349 resultados para unfair dismissal


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Correspondence (photocopies) concerning the dismissal of Jewish scientists and staff members at the Kaiser Wilhelm-Institut in 1933.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this thesis we study a series of multi-user resource-sharing problems for the Internet, which involve distribution of a common resource among participants of multi-user systems (servers or networks). We study concurrently accessible resources, which for end-users may be exclusively accessible or non-exclusively. For all kinds we suggest a separate algorithm or a modification of common reputation scheme. Every algorithm or method is studied from different perspectives: optimality of protocols, selfishness of end users, fairness of the protocol for end users. On the one hand the multifaceted analysis allows us to select the most suited protocols among a set of various available ones based on trade-offs of optima criteria. On the other hand, the future Internet predictions dictate new rules for the optimality we should take into account and new properties of the networks that cannot be neglected anymore. In this thesis we have studied new protocols for such resource-sharing problems as the backoff protocol, defense mechanisms against Denial-of-Service, fairness and confidentiality for users in overlay networks. For backoff protocol we present analysis of a general backoff scheme, where an optimization is applied to a general-view backoff function. It leads to an optimality condition for backoff protocols in both slot times and continuous time models. Additionally we present an extension for the backoff scheme in order to achieve fairness for the participants in an unfair environment, such as wireless signal strengths. Finally, for the backoff algorithm we suggest a reputation scheme that deals with misbehaving nodes. For the next problem -- denial-of-service attacks, we suggest two schemes that deal with the malicious behavior for two conditions: forged identities and unspoofed identities. For the first one we suggest a novel most-knocked-first-served algorithm, while for the latter we apply a reputation mechanism in order to restrict resource access for misbehaving nodes. Finally, we study the reputation scheme for the overlays and peer-to-peer networks, where resource is not placed on a common station, but spread across the network. The theoretical analysis suggests what behavior will be selected by the end station under such a reputation mechanism.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Digital image

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The need for paying with mobile devices has urged the development of payment systems for mobile electronic commerce. In this paper we have considered two important abuses in electronic payments systems for detection. The fraud, which is an intentional deception accomplished to secure an unfair gain, and an intrusion which are any set of actions that attempt to compromise the integrity, confidentiality or availability of a resource. Most of the available fraud and intrusion detection systems for e-payments are specific to the systems where they have been incorporated. This paper proposes a generic model called as Activity-Event-Symptoms(AES) model for detecting fraud and intrusion attacks which appears during payment process in the mobile commerce environment. The AES model is designed to identify the symptoms of fraud and intrusions by observing various events/transactions occurs during mobile commerce activity. The symptoms identification is followed by computing the suspicion factors for event attributes, and the certainty factor for a fraud and intrusion is generated using these suspicion factors. We have tested the proposed system by conducting various case studies, on the in-house established mobile commerce environment over wired and wire-less networks test bed.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This working paper develops an approach to the analysis of care as it is evident in the policies and practices of employing organisations. We identify how notions of care are incorporated in myriad and multi-faceted ways that may support, survey and control workers, as well as having implications for employers, managers, employees and workers. Aspects of care can be found in a range of statutory duties, policies and related activities, including: health and safety, equality and diversity, parental leave, religious observance, bullying and harassment, personal development, voluntary redundancy, early retirement, employer pension schemes, grievance procedures, and dismissal. The conceptual framework of organisation carescapes is offered as an aid to the analysis of employee policies and services. These policies and services are transformed by shifts in supranational and national policies such as European Union (EU) economic strategies and national legislation on disability rights legislation, age discrimination and flexible working, and changes in labour market competitiveness. In conclusion, we consider how the framework of organisation carescapes is informing research design in our and our colleagues’ ongoing programme of research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Legacy of Poverty. A Study of the substance and continuity of cultural knowledge in Finnish biographical and proverbial texts The study focuses on the idea of the cultural knowledge and shared understanding that ordinary people, folk , have of the concepts and ideas about rural based poverty in Finland. Throughout 19th century and well into 20th century, the majority of the population remained agrarian and poor. By the 1950s, most people still lived in rural areas and a majority of them earned their living primarily from agriculture and forestry. Urbanization proceeded rapidly from the 1960s onwards. Even though the Nordic welfare state was firmly established in Finland by the 1970s, old forms of agrarian poverty still remained in the culture. The source material for the study consists of 99 biographies and 502 proverbs. Biographical texts include written autobiographies and interviewed biographies. A primary analyzing concept is called a poverty speech. The poverty speech has been analyzed by providing answers to the following three questions: What connotations do people attach to poverty when they speak about it? What sort of social relations arise when