901 resultados para Assignment of credit


Relevância:

80.00% 80.00%

Publicador:

Resumo:

Citizenship in the making for a new millenium – education and citizen formation in 21st century Sweden. The aim of this article is to analyse citizenship formation in Swedish education. In highlighting trends regarding the assignment of the educational system to provide for democratic citizenship there are certain depictions of citizenship prevail- ing. The first stresses an inward-looking and inward-feeling citizenship, characterizing the citizen as deliberative and emotional. The second stresses an inward-looking and outward-making citizenship, characterizing the citizen as entrepreneurial and willing. Here, democracy is portrayed as already achieved. This, we argue, is hazardous as society risk being pictured as apolitical and democratically ‘saturated’. This situation does not open up for democratic change to come into question as desirable or even possible. Put differently, it leaves us with the notion that things have to be as they are, as we are living in the best of worlds.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Les manifestations de crise, en Côte d'Ivoire, ont été extrêmement violentes. Au cours des quinze dernières années, plus de 400 personnes sont mortes, tuées dans des affrontements avec les forces de sécurités ou des contre-manifestants. Malgré la gravité du problème, peu d’études scientifiques y sont consacrées et les rares analyses et enquêtes existantes portent, de façon unilatérale, sur l’identité et la responsabilité pénale des auteurs et commanditaires putatifs de cette violence. La présente étude s’élève contre le moralisme inhérent à ces approches pour aborder la question sous l’angle de l’interaction : cette thèse a pour objectif de comprendre les processus et logiques qui sous-tendent l’usage de la violence au cours des manifestations. Le cadre théorique utilisé dans cette étude qualitative est l’interactionnisme symbolique. Le matériel d’analyse est composé d’entrevues et de divers documents. Trente-trois (33) entrevues semi-dirigées ont été réalisées avec des policiers et des manifestants, cooptés selon la technique de la boule de neige, entre le 3 janvier et le 15 mai 2013, à Abidjan. Les rapports d’enquête, de l’ONG Human Rights Watch, sur les manifestations de crise, les manuels de formation de la police et divers autres matériaux périphériques ont également été consultés. Les données ont été analysées suivant les principes et techniques de la théorisation ancrée (Paillée, 1994). Trois principaux résultats ont été obtenus. Premièrement, le système ivoirien de maintien de l'ordre est conçu selon le modèle d’une « police du prince ». Les forces de sécurité dans leur ensemble y occupent une fonction subalterne d’exécutant. Elles sont placées sous autorité politique avec pour mandat la défense inconditionnelle des institutions. Le style standard de gestion des foules, qui en découle, est légaliste et répressif, correspondant au style d’escalade de la force (McPhail, Schweingruber, & Carthy, 1998). Cette « police du prince » dispose toutefois de marges de manœuvre sur le terrain, qui lui permettent de moduler son style en fonction de la conception qu’elle se fait de l’attitude des manifestants : paternaliste avec les foules dites calmes, elle devient répressive ou déviante avec les foules qu’elle définit comme étant hostiles. Deuxièmement, à rebours d’une conception victimaire de la foule, la violence est une transaction situationnelle dynamique entre forces de sécurité et manifestants. La violence suit un processus ascendant dont les séquences et les règles d’enchainement sont décrites. Ainsi, le premier niveau auquel s’arrête la majorité des manifestations est celui d’une force non létale bilatérale dans lequel les deux acteurs, protestataires et policiers, ont recours à des armes non incapacitantes, où les cailloux des premiers répondent au gaz lacrymogène des seconds. Le deuxième niveau correspond à la létalité unilatérale : la police ouvre le feu lorsque les manifestants se rapprochent de trop près. Le troisième et dernier niveau est atteint lorsque les manifestants utilisent à leur tour des armes à feu, la létalité est alors bilatérale. Troisièmement, enfin, le concept de « l’indignité républicaine » rend compte de la logique de la violence dans les manifestations. La violence se déclenche et s’intensifie lorsqu’une des parties, manifestants ou policiers, interprète l’acte posé par l’adversaire comme étant en rupture avec le rôle attendu du statut qu’il revendique dans la manifestation. Cet acte jugé indigne a pour conséquence de le priver de la déférence rattachée à son statut et de justifier à son encontre l’usage de la force. Ces actes d’indignités, du point de vue des policiers, sont symbolisés par la figure du manifestant hostile. Pour les manifestants, l’indignité des forces de sécurité se reconnait par des actes qui les assimilent à une milice privée. Le degré d’indignité perçu de l’acte explique le niveau d’allocation de la violence.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We present Dithen, a novel computation-as-a-service (CaaS) cloud platform specifically tailored to the parallel ex-ecution of large-scale multimedia tasks. Dithen handles the upload/download of both multimedia data and executable items, the assignment of compute units to multimedia workloads, and the reactive control of the available compute units to minimize the cloud infrastructure cost under deadline-abiding execution. Dithen combines three key properties: (i) the reactive assignment of individual multimedia tasks to available computing units according to availability and predetermined time-to-completion constraints; (ii) optimal resource estimation based on Kalman-filter estimates; (iii) the use of additive increase multiplicative decrease (AIMD) algorithms (famous for being the resource management in the transport control protocol) for the control of the number of units servicing workloads. The deployment of Dithen over Amazon EC2 spot instances is shown to be capable of processing more than 80,000 video transcoding, face detection and image processing tasks (equivalent to the processing of more than 116 GB of compressed data) for less than $1 in billing cost from EC2. Moreover, the proposed AIMD-based control mechanism, in conjunction with the Kalman estimates, is shown to provide for more than 27% reduction in EC2 spot instance cost against methods based on reactive resource estimation. Finally, Dithen is shown to offer a 38% to 500% reduction of the billing cost against the current state-of-the-art in CaaS platforms on Amazon EC2 (Amazon Lambda and Amazon Autoscale). A baseline version of Dithen is currently available at dithen.com.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

