Gotowa bibliografia na temat „Private attribute”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Private attribute”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Private attribute"
Lai, Jianchang, Yi Mu, Fuchun Guo, Peng Jiang i Willy Susilo. "Privacy-enhanced attribute-based private information retrieval". Information Sciences 454-455 (lipiec 2018): 275–91. http://dx.doi.org/10.1016/j.ins.2018.04.084.
Pełny tekst źródłaZhang, Hao, Yue Zhao, Jintao Meng, Xue Wang i Kaijun Wu. "Attribute-Based Encryption Scheme with k-Out-of-n Oblivious Transfer". Electronics 12, nr 21 (1.11.2023): 4502. http://dx.doi.org/10.3390/electronics12214502.
Pełny tekst źródłaBattaglia, Elena, Simone Celano i Ruggero G. Pensa. "Differentially Private Distance Learning in Categorical Data". Data Mining and Knowledge Discovery 35, nr 5 (13.07.2021): 2050–88. http://dx.doi.org/10.1007/s10618-021-00778-0.
Pełny tekst źródłaZhang, Guo Yan. "A Multi-Authority Attribute-Based Encryption System Against Malicious KGC". Advanced Engineering Forum 6-7 (wrzesień 2012): 38–44. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.38.
Pełny tekst źródłaRezaeifar, Shideh, Slava Voloshynovskiy, Meisam Asgari Asgari Jirhandeh i Vitality Kinakh. "Privacy-Preserving Image Template Sharing Using Contrastive Learning". Entropy 24, nr 5 (3.05.2022): 643. http://dx.doi.org/10.3390/e24050643.
Pełny tekst źródłaZhang, Runnan, Gang Liu, Shancang Li, Yongheng Wei i Quan Wang. "ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities". Security and Communication Networks 2021 (20.03.2021): 1–11. http://dx.doi.org/10.1155/2021/5531369.
Pełny tekst źródłaPin, Lim Wei, i Manmeet Mahinderjit Singh. "User authentication using gait and enhanced attribute-based encryption: a case of smart home". Bulletin of Electrical Engineering and Informatics 13, nr 3 (1.06.2024): 1839–46. http://dx.doi.org/10.11591/eei.v13i3.5347.
Pełny tekst źródłaHan, Fei, i Jing Qin. "A Function Private Attribute-Based Encryption". International Journal of Distributed Sensor Networks 10, nr 1 (styczeń 2014): 749568. http://dx.doi.org/10.1155/2014/749568.
Pełny tekst źródłaMosteiro-Sanchez, Aintzane, Marc Barcelo, Jasone Astorga i Aitor Urbieta. "Trustworthy Users: Using IOTA and IPFS for Attribute Validation in CP-ABE and dCP-ABE Schemes". Smart Cities 6, nr 2 (10.03.2023): 913–28. http://dx.doi.org/10.3390/smartcities6020044.
Pełny tekst źródłaArroyo Arevalo, Caridad, Sayedeh Leila Noorbakhsh, Yun Dong, Yuan Hong i Binghui Wang. "Task-Agnostic Privacy-Preserving Representation Learning for Federated Learning against Attribute Inference Attacks". Proceedings of the AAAI Conference on Artificial Intelligence 38, nr 10 (24.03.2024): 10909–17. http://dx.doi.org/10.1609/aaai.v38i10.28965.
Pełny tekst źródłaRozprawy doktorskie na temat "Private attribute"
Ahadzi, Marcus K. "Public private partnerships in infrastructure procurement : a generic multi-attribute hierarchical model for minimising pre-contract time and cost overruns (GmAHM)". Thesis, Heriot-Watt University, 2004. http://hdl.handle.net/10399/1151.
Pełny tekst źródłaGuerreiro, Ana José. "Marcas de distribuidor no sector alimentar". Master's thesis, Universidade de Évora, 2006. http://hdl.handle.net/10174/16182.
Pełny tekst źródłaAlipour, Pijani Bizhan. "Attaques par inférence d'attributs sur les publications des réseaux sociaux". Electronic Thesis or Diss., Université de Lorraine, 2022. http://www.theses.fr/2022LORR0009.
Pełny tekst źródłaOnline Social Networks (OSN) are full of personal information such as gender, age, relationship status. The popularity and growth of OSN have rendered their platforms vulnerable to malicious activities and increased user privacy concerns. The privacy settings available in OSN do not prevent users from attribute inference attacks where an attacker seeks to illegitimately obtain their personal attributes (such as the gender attribute) from publicly available information. Disclosure of personal information can have serious outcomes such as personal spam, bullying, profile cloning for malicious activities, or sexual harassment. Existing inference techniques are either based on the target user behavior analysis through their liked pages and group memberships or based on the target user friend list. However, in real cases, the amount of available information to an attacker is small since users have realized the vulnerability of standard attribute inference attacks and concealed their generated information. To increase awareness of OSN users about threats to their privacy, in this thesis, we introduce a new class of attribute inference attacks against OSN users. We show the feasibility of these attacks from a very limited amount of data. They are applicable even when users hide all their profile information and their own comments. Our proposed methodology is to analyze Facebook picture metadata, namely (i) alt-text generated by Facebook to describe picture contents, and (ii) commenters’ words and emojis preferences while commenting underneath the picture, to infer sensitive attributes of the picture owner. We show how to launch these inference attacks on any Facebook user by i) handling online newly discovered vocabulary using a retrofitting process to enrich a core vocabulary that was built during offline training and ii) computing several embeddings for textual units (e.g., word, emoji), each one depending on a specific attribute value. Finally, we introduce ProPic, a protection mechanism that selects comments to be hidden in a computationally efficient way while minimizing utility loss according to a semantic measure. The proposed mechanism can help end-users to check their vulnerability to inference attacks and suggests comments to be hidden in order to mitigate the attacks. We have determined the success of the attacks and the protection mechanism by experiments on real data
Park, Sang Mork. "PRIVACY-PRESERVING ATTRIBUTE-BASED ACCESS CONTROL IN A GRID". Wright State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=wright1283121251.