people speak about poverty? How is the past experience of poverty constructed in the present and in the welfare state context? Cultural knowledge is a theoretical and analytical tool that enables people to categorize information. The three questions stated above are crucial in revealing the schematic structure that people use to communicate about agrarian poverty. Categories are analyzed and processed in terms of cultural themes that contain the ideals and stereotypes of spoken motif and sub-themes. The application of theoretical and analytical premises to the poverty speech has shown that there are four cultural themes. The first theme is Power. The social connotations in the poverty speech are mostly in relation to the better-off people. Poverty does not exist without an awareness of welfare, i.e. the understanding of a certain standard of welfare above that of one's own. The second theme is about family ties as a resource and welfare network. In poverty speech, marriage is represented as a means to upgrade one's livelihood. Family members are described as supporting one another, but at the same time as being antagonists. The third theme, Work represents the work ethic that is being connected to the poverty. Hard working as a representation is attached to eligibility for `a good life´ that in Finland was to become an owner-occupier of a cottage or a flat. The fourth theme is Security. The resentment of unfair treatment is expressed by using moral superiority and rational explanations. The ruling classes in the agrarian society are portrayed as being evil and selfish with no social conscience because they did not provide enough assistance to those who needed it. During the period when the welfare benefit system was undeveloped, the poor expected the wealthier people to make a contribution to the distribution of material wealth. In the premises of cultural knowledge, both oral and written traditions are about human thinking: they deal with topics, ideas and evaluations that are relevant to their bearers. Many elements expressed in poverty speech, such as classifications and customs derived from the rural world, have been carried over into the next generation in newer contexts and a different cultural environment. Keywords: cultural knowledge, cognitive categorization, poverty, life stories, proverbs

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Frequency-domain scheduling and rate adaptation have helped next generation orthogonal frequency division multiple access (OFDMA) based wireless cellular systems such as Long Term Evolution (LTE) achieve significantly higher spectral efficiencies. To overcome the severe uplink feedback bandwidth constraints, LTE uses several techniques to reduce the feedback required by a frequency-domain scheduler about the channel state information of all subcarriers of all users. In this paper, we analyze the throughput achieved by the User Selected Subband feedback scheme of LTE. In it, a user feeds back only the indices of the best M subbands and a single 4-bit estimate of the average rate achievable over all selected M subbands. In addition, we compare the performance with the subband-level feedback scheme of LTE, and highlight the role of the scheduler by comparing the performances of the unfair greedy scheduler and the proportional fair (PF) scheduler. Our analysis sheds several insights into the working of the feedback reduction techniques used in LTE.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Accurate system planning and performance evaluation requires knowledge of the joint impact of scheduling, interference, and fading. However, current analyses either require costly numerical simulations or make simplifying assumptions that limit the applicability of the results. In this paper, we derive analytical expressions for the spectral efficiency of cellular systems that use either the channel-unaware but fair round robin scheduler or the greedy, channel-aware but unfair maximum signal to interference ratio scheduler. As is the case in real deployments, non-identical co-channel interference at each user, both Rayleigh fading and lognormal shadowing, and limited modulation constellation sizes are accounted for in the analysis. We show that using a simple moment generating function-based lognormal approximation technique and an accurate Gaussian-Q function approximation leads to results that match simulations well. These results are more accurate than erstwhile results that instead used the moment-matching Fenton-Wilkinson approximation method and bounds on the Q function. The spectral efficiency of cellular systems is strongly influenced by the channel scheduler and the small constellation size that is typically used in third generation cellular systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Wireless LAN (WLAN) market consists of IEEE 802.11 MAC standard conformant devices (e.g., access points (APs), client adapters) from multiple vendors. Certain third party certifications such as those specified by the Wi-Fi alliance have been widely used by vendors to ensure basic conformance to the 802.11 standard, thus leading to the expectation that the available devices exhibit identical MAC level behavior. In this paper, however, we present what we believe to be the first ever set of experimental results that highlight the fact that WLAN devices from different vendors in the market can have heterogeneous MAC level behavior. Specifically, we demonstrate with examples and data that in certain cases, devices may not be conformant with the 802.11 standard while in other cases, they may differ in significant details that are not a part of mandatory specifications of the standard. We argue that heterogeneous MAC implementations can adversely impact WLAN operations leading to unfair bandwidth allocation, potential break-down of related MAC functionality and difficulties in provisioning the capacity of a WLAN. However, on the positive side, MAC level heterogeneity can be useful in applications such as vendor/model level device fingerprinting.