98 resultados para Referees
Resumo:
A study analyzed the behaviors of eight youth ice hockey referees during 15 different games. The results support the potential educational role that referees can have during games.
Resumo:
Background: The publication of articles in peer-reviewed scientific journals is a fairly complex and stepwise process that involves responding to referees’ comments. Little guidance is available in the biomedical literature on how to deal with such comments. Objective: The objective of this article is to provide guidance to novice writers on dealing with peer review comments in a way that maximizes the chance of subsequent acceptance. Methods: This will be a literature review and review of the author’s experience as a writer and referee. Results: Where possible, the author should consider revising and resubmitting rather than sending an article elsewhere. A structured layout for responding to referees’ comments is suggested that includes the 3 golden rules: (1) respond completely; (2) respond politely; and (3) respond with evidence. Conclusion: Responding to referees’ comments requires the writer to overcome any feelings of personal attack, and to instead concentrate on addressing referees’ concerns in a courteous, objective, and evidencebased way. (J Am Acad Dermatol 2004;51:79-83.)
Resumo:
Drawing on the textual evidence of a number of referees’ reports, this article maps key differences between the humanities and social sciences approaches to the study of pornography, in order to facilitate better understanding and communication between the areas. 1. Social scientists avoid ‘vulgar’ language to describe sex. Humanities scholars need not do so. 2. Social scientists remain committed to the idea of ‘objectivity’ while humanities scholars reject the idea – although this may be a confusion in language, with the term in the social sciences used to mean something more like ‘falsifiability’. 3. Social science assumes that the primary effects of exposure to pornography must be negative. 4. More generally, social science resists paradigm changes, insisting that all new work agrees with research that has gone before. 5. Social science believes that casual sex and sadomasochism are negative; humanities research need not do so.
Resumo:
The expansion of economics to ‘non-market topics’ has received increased attention in recent years. The economics of sports (football) is such a sub-field. This paper reports empirical evidence of team and referee performances in the FIFA World Cup 2002. The results reveal that being a hosting nation has a significant impact on the probability of winning a game. Furthermore, the strength of a team measured with the FIFA World Ranking does not play the important role presumed, which indicates that the element of uncertainty is working. The findings also indicate that the influence of a referee on the game result should not be neglected. Finally, the previous World Cup experiences seem to have the strongest impact on referees' performances during the game.
Resumo:
In a digital world, users’ Personally Identifiable Information (PII) is normally managed with a system called an Identity Management System (IMS). There are many types of IMSs. There are situations when two or more IMSs need to communicate with each other (such as when a service provider needs to obtain some identity information about a user from a trusted identity provider). There could be interoperability issues when communicating parties use different types of IMS. To facilitate interoperability between different IMSs, an Identity Meta System (IMetS) is normally used. An IMetS can, at least theoretically, join various types of IMSs to make them interoperable and give users the illusion that they are interacting with just one IMS. However, due to the complexity of an IMS, attempting to join various types of IMSs is a technically challenging task, let alone assessing how well an IMetS manages to integrate these IMSs. The first contribution of this thesis is the development of a generic IMS model called the Layered Identity Infrastructure Model (LIIM). Using this model, we develop a set of properties that an ideal IMetS should provide. This idealized form is then used as a benchmark to evaluate existing IMetSs. Different types of IMS provide varying levels of privacy protection support. Unfortunately, as observed by Jøsang et al (2007), there is insufficient privacy protection in many of the existing IMSs. In this thesis, we study and extend a type of privacy enhancing technology known as an Anonymous Credential System (ACS). In particular, we extend the ACS which is built on the cryptographic primitives proposed by Camenisch, Lysyanskaya, and Shoup. We call this system the Camenisch, Lysyanskaya, Shoup - Anonymous Credential System (CLS-ACS). The goal of CLS-ACS is to let users be as anonymous as possible. Unfortunately, CLS-ACS has problems, including (1) the concentration of power to a single entity - known as the Anonymity Revocation Manager (ARM) - who, if malicious, can trivially reveal a user’s PII (resulting in an illegal revocation of the user’s anonymity), and (2) poor performance due to the resource-intensive cryptographic operations required. The second and third contributions of this thesis