Littérature scientifique sur le sujet « Private attribute »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Private attribute ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Private attribute"
Lai, Jianchang, Yi Mu, Fuchun Guo, Peng Jiang et Willy Susilo. « Privacy-enhanced attribute-based private information retrieval ». Information Sciences 454-455 (juillet 2018) : 275–91. http://dx.doi.org/10.1016/j.ins.2018.04.084.
Texte intégralZhang, Hao, Yue Zhao, Jintao Meng, Xue Wang et Kaijun Wu. « Attribute-Based Encryption Scheme with k-Out-of-n Oblivious Transfer ». Electronics 12, no 21 (1 novembre 2023) : 4502. http://dx.doi.org/10.3390/electronics12214502.
Texte intégralBattaglia, Elena, Simone Celano et Ruggero G. Pensa. « Differentially Private Distance Learning in Categorical Data ». Data Mining and Knowledge Discovery 35, no 5 (13 juillet 2021) : 2050–88. http://dx.doi.org/10.1007/s10618-021-00778-0.
Texte intégralZhang, Guo Yan. « A Multi-Authority Attribute-Based Encryption System Against Malicious KGC ». Advanced Engineering Forum 6-7 (septembre 2012) : 38–44. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.38.
Texte intégralRezaeifar, Shideh, Slava Voloshynovskiy, Meisam Asgari Asgari Jirhandeh et Vitality Kinakh. « Privacy-Preserving Image Template Sharing Using Contrastive Learning ». Entropy 24, no 5 (3 mai 2022) : 643. http://dx.doi.org/10.3390/e24050643.
Texte intégralZhang, Runnan, Gang Liu, Shancang Li, Yongheng Wei et Quan Wang. « ABSAC : Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities ». Security and Communication Networks 2021 (20 mars 2021) : 1–11. http://dx.doi.org/10.1155/2021/5531369.
Texte intégralPin, Lim Wei, et Manmeet Mahinderjit Singh. « User authentication using gait and enhanced attribute-based encryption : a case of smart home ». Bulletin of Electrical Engineering and Informatics 13, no 3 (1 juin 2024) : 1839–46. http://dx.doi.org/10.11591/eei.v13i3.5347.
Texte intégralHan, Fei, et Jing Qin. « A Function Private Attribute-Based Encryption ». International Journal of Distributed Sensor Networks 10, no 1 (janvier 2014) : 749568. http://dx.doi.org/10.1155/2014/749568.
Texte intégralMosteiro-Sanchez, Aintzane, Marc Barcelo, Jasone Astorga et Aitor Urbieta. « Trustworthy Users : Using IOTA and IPFS for Attribute Validation in CP-ABE and dCP-ABE Schemes ». Smart Cities 6, no 2 (10 mars 2023) : 913–28. http://dx.doi.org/10.3390/smartcities6020044.
Texte intégralArroyo Arevalo, Caridad, Sayedeh Leila Noorbakhsh, Yun Dong, Yuan Hong et Binghui Wang. « Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks ». Proceedings of the AAAI Conference on Artificial Intelligence 38, no 10 (24 mars 2024) : 10909–17. http://dx.doi.org/10.1609/aaai.v38i10.28965.
Texte intégralThèses sur le sujet "Private attribute"
Ahadzi, Marcus K. « Public private partnerships in infrastructure procurement : a generic multi-attribute hierarchical model for minimising pre-contract time and cost overruns (GmAHM) ». Thesis, Heriot-Watt University, 2004. http://hdl.handle.net/10399/1151.
Texte intégralGuerreiro, Ana José. « Marcas de distribuidor no sector alimentar ». Master's thesis, Universidade de Évora, 2006. http://hdl.handle.net/10174/16182.
Texte intégralAlipour, Pijani Bizhan. « Attaques par inférence d'attributs sur les publications des réseaux sociaux ». Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0009.
