971 resultados para online travel agency
Resumo:
Kohl, U. (2005). Ignorance is no Defence but is Inaccessibility? On the Accessibility of National Laws to Foreign Online Publishers. Information & Communities Technology Law, 14 (1), 25-41. RAE2008 Information & Communications Technology Law Volume 14, Issue 1, 2005 Special Issue: GATED COMMUNITIES
Resumo:
Erskine, Toni, Can Institutions Have Responsibilities? Collective Moral Agency and International Relations (New York: Palgrave Macmillan, 2004), pp.xii+241 RAE2008
Resumo:
Abed, S. Y., Ba-Fail, A. O., & Jasimuddin, S. (2001). An econometric analysis of international air travel demand in Saudi Arabia. Journal of Air Transport Management, 7(3), 143-148 RAE2008
Resumo:
ap Gwilym, Owain, et al., 'Does the Fed Model travel well?', Journal of Portfolio Management (2006) 33(1) pp.68-75 RAE2008
Resumo:
The text addresses the issue of information security as exemplified by clandestine collaboration and the influence exerted by the Internal Security Agency officers upon journalists. The texts analyzes the de lege lata regulations as well as the de lege ferenda ones. As for the former, the penal provisions of the Act, that is Articles 153b–153d (Chapter 10a) are applicable, whereas as for the latter, the applicable regulations are the 2013 Bill Articles numbered 197-199 (Chapter 10). In both the 2002 Act on the Internal Security Agency and Foreign Intelligence Agency as well as in the 2013 draft Bill of the Internal Security Agency, the legislator penalizes the employment by the officers of the information acquired while fulfilling or in connection with official duties for the purpose of affecting the operation of public authority bodies, entrepreneurs or broadcasters, editors-in-chief, journalists and persons conducting publishing activity. Also, the text analyzes regulations concerned with the penalization of clandestine collaboration engaged in by ABW officers with a broadcaster, editor-in-chief, a journalist and a person conducting publishing activity.
Resumo:
Dissertação apresentada à Universidade Fernando Pessoa como parte dos requisitos de obtenção do grau de Mestre em Ciências da Comunicação, ramo de Marketing e Publicidade
Resumo:
http://www.archive.org/details/equatorssnowype00crawuoft
Resumo:
Missiological calls for self-theologizing among faith communities present the field of practical theology with a challenge to develop methodological approaches that address the complexities of cross-cultural, practical theological research. Although a variety of approaches can be considered critical correlative practical theology, existing methods are often built on assumptions that limit their use in subaltern contexts. This study seeks to address these concerns by analyzing existing theological methodologies with sustained attention to a community of Deaf Zimbabwean women struggling to develop their own agency in relation to child rearing practices. This dilemma serves as an entry point to an examination of the limitations of existing methodologies and a constructive, interdisciplinary theological exploration. The use of theological modeling methodology employs my experience of learning to cook sadza, a staple dish of Zimbabwe, as a guide for analyzing and reorienting practical theological methodology. The study explores a variety of theological approaches from practical theology, mission oriented theologians, theology among Deaf communities, and African women’s theology in relationship to the challenges presented by subaltern communities such as Deaf Zimbabwean women. Analysis reveals that although there is much to commend in these existing methodologies, questions about who does the critical correlation, whose interests are guiding the study, and consideration for the cross-cultural and power dynamics between researchers and faith communities remain problematic for developing self-theologizing agency. Rather than frame a comprehensive methodology, this study proposes three attitudes and guideposts to reorient practical theological researchers who wish to engender self-theologizing agency in subaltern communities. The creativity of enacted theology, the humility of using checks and balances in research methods, and the grace of finding strategies to build bridges of commonality and community offer ways to reorient practical theological methodologies toward the development of self-theologizing agency among subaltern people. This study concludes with discussion of how these guideposts can not only benefit particular work with a community of Deaf Zimbabwean women, but also provide research and theological reflection in other subaltern contexts.