are the proposal of two protocols that reduce the trust dependencies on the ARM during users’ anonymity revocation. Both protocols distribute trust from the ARM to a set of n referees (n > 1), resulting in a significant reduction of the probability of an anonymity revocation being performed illegally. The first protocol, called the User Centric Anonymity Revocation Protocol (UCARP), allows a user’s anonymity to be revoked in a user-centric manner (that is, the user is aware that his/her anonymity is about to be revoked). The second protocol, called the Anonymity Revocation Protocol with Re-encryption (ARPR), allows a user’s anonymity to be revoked by a service provider in an accountable manner (that is, there is a clear mechanism to determine which entity who can eventually learn - and possibly misuse - the identity of the user). The fourth contribution of this thesis is the proposal of a protocol called the Private Information Escrow bound to Multiple Conditions Protocol (PIEMCP). This protocol is designed to address the performance issue of CLS-ACS by applying the CLS-ACS in a federated single sign-on (FSSO) environment. Our analysis shows that PIEMCP can both reduce the amount of expensive modular exponentiation operations required and lower the risk of illegal revocation of users’ anonymity. Finally, the protocols proposed in this thesis are complex and need to be formally evaluated to ensure that their required security properties are satisfied. In this thesis, we use Coloured Petri nets (CPNs) and its corresponding state space analysis techniques. All of the protocols proposed in this thesis have been formally modeled and verified using these formal techniques. Therefore, the fifth contribution of this thesis is a demonstration of the applicability of CPN and its corresponding analysis techniques in modeling and verifying privacy enhancing protocols. To our knowledge, this is the first time that CPN has been comprehensively applied to model and verify privacy enhancing protocols. From our experience, we also propose several CPN modeling approaches, including complex cryptographic primitives (such as zero-knowledge proof protocol) modeling, attack parameterization, and others. The proposed approaches can be applied to other security protocols, not just privacy enhancing protocols.
Resumo:
Evaluation, selection and finally decision making are all among important issues, which engineers face in long run of projects. Engineers implement mathematical and nonmathematical methods to make accurate and correct decisions, whenever needed. As extensive as these methods are, effects of any selected method on outputs achieved and decisions made are still suspicious. This is more controversial and challengeable, where evaluation is made among non-quantitative alternatives. In civil engineering and construction management problems, criteria include both quantitative and qualitative ones, such as aesthetic, construction duration, building and operation costs, and environmental considerations. As the result, decision making frequently takes place among non-quantitative alternatives. It should be noted that traditional comparison methods, including clear-cut and inflexible mathematics, have always been criticized. This paper demonstrates a brief review of traditional methods of evaluating alternatives. It also offers a new decision making method using, fuzzy calculations. The main focus of this research is some engineering issues, which have flexible nature and vague borders. Suggested method provides analyzability of evaluation for decision makers. It is also capable to overcome multi criteria and multi-referees problems. In order to ease calculations, a program named DeMA is introduced.
Resumo:
Undertaking a Cochrane systematic review can be an incredibly rewarding experience. It is however a challenging and time-consuming task. The Cochrane Handbook for Systematic Reviews of Interventions1 provides an essential resource to help reviewers navigate the often complex methodological issues of systematic review research. Additional guidelines have been developed for those undertaking reviews of public health topics,2 and Cochrane Centres throughout the world offer invaluable training opportunities. This emphasis on training and methodological rigour has helped Cochrane reviews become one of the most respected sources of synthesized research available. Even with the assistance available, however, many authors with good intentions register titles and prepare protocols but fail to publish the completed review. Data extracted from Cochrane’s Information Management System (Archie) in June 2010 showed that there were 1,301 titles registered more than two years ago that have not been published as a full review.3 Of these registered titles, 697 have had protocols published (25 are no longer active) while 604 have not even progressed to this stage (154 are no longer active). There are also 146 protocols that have been published for more than two years without being converted into completed reviews. These registered titles and protocols that have not yet progressed to a completed review represent a significant amount of time and energy invested by review authors, Cochrane editorial staff and, in some cases, external referees...