Texte intégralOnline Social Networks (OSN) are full of personal information such as gender, age, relationship status. The popularity and growth of OSN have rendered their platforms vulnerable to malicious activities and increased user privacy concerns. The privacy settings available in OSN do not prevent users from attribute inference attacks where an attacker seeks to illegitimately obtain their personal attributes (such as the gender attribute) from publicly available information. Disclosure of personal information can have serious outcomes such as personal spam, bullying, profile cloning for malicious activities, or sexual harassment. Existing inference techniques are either based on the target user behavior analysis through their liked pages and group memberships or based on the target user friend list. However, in real cases, the amount of available information to an attacker is small since users have realized the vulnerability of standard attribute inference attacks and concealed their generated information. To increase awareness of OSN users about threats to their privacy, in this thesis, we introduce a new class of attribute inference attacks against OSN users. We show the feasibility of these attacks from a very limited amount of data. They are applicable even when users hide all their profile information and their own comments. Our proposed methodology is to analyze Facebook picture metadata, namely (i) alt-text generated by Facebook to describe picture contents, and (ii) commenters’ words and emojis preferences while commenting underneath the picture, to infer sensitive attributes of the picture owner. We show how to launch these inference attacks on any Facebook user by i) handling online newly discovered vocabulary using a retrofitting process to enrich a core vocabulary that was built during offline training and ii) computing several embeddings for textual units (e.g., word, emoji), each one depending on a specific attribute value. Finally, we introduce ProPic, a protection mechanism that selects comments to be hidden in a computationally efficient way while minimizing utility loss according to a semantic measure. The proposed mechanism can help end-users to check their vulnerability to inference attacks and suggests comments to be hidden in order to mitigate the attacks. We have determined the success of the attacks and the protection mechanism by experiments on real data
Park, Sang Mork. « PRIVACY-PRESERVING ATTRIBUTE-BASED ACCESS CONTROL IN A GRID ». Wright State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=wright1283121251.
Texte intégralTHOBANI, SHAIRA. « CONTRATTO E ATTRIBUTI IMMATERIALI DELLA PERSONA ». Doctoral thesis, Università degli Studi di Milano, 2016. http://hdl.handle.net/2434/351967.
Texte intégralZHENG, YAO. « Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption ». Digital WPI, 2011. https://digitalcommons.wpi.edu/etd-theses/902.
Texte intégralSeethamraju, Arun Tej. « Attribute Based Encryption of Electronic Health Records : Comparative study of existing algorithms ». Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14093.
Texte intégralEdirisinghe, Edirisinghe Mudiyanselage Nalaka Sandeepa. « What are the perceptions and attributes that influence pupils and students in Sri Lanka regarding their selection between public and private higher education opportunities ? » Thesis, Boston University, 2002. https://hdl.handle.net/2144/33464.
Texte intégralPLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.
Today, the demand for higher education is growing at a rapid rate in many developing countries throughout the world. Unfortunately, many governments have realized that their public higher education systems are unable to satisfy this demand. Under this condition and strong encouragement from international donors, private higher education has begun to emerge. Sri Lanka is an example where private higher education surfaced in response to a need from its society. However, private higher education remains a foreign and elusive concept for many Sri Lankans. This study seeks to determine what are the perceptions and attributes that influence pupils and students in Sri Lanka regarding their selection between public and private higher education opportunities. This study, using traditional push-pull theory, utilized a research design that combined both quantitative and qualitative research methods. The design focused on the pupil, student, teacher, and administrator populations in Colombo, Sri Lanka. Questionnaire surveys and interviews were administered. The data produced consisted of quantitative data from the questionnaire surveys and qualitative data from the interviews, all of which were analyzed for common themes. The study concluded that the major themes of the responses included the cost of higher education, quality of higher education, recognition of higher education, and the environment within higher education institutions. Further, the study also discovered several minor themes that played a role for some pupils and students. These included the medium of instruction and the issue of social class in higher education. The recommendations proposed include a need to provide pupils with loans to pursue higher education, to increase awareness of private higher education, to establish smaller private community colleges in rural areas of Sri Lanka and to provide more interaction between public and private higher education.