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We present a centralized integrated approach for: 1) enhancing the performance of an IEEE 802.11 infrastructure wireless local area network (WLAN), and 2) managing the access link that connects the WLAN to the Internet. Our approach, which is implemented on a standard Linux platform, and which we call ADvanced Wi-fi Internet Service EnhanceR (ADWISER), is an extension of our previous system WLAN Manager (WM). ADWISER addresses several infrastructure WLAN performance anomalies such as mixed-rate inefficiency, unfair medium sharing between simultaneous TCP uploads and downloads, and inefficient utilization of the Internet access bandwidth when Internet transfers compete with LAN-WLAN transfers, etc. The approach is via centralized queueing and scheduling, using a novel, configurable, cascaded packet queueing and scheduling architecture, with an adaptive service rate. In this paper, we describe the design of ADWISER and report results of extensive experimentation conducted on a hybrid testbed consisting of real end-systems and an emulated WLAN on Qualnet. We also present results from a physical testbed consisting of one access point (AP) and a few end-systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We consider the problem of ``fair'' scheduling the resources to one of the many mobile stations by a centrally controlled base station (BS). The BS is the only entity taking decisions in this framework based on truthful information from the mobiles on their radio channel. We study the well-known family of parametric alpha-fair scheduling problems from a game-theoretic perspective in which some of the mobiles may be noncooperative. We first show that if the BS is unaware of the noncooperative behavior from the mobiles, the noncooperative mobiles become successful in snatching the resources from the other cooperative mobiles, resulting in unfair allocations. If the BS is aware of the noncooperative mobiles, a new game arises with BS as an additional player. It can then do better by neglecting the signals from the noncooperative mobiles. The BS, however, becomes successful in eliciting the truthful signals from the mobiles only when it uses additional information (signal statistics). This new policy along with the truthful signals from mobiles forms a Nash equilibrium (NE) that we call a Truth Revealing Equilibrium. Finally, we propose new iterative algorithms to implement fair scheduling policies that robustify the otherwise nonrobust (in presence of noncooperation) alpha-fair scheduling algorithms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Practical orthogonal frequency division multiplexing (OFDM) systems, such as Long Term Evolution (LTE), exploit multi-user diversity using very limited feedback. The best-m feedback scheme is one such limited feedback scheme, in which users report only the gains of their m best subchannels (SCs) and their indices. While the scheme has been extensively studied and adopted in standards such as LTE, an analysis of its throughput for the practically important case in which the SCs are correlated has received less attention. We derive new closed-form expressions for the throughput when the SC gains of a user are uniformly correlated. We analyze the performance of the greedy but unfair frequency-domain scheduler and the fair round-robin scheduler for the general case in which the users see statistically non-identical SCs. An asymptotic analysis is then developed to gain further insights. The analysis and extensive numerical results bring out how correlation reduces throughput.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen: El problema de la deshumanización de la atención médica sido enfocado desde ópticas diferentes (y en diversos momentos históricos), ya sea desde la perspectiva del paciente, de los familiares o del propio equipo de salud que presta los servicios, pero no hay un estudio de las causas y de las posibles soluciones. Al realizar un recorrido de la atención profesional en el mundo de la salud observamos que solo podemos re humanizar esa atención con el compromiso directo de todos los participantes del equipo de salud para promover actos y condiciones que tengan como finalidad el respeto de los derechos humanos que se afirman en la dignidad de cada persona enferma. Creemos que esta presentación puede llevar a tomar conciencia sobre la vulnerabilidad de la intimidad en el proceso, hoy deshumanizante, de la atención profesional en el ámbito de la salud y desde este punto de partida asumiendo las responsabilidades subjetivas, sin anular la moralidad objetiva del hecho, comprometiéndonos a denunciar estas situaciones injustas y a trabajar día a día para humanizar la atención y de esta forma respetar el derecho a la intimidad.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen: La grave consecuencia del comportamiento renuente de la sociedad respecto de la donación es la “muerte injusta de pacientes” en listas de espera. La escasez de órganos y el incremento de estas listas han alentado la búsqueda de soluciones. El público necesita educación e información sin ambigüedades. Además, la parcial formación universitaria sobre este tema es también responsable de una inadecuada acción médica. Para lograr esto, sería necesaria la incorporación de programas de educación en trasplantes en los planes de estudios escolares, el apoyo de las comunidades trasplantológicas nacionales e internacionales y el activo sostén del Estado y de los distintos credos religiosos. Es nuestro deber generar una solución para evitar que políticas racionalistas dirigidas a modificar la escasez de órganos no resulten ineficaces y aun contraproducentes debido a una atención inadecuada a los complejos rasgos antropológicos, psicológicos y ético-sociales del ser humano

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Resumen: Se analiza un caso judicial inédito que involucra a una diócesis, a una parroquia, a un personal municipal y a un municipio de la provincia de Buenos Aires. Un agente municipal es adscripto provisoriamente, por decreto del señor intendente, para desempeñarse en una Cáritas diocesana, y luego este agente pasa a desempeñarse en una Cáritas parroquial de una parroquia perteneciente a esa diócesis, todo lo cual es comunicado y aceptado por el municipio, que es su empleador. Luego de desempeñarse un tiempo en esa Cáritas parroquial, el personal municipal primero intima y después inicia un juicio por despido contra la diócesis alegando una relación laboral no registrada con ésta. El caso lleva a plantear la aplicación del derecho canónico para su resolución. Se explica que la diócesis y las parroquias poseen personería jurídica propia, y que la acción judicial contra la diócesis es improcedente. Se expone en detalle el planteamiento realizado en el juicio por el agente municipal y por la diócesis.