Resumo:
We present an online distributed algorithm, the Causation Logging Algorithm (CLA), in which Autonomous Systems (ASes) in the Internet individually report route oscillations/flaps they experience to a central Internet Routing Registry (IRR). The IRR aggregates these reports and may observe what we call causation chains where each node on the chain caused a route flap at the next node along the chain. A chain may also have a causation cycle. The type of an observed causation chain/cycle allows the IRR to infer the underlying policy routing configuration (i.e., the system of economic relationships and constraints on route/path preferences). Our algorithm is based on a formal policy routing model that captures the propagation dynamics of route flaps under arbitrary changes in topology or path preferences. We derive invariant properties of causation chains/cycles for ASes which conform to economic relationships based on the popular Gao-Rexford model. The Gao-Rexford model is known to be safe in the sense that the system always converges to a stable set of paths under static conditions. Our CLA algorithm recovers the type/property of an observed causation chain of an underlying system and determines whether it conforms to the safe economic Gao-Rexford model. Causes for nonconformity can be diagnosed by comparing the properties of the causation chains with those predicted from different variants of the Gao-Rexford model.
Resumo:
Nearest neighbor classifiers are simple to implement, yet they can model complex non-parametric distributions, and provide state-of-the-art recognition accuracy in OCR databases. At the same time, they may be too slow for practical character recognition, especially when they rely on similarity measures that require computationally expensive pairwise alignments between characters. This paper proposes an efficient method for computing an approximate similarity score between two characters based on their exact alignment to a small number of prototypes. The proposed method is applied to both online and offline character recognition, where similarity is based on widely used and computationally expensive alignment methods, i.e., Dynamic Time Warping and the Hungarian method respectively. In both cases significant recognition speedup is obtained at the expense of only a minor increase in recognition error.
Resumo:
CONFIGR (CONtour FIgure GRound) is a computational model based on principles of biological vision that completes sparse and noisy image figures. Within an integrated vision/recognition system, CONFIGR posits an initial recognition stage which identifies figure pixels from spatially local input information. The resulting, and typically incomplete, figure is fed back to the “early vision” stage for long-range completion via filling-in. The reconstructed image is then re-presented to the recognition system for global functions such as object recognition. In the CONFIGR algorithm, the smallest independent image unit is the visible pixel, whose size defines a computational spatial scale. Once pixel size is fixed, the entire algorithm is fully determined, with no additional parameter choices. Multi-scale simulations illustrate the vision/recognition system. Open-source CONFIGR code is available online, but all examples can be derived analytically, and the design principles applied at each step are transparent. The model balances filling-in as figure against complementary filling-in as ground, which blocks spurious figure completions. Lobe computations occur on a subpixel spatial scale. Originally designed to fill-in missing contours in an incomplete image such as a dashed line, the same CONFIGR system connects and segments sparse dots, and unifies occluded objects from pieces locally identified as figure in the initial recognition stage. The model self-scales its completion distances, filling-in across gaps of any length, where unimpeded, while limiting connections among dense image-figure pixel groups that already have intrinsic form. Long-range image completion promises to play an important role in adaptive processors that reconstruct images from highly compressed video and still camera images.
Resumo:
Memories in Adaptive Resonance Theory (ART) networks are based on matched patterns that focus attention on those portions of bottom-up inputs that match active top-down expectations. While this learning strategy has proved successful for both brain models and applications, computational examples show that attention to early critical features may later distort memory representations during online fast learning. For supervised learning, biased ARTMAP (bARTMAP) solves the problem of over-emphasis on early critical features by directing attention away from previously attended features after the system makes a predictive error. Small-scale, hand-computed analog and binary examples illustrate key model dynamics. Twodimensional simulation examples demonstrate the evolution of bARTMAP memories as they are learned online. Benchmark simulations show that featural biasing also improves performance on large-scale examples. One example, which predicts movie genres and is based, in part, on the Netflix Prize database, was developed for this project. Both first principles and consistent performance improvements on all simulation studies suggest that featural biasing should be incorporated by default in all ARTMAP systems. Benchmark datasets and bARTMAP code are available from the CNS Technology Lab Website: http://techlab.bu.edu/bART/.
