883 resultados para information as a property good
Resumo:
Several countries have made large investments in building historical Geographical Information Systems (GIS) databases containing census and other quantitative statistics over long periods of time. Making good use of these databases requires approaches that explore spatial and temporal change.
Resumo:
We propose a recursive method of pricing an information good in a network of holders and demanders of this good. The prices are determined via a unique equilibrium outcome in a sequence of bilateral bargaining games that are played by connected agents. If the information is an homogenous, non-depreciating good without network effects we derive explicit formulae which elucidate the role of the link pattern among the players. Particularly, we find out that the equilibrium price is intimately related to the existence of cycles in the network: It is zero if a cycle covers the trading pair and it is proportional to the direct and indirect utility that the good generates otherwise.
Resumo:
This text presents an analysis of aggregated membership’s dynamics for Spanish trade unions, using ECVT data, as well as union memberships’ trajectories, or members’ decisions about joining the organization, permanency and responsibilities, and subsequent attrition. For the analysis of trajectories we make use of information of the records of actual memberships and the record of quitting of CCOO, and of a survey-questionnaire to a sample of leavers of the same union. This study allows us to confirm a linkage between the decision and motivations to become union member, to participate in union activities, the time of permanency, and the motives to quit the organization. We also identify five types of union members’ trajectories, indicating that, far from views that assert a monolithic structure, unions are complex organizations.
Resumo:
This paper studies the influence of cynic philosophy in the construction of the myth of the good savage. In the first part it studies the importance of cynicism in the XVI century and how the cynic influence of Erasmus, More and Montaigne was fundamental to the way that Europe approached the American indigenous. In the second part it studies the cynic motives that could have influenced in the construction of the myth of the good savage.
Resumo:
No continent has as high a proportion of older people as Europe. In this paper, we report the findings of an empirical project examining the legal advice needs of older people. An important element of the project also sought information about the capacity of the internet for meeting the legal advice needs of older people. Overall our findings broadly indicate considerable failings in legal information provision for older people from more traditional advice sources. Whilst we have uncovered some examples of individualised good practice, our research in the main revealed an alarming sense of fear, mistrust, uncertainty and ambivalence among older people towards accessing legal advice. The research was funded by the Changing Ageing Partnership (CAP). We believe our findings have broad implications and applicability across Europe.
Resumo:
This paper tries to achieve a balanced view of the ethical issues raised by emotion-oriented technology as it is, rather than as it might be imagined. A high proportion of applications seem ethically neutral. Uses in entertainment and allied areas do no great harm or good. Empowering professions may do either, but regulatory systems already exist. Ethically positive aspirations involve mitigating problems that already exist by supporting humans in emotion-related judgments, by replacing technology that treats people in dehumanized and/or demeaning ways, and by improving access for groups who struggle with existing interfaces. Emotion-oriented computing may also contribute to revaluing human faculties other than pure intellect. Many potential negatives apply to technology as a whole. Concerns specifically related to emotion involve creating a lie, by simulate emotions that the systems do not have, or promoting mechanistic conceptions of emotion. Intermediate issues arise where more general problems could be exacerbated-helping systems to sway human choices or encouraging humans to choose virtual worlds rather than reality. "SIIF" systems (semi-intelligent information filters) are particularly problematic. These use simplified rules to make judgments about people that are complex, and have potentially serious consequences. The picture is one of balances to recognize and negotiate, not uniform good or evil. © 2010-2012 IEEE.
Resumo:
A general approach to information correction and fusion for belief functions is proposed, where not only may the information items be irrelevant, but sources may lie as well. We introduce a new correction scheme, which takes into account uncertain metaknowledge on the source’s relevance and truthfulness and that generalizes Shafer’s discounting operation. We then show how to reinterpret all connectives of Boolean logic in terms of source behavior assumptions with respect to relevance and truthfulness. We are led to generalize the unnormalized Dempster’s rule to all Boolean connectives, while taking into account the uncertainties pertaining to assumptions concerning the behavior of sources. Eventually, we further extend this approach to an even more general setting, where source behavior assumptions do not have to be restricted to relevance and truthfulness.We also establish the commutativity property between correction and fusion processes, when the behaviors of the sources are independent.