This body of work discusses the gender meanings associated with cowboys while endorsing contemporary rodeos in Rio Grande do Norte as a recreational sport and a form of ludic expression. As a result, this research has focused on rodeo practices, aiming to understand the different aspects emphasizing masculinity: these associations being constructed through relationships, contexts and the competitiveness between participants. These gender meanings hinge on the desire for a wining performance and on the behaviour exhibited among cowboys outside the competitive ring in specific social settings such as parties and recreational time. The latter were the focus of the ethnographic research; direct observation and semistructured interviews with cowboys in rodeo stadiums were also used. Through qualitative analysis of the collected data, it was revealed that historically and socially different trajectories do not immediately cause a gender crisis in cowboys, but the assignment of new significance by the social acts in each historical context. However, the presence of cowboys leads to other models of masculinity configured by expressions and the insertion of new personas, not coming directly from field activities, but imbued by the symbolic elements of the cowboy persona, constructed throughout history

Relevância:

80.00% 80.00%

Publicador:

Resumo:

The purpose of this study is to understand, impact and evaluate the development of intercultural communicative competencies among European credit-seeking exchange students and other sojourners through purposeful intercultural pedagogy. This pedagogy encompasses intentional intercultural- educational approaches which aim to support and enhance sojourners’ intercultural learning throughout the study abroad cycle (pre-departure, in-country and reentry phases). To test and validate these pedagogies a 20-hour intervention was designed and implemented among two cohorts of 31 sojourners during the in-country phase of their sojourn in Portugal. The process to develop and validate the intercultural intervention was driven by a mixed-methods methodology which combined quantitative and qualitative data to triangulate, complement and expand research results from a pragmatic stance. The mixed methods research design adopted is multi-phased and encompasses a multi-case study and an evaluative component. The multi-case component is embodied by sojourner cohorts: (1) the primary case study involves 19 incoming students at the University of Aveiro (Portugal) as participants in the European exchange program Campus Europae; (2) the second case study comprises three incoming Erasmus students and nine highly skilled immigrants at the same university. All 31 sojourners attended two intermediate Portuguese as Foreign Language classrooms where the intervention was employed. Data collection was extensive and involved collecting, analyzing and mixing quantitative and qualitative strands across four research phases. These phases refer to the: (1) development, (2) implementation and (3) evaluation of the intervention, as well as to (4) a stakeholder analysis of the external value of the intervention and of the Campus Europae program. Data collection instruments included pre and posttest questionnaires and semi-structured interviews. Results confirm the intercultural effectiveness of the intervention and the positive impact upon research participants’ intercultural gains. This impact was, however, greater in case study 2. Among explanatory variables, three stand out: (1) participant meaning-making abilities, (2) host language proficiency and related variables, and (3) type of sojourn or exchange programs. Implications for further research highlight the need to systematize purposeful intercultural pedagogy in sojourner populations in general, and in European credit student mobility in particular. In the latter case, these pedagogies should be part of the design and delivery of credit-bearing exchange programs in pre- departure, in-country and re-entry phases. Implications for practice point to the urge to improve intercultural practices in: macro (higher education institutions), mezzo (exchange programs) and micro (sojourner language classrooms) contexts where this research took place, and wider social scenarios they represent.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Dissertação de Mestrado em Auditoria

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Con los comportamientos del mercado financiero, las comisionistas de bolsa deben tener un modelo de valoración ajustado a la evolución del riesgo crediticio para las inversiones en títulos valores no tradicionales y de esta manera cumplir con los requerimientos emitidos por la Superintendencia Financiera de Colombia. En particular, se diseña el modelo sugerido por el regulador para la comisionista Global Securities de la ciudad de Medellín, para la cartera colectiva Credit Opportunities Fund - Compartimiento Facturas. El estudio de tipo descriptivo, analiza y diseña a partir del método CreditMetrics desarrollado por J.P Morgan, una valoración completa de la cartera teniendo en cuenta las pérdidas y ganancias por modificaciones de calidad crediticia.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