2031-01-01
Abid, Younes. « Analyse automatisée des risques sur la vie privée dans les réseaux sociaux ». Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0088/document.
Texte intégralIn this thesis we shed the light on the danger of privacy leakage on social network. We investigate privacy breaches, design attacks, show their feasibility and study their accuracies. This approach helps us to track the origin of threats and is a first step toward designing effective countermeasures. We have first introduced a subject sensitivity measure through a questionnaire survey. Then, we have designed on-line friendship and group membership link disclosure (with certainty) attacks on the largest social network “Facebook”. These attacks successfully uncover the local network of a target using only legitimate queries. We have also designed sampling techniques to rapidly collect useful data around a target. The collected data are represented by social-attribute networks and used to perform attribute inference (with uncertainty) attacks. To increase the accuracy of attacks, we have designed cleansing algorithms. These algorithms quantify the correlation between subjects, select the most relevant ones and combat data sparsity. Finally, we have used a shallow neural network to classify the data and infer the secret values of a sensitive attribute of a given target with high accuracy measured by AUC on real datasets. The proposed algorithms in this work are included in a system called SONSAI that can help end users analyzing their local network to take the hand over their privacy
Vasconcellos, Paulo Roberto Nascimento Meira. « Habilidades e Atitudes Relevantes na Composi??o do Perfil Profissional de Gestores de Institui??o de Ensino Superior de Car?ter Privado ». Universidade Federal Rural do Rio de Janeiro, 2006. https://tede.ufrrj.br/jspui/handle/tede/970.
Texte intégralThis study is based on a research aiming to verify the most relevant skills and attitudes for the composition of the professional profile of the managers of private institution of superior education. The methodology of exploratory study was adopted in this work, in order to contributes for academic literature, because it deepens a subject associated with abilities and business management. Nowadays, these subjects are highlighted because they help verifying the attributes that are perceived as important to compose the profile of the academics managers, aiming better performing their managerial functions. For the accomplishment of the present study, the data were collected by a questionnaire, which had been answered by professionals who work in a private institution of superior education located in the city of Rio de Janeiro, during the months of November of 2005 and January of 2006. The idea of competencies, more specifically centered in two of its components, the abilities and the attitudes, was evidenced according to the views of the interviews. The results observed in the present research point those attributes that had been considered as relevant. The abilities of communication, negotiation, creativity, logic and relationship; and the attitudes of responsibility, honesty, balance, ethics and disciplines are the attributes that have been most pointed out in this research.
Este trabalho realiza uma investiga??o com a finalidade de verificar as habilidades e atitudes relevantes para a composi??o do perfil profissional dos gestores de institui??o de ensino superior de car?ter privado. Empregando a metodologia do estudo explorat?rio, este trabalho contribui para a literatura acad?mica, por aprofundar um tema ligado ? compet?ncia e ? gest?o, ao verificar os atributos que s?o percebidos como importantes, por parte de diretores, coordenadores e professores, para compor o perfil dos gestores, visando o exerc?cio de suas fun??es. Para a consecu??o do presente estudo, optou-se pela confec??o de um question?rio, que foi respondido por profissionais pertencentes a uma institui??o de ensino superior de car?ter privado. A pesquisa foi levada a efeito entre os meses de novembro de 2005 e janeiro de 2006. A no??o de compet?ncia, mais especificamente centrada em dois de seus componentes, as habilidades e as atitudes, teve suas relev?ncias evidenciadas segundo a percep??o dos entrevistados. Os resultados alcan?ados na presente pesquisa apontam aqueles atributos que, de acordo com a percep??o dos entrevistados, foram considerados como relevantes. Dentre esses atributos foram evidenciadas, dentre outras, as habilidades de comunica??o, negocia??o, criatividade, l?gica e conviv?ncia, e as atitudes de responsabilidade, honestidade, equil?brio, ?tica e disciplina.
