for a positive effect where ethnic models in advertising are viewed by consumers of the same ethnicity. This study offers an explanation behind this phenomenon that can be useful to marketers using self-reference theory. Our experiment reveals a strong self-referencing effect for ethnic minority individuals. Specifically, Asian subjects (the ethnic minority group) self-referenced ads with Asian models more than white subjects (the ethnic majority group). However, this result was not evident for white subjects. Implications for academics and advertisers are discussed.
Resumo:
This document reports on the Innovations Working Group that met at the 10th International Conference “Models in Developing Mathematics Education” from the 11-17th September 2009 in Dresden, Saxony. It briefly describes the over arching and consistent themes that emerged from the numerous papers presented. The authors and titles of each of the papers presented will be listed in Table 2.
Resumo:
Online communities offer teachers a forum to discuss ideas, seek support, engage in professional discussions and network with a wider peer group. The popularity of online communities for teachers is self-evident by the quantity that has emerged in recent years and they present as opportunities to engage in continued pedagogical growth. The study presented in this paper has focused on the electronic discussions of three online communities for teachers, two Australian-based communities and one UK-based community. The aim was to analyse the content of the messages, via content analysis using the Practical Inquiry Model (Garrison, Anderson & Archer, 2001) in an attempt to determine if membership had an impact pedagogy. This study will present findings that support the conclusion that membership to online communities provides genuine opportunities for continued pedagogical growth for teachers. It will also show that they are being used as a problem solving resource, provide opportunities for professional discourse and professional support.
Resumo:
The thrust towards constructivist learning and critical thinking in the National Curricular Framework (2005) of India implies shifts in pedagogical practices. In this context, drawing on grounded theory, focus group interviews were conducted with 40 preservice teachers to ascertain the contextual situation and the likely outcomes of applying critical literacy across the curriculum. Central themes that emerged in the discussion were: being teacher centred/ learner centred, and conformity/autonomy in teaching and learning. The paper argues that within the present Indian context, while there is scope for changes to pedagogy and learning styles, yet these must be adequately contextualised.
Resumo:
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplify the design of GKE protocols by using generic building blocks. In this paper we investigate the possibility of founding GKE protocols based on a primitive called multi key encapsulation mechanism (mKEM) and describe advantages and limitations of this approach. In particular, we show how to design a one-round GKE protocol which satisfies the classical requirement of authenticated key exchange (AKE) security, yet without forward secrecy. As a result, we obtain the first one-round GKE protocol secure in the standard model. We also conduct our analysis using recent formal models that take into account both outsider and insider attacks as well as the notion of key compromise impersonation resilience (KCIR). In contrast to previous models we show how to model both outsider and insider KCIR within the definition of mutual authentication. Our analysis additionally implies that the insider security compiler by Katz and Shin from ACM CCS 2005 can be used to achieve more than what is shown in the original work, namely both outsider and insider KCIR.