Resumo:
By using information collected from numerous American Economic Review publications from the last 100 years, Torgler and Piatti examine the top publishing institutions to determine their most renowned AER papers based on citation success. Areas of interest include how often an individual can publish in the AER, how equally successful citations are distributed and who the top AER publishing authors are. The book explores what the level of cooperation is among authors and what drives systems such as the alphabetical name ordering. Torgler and Piatti critically examine the individual characteristics of AER authors, editors, editorial board members and referees and even tackle more intricate details such as the frequency of female publications in the AER. The authors observe and analyse the relationship between academic age and publication performance to see if there is any pattern on these factors and citation success. The book then goes on to analyse data concerning awards, and whether awards can increase the probability of publishing in the AER at a later stage
Resumo:
Preface The 9th Australasian Conference on Information Security and Privacy (ACISP 2004) was held in Sydney, 13–15 July, 2004. The conference was sponsored by the Centre for Advanced Computing – Algorithms and Cryptography (ACAC), Information and Networked Security Systems Research (INSS), Macquarie University and the Australian Computer Society. The aims of the conference are to bring together researchers and practitioners working in areas of information security and privacy from universities, industry and government sectors. The conference program covered a range of aspects including cryptography, cryptanalysis, systems and network security. The program committee accepted 41 papers from 195 submissions. The reviewing process took six weeks and each paper was carefully evaluated by at least three members of the program committee. We appreciate the hard work of the members of the program committee and external referees who gave many hours of their valuable time. Of the accepted papers, there were nine from Korea, six from Australia, five each from Japan and the USA, three each from China and Singapore, two each from Canada and Switzerland, and one each from Belgium, France, Germany, Taiwan, The Netherlands and the UK. All the authors, whether or not their papers were accepted, made valued contributions to the conference. In addition to the contributed papers, Dr Arjen Lenstra gave an invited talk, entitled Likely and Unlikely Progress in Factoring. This year the program committee introduced the Best Student Paper Award. The winner of the prize for the Best Student Paper was Yan-Cheng Chang from Harvard University for his paper Single Database Private Information Retrieval with Logarithmic Communication. We would like to thank all the people involved in organizing this conference. In particular we would like to thank members of the organizing committee for their time and efforts, Andrina Brennan, Vijayakrishnan Pasupathinathan, Hartono Kurnio, Cecily Lenton, and members from ACAC and INSS.
Resumo:
Welcome to the latest collection of papers selected from the International Society for Applied Ethology's (ISAE's) annual congress. The ISAE is a multi-faceted scientific society that supports applied research on animals that are managed by humans. Every year, we aim to invite congress participants who have submitted papers, plenary talks, run workshops, or presented the memorial lecture on theoretical, review or discussion papers of topical interest to contribute to the Special Issue. These papers are peer-reviewed before being published here in Applied Animal Behaviour Science. This year, we have a variety of papers to bring to your attention. The David Wood-Gush Memorial lecture, the keynote address of the congress, was given by Shigeru Watanabe on animal cognition and welfare. His paper highlights how animal's sensory capabilities relate to their welfare. On the topic of human–animal bonds, Stine Christiansen and Björn Forkman explore how animal welfare is assessed in a veterinary context, and how those assessments might be improved by ethologists. Yoshie Kakuma and co-authors report on the discussions from a workshop on the welfare of working and companion dogs in five different countries. Based on their plenary lectures, Michael Cockram discusses the factors that affect farmed animals during road transport and how these might contribute in making decisions to restrict journey times, while Clive Phillips and co-author Danica Peck examine how personality influences the behaviour and interactions between zoo-housed tigers and their keepers. We hope you enjoy these papers. Our sincere thanks go to both the authors and referees, without whom these special issues would not be possible. A selection of papers from the 39th International Congress of the International Society for Applied Ethology (ISAE), Tokyo, Japan, August 2005.
Resumo:
Este trabajo ha recibido el “Primer Premio Delegación del Gobierno en Aragón a las buenas prácticas contra la delincuencia juvenil” (Convocatoria 2007).
Resumo:
[ES] El presente trabajo presenta una experiencia aplicada que pretende conocer las opiniones, de los agentes sociales que rodean a los jóvenes deportistas, para la promoción de valores. A través de la actividad del World Café, los agentes sociales implicados en el deporte escolar aportaron orientaciones enfocadas a mejorar la calidad educativa del deporte. Un grupo de 56 participantes [padres/madres (8), árbitros (8), profesores de educación física (8), entrenadores (8), deportistas de élite (8), deportistas escolares (8) y representantes institucionales (8)] debatieron, desde su perspectiva, cómo consideraban que podían ayudar en la promoción de valores en los contextos deportivos escolares en los que participan. Entre los resultados más relevantes destacan, la necesidad de concretar desde el propio centro escolar los valores que se pretenden promocionar a través del deporte; en segundo lugar, la importancia de llevar a cabo una coordinación entre los agentes directos que rodean a los jóvenes deportistas; y finalmente, llevar a cabo una formación dirigida a monitores y padres/madres, que les permita adquirir herramientas adecuadas para la promoción de valores.