Livres sur le sujet "Private attribute"
Giornata di studi sui Fondi oro della collezione Crespi (2004 Milan, Italy). I Fondi oro della collezione Alberto Crespi al Museo diocesano di Milano : Questioni iconografiche e attributive : atti della Giornata di studi, 11 ottobre 2004. Cinisello Balsamo, Milano : Silvana, 2009.
Trouver le texte intégralCensi, Martina. Rituali di segni e metamorfosi Ṭuqūs al-išārāt wa-l-taḥawwulāt. Venice : Fondazione Università Ca’ Foscari, 2020. http://dx.doi.org/10.30687/978-88-6969-475-2.
Texte intégralHotel Drouot. Ensemble de 16 œuvres par Henri Matisse, tableaux et sculptures modernes, art nouveau, art déco : C. Berard, J. Cartier, E. Cortès, A. Foächz, L. Icart, S. Lalique, H. Lebasque, Paubes, H. Plisson, H.J. Pontoy, A.G. Privat, E.M. Sandoz, O. Spielmann, P.R. Chevré, J. Coquillay, A. Gennarelli, V. Hayez, M.E. Jacquin, C. Marioton, M. Quef, A. Rodin, J. Terzi ef : objets d'art - céramiques par : Bing & Groendahl, T.J. Deck, Denbac, E. Gallé, M. Goupy, A. Heiligeinstein, R. Lallemant, E. Müller & J.A. Dampt, E. Müller & E. Bussière & Keller & Guérin, Picasso, Sèvres : verreries par Daum, E. Gallé, Jean, R. Lalique, Schneider : mobilier par ou attribué à Airborne, Courtray, A. Domin & M. Genevrière, Dominique, E. Gallé, J. & J. Kohn, G. Modigliani. Paris : Hôtel Drouot, 2001.
Trouver le texte intégralWalsch, Neale Donald. Conversations with God, Book 4 : Awaken the Species. Rainbow Ridge Publishing, 2019.
Trouver le texte intégralMariAnna, Cara. Abortion. www. praeger. com, 2002. http://dx.doi.org/10.5040/9798216188384.
Texte intégralMiner, Jeremy T., Lynn E. Miner et Jerry Griffith. Collaborative Grantseeking. ABC-CLIO, LLC, 2011. http://dx.doi.org/10.5040/9798400628221.
Texte intégralPetrisko, Thomas. The Kingdom of Our Father. St. Andrew\'s Productions, 2001.
Trouver le texte intégralRANGANATHAN, VINAY, et E. ESWARA REDDY. A STUDY ON LEADERSHIP STYLES OF PRINCIPALS AND ORGANIZATIONAL COMMITMENT OF TEACHERS IN SECONDARY SCHOOLS OF BENGALURU CITY. Jupiter Publications Consortium, 2023. http://dx.doi.org/10.47715/jpc.b.978-93-91303-72-3.
Texte intégralChadwick, Anna. Law and the Political Economy of Hunger. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198823940.001.0001.
Texte intégralLi-Huang, Rebecca. The Psychology of High Net Worth Individuals. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190269999.003.0010.
Texte intégralChapitres de livres sur le sujet "Private attribute"
Zhou, Xianlin, Hailong Ye et Jun Ye. « Attribute-Based Encryption Without Abuse of Private Keys ». Dans Advances in Intelligent Systems and Computing, 1475–80. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25128-4_180.
Texte intégralLin, Xi, et Yiliang Han. « Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption ». Dans Communications in Computer and Information Science, 220–30. Singapore : Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6385-5_19.
Texte intégralLiu, Bo, Baokang Zhao, Bo Liu et Chunqing Wu. « An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks ». Dans Security Engineering and Intelligence Informatics, 393–407. Berlin, Heidelberg : Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40588-4_27.