We propose three research problems to explore the relations between trust and security in the setting of distributed computation. In the first problem, we study trust-based adversary detection in distributed consensus computation. The adversaries we consider behave arbitrarily disobeying the consensus protocol. We propose a trust-based consensus algorithm with local and global trust evaluations. The algorithm can be abstracted using a two-layer structure with the top layer running a trust-based consensus algorithm and the bottom layer as a subroutine executing a global trust update scheme. We utilize a set of pre-trusted nodes, headers, to propagate local trust opinions throughout the network. This two-layer framework is flexible in that it can be easily extensible to contain more complicated decision rules, and global trust schemes. The first problem assumes that normal nodes are homogeneous, i.e. it is guaranteed that a normal node always behaves as it is programmed. In the second and third problems however, we assume that nodes are heterogeneous, i.e, given a task, the probability that a node generates a correct answer varies from node to node. The adversaries considered in these two problems are workers from the open crowd who are either investing little efforts in the tasks assigned to them or intentionally give wrong answers to questions. In the second part of the thesis, we consider a typical crowdsourcing task that aggregates input from multiple workers as a problem in information fusion. To cope with the issue of noisy and sometimes malicious input from workers, trust is used to model workers' expertise. In a multi-domain knowledge learning task, however, using scalar-valued trust to model a worker's performance is not sufficient to reflect the worker's trustworthiness in each of the domains. To address this issue, we propose a probabilistic model to jointly infer multi-dimensional trust of workers, multi-domain properties of questions, and true labels of questions. Our model is very flexible and extensible to incorporate metadata associated with questions. To show that, we further propose two extended models, one of which handles input tasks with real-valued features and the other handles tasks with text features by incorporating topic models. Our models can effectively recover trust vectors of workers, which can be very useful in task assignment adaptive to workers' trust in the future. These results can be applied for fusion of information from multiple data sources like sensors, human input, machine learning results, or a hybrid of them. In the second subproblem, we address crowdsourcing with adversaries under logical constraints. We observe that questions are often not independent in real life applications. Instead, there are logical relations between them. Similarly, workers that provide answers are not independent of each other either. Answers given by workers with similar attributes tend to be correlated. Therefore, we propose a novel unified graphical model consisting of two layers. The top layer encodes domain knowledge which allows users to express logical relations using first-order logic rules and the bottom layer encodes a traditional crowdsourcing graphical model. Our model can be seen as a generalized probabilistic soft logic framework that encodes both logical relations and probabilistic dependencies. To solve the collective inference problem efficiently, we have devised a scalable joint inference algorithm based on the alternating direction method of multipliers. The third part of the thesis considers the problem of optimal assignment under budget constraints when workers are unreliable and sometimes malicious. In a real crowdsourcing market, each answer obtained from a worker incurs cost. The cost is associated with both the level of trustworthiness of workers and the difficulty of tasks. Typically, access to expert-level (more trustworthy) workers is more expensive than to average crowd and completion of a challenging task is more costly than a click-away question. In this problem, we address the problem of optimal assignment of heterogeneous tasks to workers of varying trust levels with budget constraints. Specifically, we design a trust-aware task allocation algorithm that takes as inputs the estimated trust of workers and pre-set budget, and outputs the optimal assignment of tasks to workers. We derive the bound of total error probability that relates to budget, trustworthiness of crowds, and costs of obtaining labels from crowds naturally. Higher budget, more trustworthy crowds, and less costly jobs result in a lower theoretical bound. Our allocation scheme does not depend on the specific design of the trust evaluation component. Therefore, it can be combined with generic trust evaluation algorithms.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

El Código civil y la legislación especial intentan satisfacer la necesidad de vivienda. Además de la adquisición de la propiedad, existen figuras como el derecho de habitación (Derechos reales) o el arrendamiento urbano y sus modalidades de cesión y subarriendo, el préstamo gratuito (Derecho de contratos) o la atribución del uso de la vivienda familiar a uno de los progenitores y a los hijos (Derecho de Familia). Se examinan sus requisitos y efectos para aprovechar posibilidades y detectar abusos.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Mestrado em Contabilidade e Gestão de Instituições Financeiras

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Relatório de Estágio para obtenção do grau de Mestre em Engenharia Civil

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Mestrado em Contabilidade e Gestão das Instituições Financeiras