Resumo:
'The ecological emergency’ describes both our emergence into, and the way we relate within, a set of globally urgent circumstances, brought about through anthropogenic impact. I identify two phases to this emergency. Firstly, there is the anthropogenic impact itself, interpreted through various conceptual models. Secondly, however, is the increasingly entrenched commitment to divergent conceptual positions, that leads to a growing disparateness in attitudes, and a concurrent difficulty with finding any grounds for convergence in response. I begin by reviewing the environmental ethics literature in order to clarify which components of the implicit narratives and beliefs of different positions create the foundations for such disparateness of views. I identify the conceptual frameworks through which moral agency and human responsibility are viewed, and that justify an ethical response to the ecological emergency. In particular, I focus on Paul Taylor's thesis of 'respect for nature' as a framework for revising both the idea that we are ‘moral’ and the idea that we are ‘agents’ in this unique way, and I open to question the idea that any response to the ecological emergency need be couched in ethical terms. This revision leads me to formulate an alternative conceptual model that makes use of Timothy Morton’s idea of enmeshment. I propose that we dramatically revise our idea of moral agency using the idea of enmeshment as a starting point. I develop an alternative framework that locates our capacity for responsibility within our capacity for realisation, both in the sense of understanding, and of making real, sets of conditions within our enmeshment. I draw parallels between this idea of ‘realisation as agency’ and the work of Dōgen and other non-dualists. I then propose a revised understanding of ‘the good’ of systems from a biophysical perspective, and compare this with certain features of Asian traditions of thought. I consider the practical implications of these revisions, and I conclude that the act of paying close attention, or realising, contains our agency, as does the attitude, or manner, with which we focus. This gives us the basis for a convergent response to the ecological emergency: the way of our engagement that is the key to responding to the ecological emergency
Resumo:
As the Internet has changed communication, commerce, and the distribution of information, so it is changing Information Systems Research (ISR). The goal of this paper is to put the topic of application and reliability of online research into the focus of ISR by exploring the extension of online research methods (ORM) into its popular publication outlets. 513 articles from high ranked ISR publication outlets from the last decade have been analyzed using online content analysis. The findings show that in ISR online research methods are applied despite the missing discussion on the validity of the theories and methods that were defined offline within the new environment and the associated challenges.
Resumo:
Hard-line anti-communists in the United States recognised the potential for the Soviet invasion of Afghanistan in 1979 to embroil their super-power rival in a ‘Vietnam-like quagmire.’ Their covert operation to arm the mujahedeen is well documented. This dissertation argues that propaganda and public diplomacy were powerful and essential instruments of this campaign. It examines the protagonists of this strategy, their policies, initiatives and programmes offering a comprehensive analysis heretofore absent. It stretches from the dying days of the Carter administration when Zbigniew Brzezinski saw the ‘opportunity’ presented by the invasion to the Soviet’s withdrawal in 1989. The aim of these information strategies was to damage Soviet credibility and enhance that of the US, considered under threat from growing ‘moral equivalence’ amongst international publics. The conflict could help the US regain strategic advantage in South Asia undermined by the ‘loss’ of Iran. The Reagan administration used it to justify the projection of US military might that it believed was eviscerated under Carter and emasculated by the lingering legacy of Vietnam. The research engages with source material from the Reagan Presidential Library, the United States Information Agency archives and the Library of Congress as well as a number of online archives. The material is multi-archival and multi-media including documentaries, booklets, press conferences, summit programmes and news-clips as well as national security policy documents and contemporaneous media commentary. It concludes that propaganda and public diplomacy were integral to the Reagan administration and other mujahedeen supporters’ determination to challenge the USSR. It finds that the conflict was used to justify military rearmament, further strategic aims and reassert US power. These Cold War machinations had a considerable impact on the course of the conflict and undermined efforts at resolution and reconciliation with profound implications for the future stability of Afghanistan and the world.