Texte intégralLiu, Huichuan, Yong Zeng, Jiale Liu, Zhihong Liu, Jianfeng Ma et Xiaoyan Zhu. « Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization ». Dans Communications in Computer and Information Science, 175–90. Singapore : Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_13.
Texte intégralDi Crescenzo, Giovanni, Debra Cook, Allen McIntosh et Euthimios Panagos. « Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database ». Dans Lecture Notes in Computer Science, 339–55. Berlin, Heidelberg : Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43936-4_22.
Texte intégralNastou, Panayotis E., Dimitra Nastouli, Panos M. Pardalos et Yannis C. Stamatiou. « A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies ». Dans Computation, Cryptography, and Network Security, 399–412. Cham : Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18275-9_17.
Texte intégralDe Soete, Marijke. « Attribute Certificate ». Dans Encyclopedia of Cryptography, Security and Privacy, 1–2. Berlin, Heidelberg : Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_279-2.
Texte intégralRot, Peter, Peter Peer et Vitomir Štruc. « Detecting Soft-Biometric Privacy Enhancement ». Dans Handbook of Digital Face Manipulation and Detection, 391–411. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_18.
Texte intégralAbendroth, Joerg, Marit Hansen, Ioannis Krontiris, Ahmad Sabouri, Eva Schlehahn, Robert Seidl et Harald Zwingelberg. « Privacy-ABC Usage Scenarios ». Dans Attribute-based Credentials for Trust, 319–43. Cham : Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14439-9_10.
Texte intégralBichsel, Patrik, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann et al. « An Architecture for Privacy-ABCs ». Dans Attribute-based Credentials for Trust, 11–78. Cham : Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14439-9_2.
Texte intégralActes de conférences sur le sujet "Private attribute"
Masoud Jafarpisheh, Amir, Mahtab Mirmohseni et Mohammad Ali Maddah-Ali. « Distributed Attribute-based Private Access Control ». Dans 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022. http://dx.doi.org/10.1109/isit50566.2022.9834564.
Texte intégralChaves, Iago, et Javam Machado. « Differentially Private Group-by Data Releasing Algorithm ». Dans XXXIV Simpósio Brasileiro de Banco de Dados. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbbd.2019.8835.
Texte intégralBeigi, Ghazaleh, Ahmadreza Mosallanezhad, Ruocheng Guo, Hamidreza Alvari, Alexander Nou et Huan Liu. « Privacy-Aware Recommendation with Private-Attribute Protection using Adversarial Learning ». Dans WSDM '20 : The Thirteenth ACM International Conference on Web Search and Data Mining. New York, NY, USA : ACM, 2020. http://dx.doi.org/10.1145/3336191.3371832.
Texte intégralShan Yinan et Zhenfu Cao. « Extended attribute based encryption for private information retrieval ». Dans 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS). IEEE, 2009. http://dx.doi.org/10.1109/mobhoc.2009.5336932.
Texte intégralWang, Jian, et Jiajin Le. « Based on Private Matching and Min-attribute Generalization for Privacy Preserving in Cloud Computing ». Dans 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2010. http://dx.doi.org/10.1109/iihmsp.2010.186.
Texte intégralMosallanezhad, Ahmadreza, Ghazaleh Beigi et Huan Liu. « Deep Reinforcement Learning-based Text Anonymization against Private-Attribute Inference ». Dans Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). Stroudsburg, PA, USA : Association for Computational Linguistics, 2019. http://dx.doi.org/10.18653/v1/d19-1240.
Texte intégralPei, Xin, Yongjian Wang, Wei Yao, Jiuchuan Lin et Ruxiang Peng. « Security Enhanced Attribute Based Signcryption for Private Data Sharing in Cloud ». Dans 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2016. http://dx.doi.org/10.1109/trustcom.2016.0133.