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Purpose – The purpose of this research is to show how the self-archiving of journal papers is a major step towards providing open access to research. However, copyright transfer agreements (CTAs) that are signed by an author prior to publication often indicate whether, and in what form, self-archiving is allowed. The SHERPA/RoMEO database enables easy access to publishers' policies in this area and uses a colour-coding scheme to classify publishers according to their self-archiving status. The database is currently being redeveloped and renamed the Copyright Knowledge Bank. However, it will still assign a colour to individual publishers indicating whether pre-prints can be self-archived (yellow), post-prints can be self-archived (blue), both pre-print and post-print can be archived (green) or neither (white). The nature of CTAs means that these decisions are rarely as straightforward as they may seem, and this paper describes the thinking and considerations that were used in assigning these colours in the light of the underlying principles and definitions of open access. Approach – Detailed analysis of a large number of CTAs led to the development of controlled vocabulary of terms which was carefully analysed to determine how these terms equate to the definition and “spirit” of open access. Findings – The paper reports on how conditions outlined by publishers in their CTAs, such as how or where a paper can be self-archived, affect the assignment of a self-archiving colour to the publisher. Value – The colour assignment is widely used by authors and repository administrators in determining whether academic papers can be self-archived. This paper provides a starting-point for further discussion and development of publisher classification in the open access environment.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Les manifestations de crise, en Côte d'Ivoire, ont été extrêmement violentes. Au cours des quinze dernières années, plus de 400 personnes sont mortes, tuées dans des affrontements avec les forces de sécurités ou des contre-manifestants. Malgré la gravité du problème, peu d’études scientifiques y sont consacrées et les rares analyses et enquêtes existantes portent, de façon unilatérale, sur l’identité et la responsabilité pénale des auteurs et commanditaires putatifs de cette violence. La présente étude s’élève contre le moralisme inhérent à ces approches pour aborder la question sous l’angle de l’interaction : cette thèse a pour objectif de comprendre les processus et logiques qui sous-tendent l’usage de la violence au cours des manifestations. Le cadre théorique utilisé dans cette étude qualitative est l’interactionnisme symbolique. Le matériel d’analyse est composé d’entrevues et de divers documents. Trente-trois (33) entrevues semi-dirigées ont été réalisées avec des policiers et des manifestants, cooptés selon la technique de la boule de neige, entre le 3 janvier et le 15 mai 2013, à Abidjan. Les rapports d’enquête, de l’ONG Human Rights Watch, sur les manifestations de crise, les manuels de formation de la police et divers autres matériaux périphériques ont également été consultés. Les données ont été analysées suivant les principes et techniques de la théorisation ancrée (Paillée, 1994). Trois principaux résultats ont été obtenus. Premièrement, le système ivoirien de maintien de l'ordre est conçu selon le modèle d’une « police du prince ». Les forces de sécurité dans leur ensemble y occupent une fonction subalterne d’exécutant. Elles sont placées sous autorité politique avec pour mandat la défense inconditionnelle des institutions. Le style standard de gestion des foules, qui en découle, est légaliste et répressif, correspondant au style d’escalade de la force (McPhail, Schweingruber, & Carthy, 1998). Cette « police du prince » dispose toutefois de marges de manœuvre sur le terrain, qui lui permettent de moduler son style en fonction de la conception qu’elle se fait de l’attitude des manifestants : paternaliste avec les foules dites calmes, elle devient répressive ou déviante avec les foules qu’elle définit comme étant hostiles. Deuxièmement, à rebours d’une conception victimaire de la foule, la violence est une transaction situationnelle dynamique entre forces de sécurité et manifestants. La violence suit un processus ascendant dont les séquences et les règles d’enchainement sont décrites. Ainsi, le premier niveau auquel s’arrête la majorité des manifestations est celui d’une force non létale bilatérale dans lequel les deux acteurs, protestataires et policiers, ont recours à des armes non incapacitantes, où les cailloux des premiers répondent au gaz lacrymogène des seconds. Le deuxième niveau correspond à la létalité unilatérale : la police ouvre le feu lorsque les manifestants se rapprochent de trop près. Le troisième et dernier niveau est atteint lorsque les manifestants utilisent à leur tour des armes à feu, la létalité est alors bilatérale. Troisièmement, enfin, le concept de « l’indignité républicaine » rend compte de la logique de la violence dans les manifestations. La violence se déclenche et s’intensifie lorsqu’une des parties, manifestants ou policiers, interprète l’acte posé par l’adversaire comme étant en rupture avec le rôle attendu du statut qu’il revendique dans la manifestation. Cet acte jugé indigne a pour conséquence de le priver de la déférence rattachée à son statut et de justifier à son encontre l’usage de la force. Ces actes d’indignités, du point de vue des policiers, sont symbolisés par la figure du manifestant hostile. Pour les manifestants, l’indignité des forces de sécurité se reconnait par des actes qui les assimilent à une milice privée. Le degré d’indignité perçu de l’acte explique le niveau d’allocation de la violence.