Resumo:
The cerebral cortex contains circuitry for continuously computing properties of the environment and one's body, as well as relations among those properties. The success of complex perceptuomotor performances requires integrated, simultaneous use of such relational information. Ball catching is a good example as it involves reaching and grasping of visually pursued objects that move relative to the catcher. Although integrated neural control of catching has received sparse attention in the neuroscience literature, behavioral observations have led to the identification of control principles that may be embodied in the involved neural circuits. Here, we report a catching experiment that refines those principles via a novel manipulation. Visual field motion was used to perturb velocity information about balls traveling on various trajectories relative to a seated catcher, with various initial hand positions. The experiment produced evidence for a continuous, prospective catching strategy, in which hand movements are planned based on gaze-centered ball velocity and ball position information. Such a strategy was implemented in a new neural model, which suggests how position, velocity, and temporal information streams combine to shape catching movements. The model accurately reproduces the main and interaction effects found in the behavioral experiment and provides an interpretation of recently observed target motion-related activity in the motor cortex during interceptive reaching by monkeys. It functionally interprets a broad range of neurobiological and behavioral data, and thus contributes to a unified theory of the neural control of reaching to stationary and moving targets.
Resumo:
The eye and the brain are prototypical tissues manifesting immune privilege (IP) in which immune responses to foreign antigens, particularly alloantigens are suppressed, and even completely inhibited. Explanations for this phenomenon are numerous and mostly reflect our evolving understanding of the molecular and cellular processes underpinning immunological responses generally. IP is now viewed as a property of many tissues and the level of expression of IP varies not only with the tissue but with the nature of the foreign antigen and changes in the limited conditions under which privilege can operate as a mechanism of immunological tolerance. As a result, IP functions normally as a homeostatic mechanism preserving normal function in tissues, particularly those with highly specialized function and limited capacity for renewal such as the eye and brain. However, IP is relatively easily bypassed in the face of a sufficiently strong immunological response, and the privileged tissues may be at greater risk of collateral damage because its natural defenses are more easily breached than in a fully immunocompetent tissue which rapidly rejects foreign antigen and restores integrity. This two-edged sword cuts its swathe through the eye: under most circumstances, IP mechanisms such as blood-ocular barriers, intraocular immune modulators, induction of T regulatory cells, lack of lymphatics, and other properties maintain tissue integrity; however, when these are breached, various degrees of tissue damage occur from severe tissue destruction in retinal viral infections and other forms of uveoretinal inflammation, to less severe inflammatory responses in conditions such as macular degeneration. Conversely, ocular IP and tumor-related IP can combine to permit extensive tumor growth and increased risk of metastasis thus threatening the survival of the host.
Resumo:
Context: Despite the fact that most deaths occur in hospital, problems remain with how patients and families experience care at the end of life when a death occurs in a hospital. Objectives: (1) assess family member satisfaction with information sharing and communication, and (2) examine how satisfaction with information sharing and communication is associated with patient factors. Methods: Using a cross-sectional survey, data were collected from family members of adult patients who died in an acute care organization. Correlation and factor analysis were conducted, and internal consistency assessed using Cronbach's alpha. Linear regression was performed to determine the relationship among patient variables and satisfaction on the Information Sharing and Communication (ISC) scale. Results: There were 529 questionnaires available for analysis. Following correlation analysis and the dropping of redundant and conceptually irrelevant items, seven items remained for factor analysis. One factor was identified, described as information sharing and communication, that explained 76.3% of the variance. The questionnaire demonstrated good content and reliability (Cronbach's alpha 0.96). Overall, family members were satisfied with information sharing and communication (mean total satisfaction score 3.9, SD 1.1). The ISC total score was significantly associated with patient gender, the number of days in hospital before death, and the hospital program where the patient died. Conclusions: The ISC scale demonstrated good content validity and reliability. The ISC scale offers acute care organizations a means to assess the quality of information sharing and communication that transpires in care at the end of life. © Copyright 2013, Mary Ann Liebert, Inc.