Resumo:
[ES] En este estudio se describe el proceso seguido para la elaboración del auto-registro, diseñado específicamente para la medición de los estructos "deportividad”, “agresividad" y “violencia”. Este instrumento permite la recogida de información sobre actitudes y conductas relacionadas con la deportividad, la agresividad y la violencia de los diferentes agentes sociales que rodean a los jóvenes deportistas en categorías deportivas de formación (padres/espectadores, entrenadores y árbitros). Por otro lado, se detalla la estructura de este instrumento y las características psicométricas del mismo -validez y fiabilidad-.
Resumo:
The Cape Canaveral, Florida, marine ecosystem is unique. There are complex current and temperature regimes that form a faunal transition zone between Atlantic tropical and subtropical waters. This zone is rich faunistically and supports large commercial fISheries for fish, scallops, and shrimp. Canaveral is also unique because it has large numbers of sea turtles year-round, this turtle aggregation exhibiting patterned seasonal changes in numbers, size frequency, and sex ratio. Additionally, a significant portion of this turtle aggregation hibernates in the Canaveral ship channel, a phenomenon rare in marine turtle populations. The Cape Canaveral area has the largest year-round concentration of sea turtles in the United States. However, the ship channel is periodically dredged by the U.S. Army Corps of Engineers in order to keep Port Canaveral open to U.S. Navy vessels, and preliminary surveys showed that many sea turtles were incidentally killed during dredging operations. In order for the Corps of Engineers to fulfill its defense dredging responsibilities, and comply with the Endangered Species Act of 1973, an interagency Sea Turtle Task Force was formed to investigate methods of reducing turtle mortalities. This Task Force promptly implemented a sea turtle research plan to determine seasonal abundance, movement patterns, sex ratios, size frequencies, and other biological parameters necessary to help mitigate dredging conflicts in the channel. The Cape Canaveral Sea Turtle Workshop is a cooperative effort to comprehensively present research results of these important studies. I gratefully acknowledge the support of everyone involved in this Workshop, particularly the anonymous team of referees who painstakingly reviewed the manuscripts. The cover illustration was drawn by Jack C. Javech. (PDF file contains 86 pages.)
Resumo:
Some 25 to 30 yr ago, when we as students were beginning our respective careers and were developing for the first time our awareness of marine mammals in the waters separating western North America from eastern Asia, we had visions of eventually bridging the communication gap which existed between our two countries at that time. Each of us was anxious to obtain information on the distribution, biology, and ecological relations of "our" seals and walruses on "the other side," beyond our respective political boundari~s where we were not permitted to go to study them. We were concerned that the resource management practices on the other side of the Bering and Chukchi Seas, implemented in isolation, on a purely unilateral basis, might endanger the species which we had come to know and were striving to conserve. At once apparent to both of us was the need for free exchange of biological information between our two countries and, ultimately, joint management of our shared resources. In a small way, we and others made some initial efforts to generate that exchange by personal correspondence and through vocal interchange at the annual meetings of the North Pacific Fur Seal Commission. By the enabling Agreement on Cooperation in the Field of Environmental Protection, reached between our two countries in 1972, our earlier visions at last came true. Since that time, within the framework of the Marine Mammal Project under Area V of that Agreement, we and our colleagues have forged a strong bond of professional accord and respect, in an atmosphere of free intercommunication and mutual understanding. The strength and utility of this arrangement from the beginning of our joint research are reflected in the reports contained in this, the first compendium of our work. The need for a series of such a compendia became apparent to us in 1976, and its implementation was agreed on by the regular meeting of the Project in La Jolla, Calif., in January 1977. Obviously, the preparation and publication of this first volume has been excessively delayed, in part by continuing political distrust between our governments but mainly by increasing demands placed on the time of the contributors. In this period of growing environmental concern in both countries, we and our colleagues have been totally immersed in other tasks and have experienced great difficulty in drawing together the works presented here. Much of the support for doing so was provided by the State of Alaska, through funding for Organized Research at the University of Alaska-Fairbanks. For its ultimate completion in publishable form we wish to thank Helen Stockholm, Director of Publications, Institute of Marine Science, University of Alaska, and her staff, especially Ruth Hand, and the numerous referees narned herein who gave willingly oftheir time to review each ofthe manuscripts critically and to provide a high measure of professionalism to the final product. (PDF file contains 110 pages.)