Texte intégralMon, Ei Ei, et Thinn Thu Naing. « The privacy-aware access control system using attribute-and role-based access control in private cloud ». Dans Multimedia Technology (IC-BNMT 2011). IEEE, 2011. http://dx.doi.org/10.1109/icbnmt.2011.6155974.
Texte intégralNadendla, Venkata Sriram Siddhardh, et Cedric Langbort. « On estimating multi-attribute choice preferences using private signals and matrix factorization ». Dans 2018 52nd Annual Conference on Information Sciences and Systems (CISS). IEEE, 2018. http://dx.doi.org/10.1109/ciss.2018.8362279.
Texte intégralCabot-Nadal, Miquel À., Brendan Playford, M. Magdalena Payeras-Capellà, Sebastian Gerske, Macià Mut-Puigserver et Rosa Pericàs-Gornals. « Private Identity-Related Attribute Verification Protocol Using SoulBound Tokens and Zero-Knowledge Proofs ». Dans 2023 7th Cyber Security in Networking Conference (CSNet). IEEE, 2023. http://dx.doi.org/10.1109/csnet59123.2023.10339754.
Texte intégralRapports d'organisations sur le sujet "Private attribute"
Hausmann, Ricardo, et Eduardo Fernández-Arias. The Redesign of the International Financial Architecture from a Latin American Perspective : Who Pays the Bill ? Inter-American Development Bank, décembre 2000. http://dx.doi.org/10.18235/0010789.
Texte intégralZorn, G. RADIUS Attributes for IEEE 802.16 Privacy Key Management Version 1 (PKMv1) Protocol Support. RFC Editor, juin 2010. http://dx.doi.org/10.17487/rfc5904.
Texte intégralElacqua, Gregory, Nicolas Figueroa, Andrés Fontaine, Juan Francisco Margitic et Carolina Méndez. COVID-19 Exodus : Parent preferences for public schools in Peru. Inter-American Development Bank, août 2023. http://dx.doi.org/10.18235/0005095.
Texte intégralMartinez-Carrasco, José, Otavio Conceição et Ana Lúcia Dezolt. More Information, Lower Price ? Access Market-based Reference Prices and Gains in Public Procurement Efficiency. Inter-American Development Bank, mars 2023. http://dx.doi.org/10.18235/0004794.
Texte intégralElacqua, Gregory, Nicolas Figueroa, Andrés Fontaine, Juan Francisco Margitic et Carolina Méndez. Exodus to Public School : Parent Preferences for Public Schools in Peru. Inter-American Development Bank, décembre 2023. http://dx.doi.org/10.18235/0005497.
Texte intégralElacqua, Gregory, et Macarena Kutscher. Navigating Centralized Admissions : The Role of Parental Preferences in School Segregation in Chile. Inter-American Development Bank, décembre 2023. http://dx.doi.org/10.18235/0005484.
Texte intégralVillacis, Alexis, Victor Barrera, Jeffrey Alwang, Carlos Caicedo et James Quiroz. Strategies to strengthen Ecuador's high-value cacao value chain. Inter-American Development Bank, janvier 2022. http://dx.doi.org/10.18235/0003960.
Texte intégralAkbari, Chirag, Ninad Gore et Srinivas Pulugurtha. Understanding the Effect of Pervasive Events on Vehicle Travel Time Patterns. Mineta Transportation Institute, décembre 2023. http://dx.doi.org/10.31979/mti.2023.2319.
Texte intégralУдріс, Ірина Миколаївна, et Наталя Сергіївна Удріс-Бородавко. Design of the Franco-Belgian Exhibition Poster of the 1890-s in the Context of the Art Nouveau Style Formation. КНУКіМ, 2019. http://dx.doi.org/10.31812/123456789/5087.
Texte intégralChong, Alberto E., et Florencio López-de-Silanes. Privatization in Mexico. Inter-American Development Bank, août 2004. http://dx.doi.org/10.18235/0010832.
Texte intégral