Resumo:
Despite its benefits, co-ownership of land creates problems where relations between the parties
have soured, or one person simply wants to extricate themselves from this arrangement. The
remedies of compulsory partition and sale allow one joint tenant or tenant in common to terminate
co-ownership against the wishes of the others, by seeking a court order to this effect. Throughout
parts of the common law world, this has be en based on nineteenth century English legislation namely
the Partition Act 1868, the key elements of which remain in force in Western Australia,
South Australia, Tasmania and the Australian Capital Territory. This article provides an up-to-date
analysis of the law on compulsory partition and sale as derived from the 1868 Act and analogous
provisions, drawing not only on Australian cases, but on frequently overlooked decisions from
courts in both parts of Ireland and in parts of Canada, as well as ‘old’ English judgments on the
1868 Act.
Resumo:
The study of interrelationships between soil structure and its functional properties is complicated by the fact that the quantitative description of soil structure is challenging. Soil scientists have tackled this challenge by taking advantage of approaches such as fractal geometry, which describes soil architectural complexity through a scaling exponent (D) relating mass and numbers of particles/aggregates to particle/aggregate size. Typically, soil biologists use empirical indices such as mean weight diameters (MWD) and percent of water stable aggregates (WSA), or the entire size distribution, and they have successfully related these indices to key soil features such as C and N dynamics and biological promoters of soil structure. Here, we focused on D, WSA and MWD and we tested whether: D estimated by the exponent of the power law of number-size distributions is a good and consistent correlate of MWD and WSA; D carries information that differs from MWD and WSA; the fraction of variation in D that is uncorrelated with MWD and WSA is related to soil chemical and biological properties that are thought to establish interdependence with soil structure (e.g., organic C, N, arbuscular mycorrhizal fungi). We analysed observational data from a broad scale field study and results from a greenhouse experiment where arbuscular mycorrhizal fungi (AMF) and collembola altered soil structure. We were able to develop empirical models that account for a highly significant and large portion of the correlation observed between WSA and MWD but we did not uncover the mechanisms that underlie this correlation. We conclude that most of the covariance between D and soil biotic (AMF, plant roots) and abiotic (C. N) properties can be accounted for by WSA and MWD. This result implies that the ecological effects of the fragmentation properties described by D and generally discussed under the framework of fractal models can be interpreted under the intuitive perspective of simpler indices and we suggest that the biotic components mostly impacted the largest size fractions, which dominate MWD, WSA and the scaling exponent ruling number-size distributions. (C) 2010 Elsevier Ltd. All rights reserved.
Resumo:
We address the problem of designing distributed algorithms for large scale networks that are robust to Byzantine faults. We consider a message passing, full information model: the adversary is malicious, controls a constant fraction of processors, and can view all messages in a round before sending out its own messages for that round. Furthermore, each bad processor may send an unlimited number of messages. The only constraint on the adversary is that it must choose its corrupt processors at the start, without knowledge of the processors’ private random bits.
A good quorum is a set of O(logn) processors, which contains a majority of good processors. In this paper, we give a synchronous algorithm which uses polylogarithmic time and Õ(vn) bits of communication per processor to bring all processors to agreement on a collection of n good quorums, solving Byzantine agreement as well. The collection is balanced in that no processor is in more than O(logn) quorums. This yields the first solution to Byzantine agreement which is both scalable and load-balanced in the full information model.
The technique which involves going from situation where slightly more than 1/2 fraction of processors are good and and agree on a short string with a constant fraction of random bits to a situation where all good processors agree on n good quorums can be done in a fully asynchronous model as well, providing an approach for extending the Byzantine agreement result to this model.
Resumo:
Molecular information gathering and processing – a young field of applied chemistry - is undergoing good growth. The progress is occurring both in terms of conceptual development and in terms of the strengthening of older concepts with new examples. This review critically surveys these two broad avenues. We consider some cases where molecules emulate one of the building blocks of electronic logic gates. We then examine molecular emulation of various Boolean logic gates carrying one, two or three inputs. Some single-input gates are popular information gathering devices. Special systems, such as ‘lab-on-a-molecule’ and molecular keypad locks, also receive attention. A situation deviating from the Boolean blueprint is also discussed. Some pointers are offered for maintaining the upward curve of the field.
Resumo:
Much interest now focuses on the use of the contingent valuation method (CVM) to assess non-use value of environmental goods. The paper reviews recent literature and highlights particular problems of information provision and respondent knowledge, comprehension and cognition. These must be dealt with by economists in designing CVM surveys for eliciting non-use values. Cognitive questionnaire design methods are presented which invoke concepts from psychology and tools from cognitive survey design (focus groups and verbal reports) to reduce a complex environmnetal good into a meaningful commodity that can be valued by respondents in a contingent market. This process is illustrated with examples from the authors' own research valuing alternative afforestation programmes. -Authors