Pełny tekst źródłaTHOBANI, SHAIRA. "CONTRATTO E ATTRIBUTI IMMATERIALI DELLA PERSONA". Doctoral thesis, Università degli Studi di Milano, 2016. http://hdl.handle.net/2434/351967.
Pełny tekst źródłaZHENG, YAO. "Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption". Digital WPI, 2011. https://digitalcommons.wpi.edu/etd-theses/902.
Pełny tekst źródłaSeethamraju, Arun Tej. "Attribute Based Encryption of Electronic Health Records : Comparative study of existing algorithms". Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14093.
Pełny tekst źródłaEdirisinghe, Edirisinghe Mudiyanselage Nalaka Sandeepa. "What are the perceptions and attributes that influence pupils and students in Sri Lanka regarding their selection between public and private higher education opportunities?" Thesis, Boston University, 2002. https://hdl.handle.net/2144/33464.
Pełny tekst źródłaPLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.
Today, the demand for higher education is growing at a rapid rate in many developing countries throughout the world. Unfortunately, many governments have realized that their public higher education systems are unable to satisfy this demand. Under this condition and strong encouragement from international donors, private higher education has begun to emerge. Sri Lanka is an example where private higher education surfaced in response to a need from its society. However, private higher education remains a foreign and elusive concept for many Sri Lankans. This study seeks to determine what are the perceptions and attributes that influence pupils and students in Sri Lanka regarding their selection between public and private higher education opportunities. This study, using traditional push-pull theory, utilized a research design that combined both quantitative and qualitative research methods. The design focused on the pupil, student, teacher, and administrator populations in Colombo, Sri Lanka. Questionnaire surveys and interviews were administered. The data produced consisted of quantitative data from the questionnaire surveys and qualitative data from the interviews, all of which were analyzed for common themes. The study concluded that the major themes of the responses included the cost of higher education, quality of higher education, recognition of higher education, and the environment within higher education institutions. Further, the study also discovered several minor themes that played a role for some pupils and students. These included the medium of instruction and the issue of social class in higher education. The recommendations proposed include a need to provide pupils with loans to pursue higher education, to increase awareness of private higher education, to establish smaller private community colleges in rural areas of Sri Lanka and to provide more interaction between public and private higher education.
2031-01-01
Abid, Younes. "Analyse automatisée des risques sur la vie privée dans les réseaux sociaux". Thesis, Université de Lorraine, 2018. http://www.theses.fr/2018LORR0088/document.
Pełny tekst źródłaIn this thesis we shed the light on the danger of privacy leakage on social network. We investigate privacy breaches, design attacks, show their feasibility and study their accuracies. This approach helps us to track the origin of threats and is a first step toward designing effective countermeasures. We have first introduced a subject sensitivity measure through a questionnaire survey. Then, we have designed on-line friendship and group membership link disclosure (with certainty) attacks on the largest social network “Facebook”. These attacks successfully uncover the local network of a target using only legitimate queries. We have also designed sampling techniques to rapidly collect useful data around a target. The collected data are represented by social-attribute networks and used to perform attribute inference (with uncertainty) attacks. To increase the accuracy of attacks, we have designed cleansing algorithms. These algorithms quantify the correlation between subjects, select the most relevant ones and combat data sparsity. Finally, we have used a shallow neural network to classify the data and infer the secret values of a sensitive attribute of a given target with high accuracy measured by AUC on real datasets. The proposed algorithms in this work are included in a system called SONSAI that can help end users analyzing their local network to take the hand over their privacy
Vasconcellos, Paulo Roberto Nascimento Meira. "Habilidades e Atitudes Relevantes na Composi??o do Perfil Profissional de Gestores de Institui??o de Ensino Superior de Car?ter Privado". Universidade Federal Rural do Rio de Janeiro, 2006. https://tede.ufrrj.br/jspui/handle/tede/970.
Pełny tekst źródłaThis study is based on a research aiming to verify the most relevant skills and attitudes for the composition of the professional profile of the managers of private institution of superior education. The methodology of exploratory study was adopted in this work, in order to contributes for academic literature, because it deepens a subject associated with abilities and business management. Nowadays, these subjects are highlighted because they help verifying the attributes that are perceived as important to compose the profile of the academics managers, aiming better performing their managerial functions. For the accomplishment of the present study, the data were collected by a questionnaire, which had been answered by professionals who work in a private institution of superior education located in the city of Rio de Janeiro, during the months of November of 2005 and January of 2006. The idea of competencies, more specifically centered in two of its components, the abilities and the attitudes, was evidenced according to the views of the interviews. The results observed in the present research point those attributes that had been considered as relevant. The abilities of communication, negotiation, creativity, logic and relationship; and the attitudes of responsibility, honesty, balance, ethics and disciplines are the attributes that have been most pointed out in this research.
Este trabalho realiza uma investiga??o com a finalidade de verificar as habilidades e atitudes relevantes para a composi??o do perfil profissional dos gestores de institui??o de ensino superior de car?ter privado. Empregando a metodologia do estudo explorat?rio, este trabalho contribui para a literatura acad?mica, por aprofundar um tema ligado ? compet?ncia e ? gest?o, ao verificar os atributos que s?o percebidos como importantes, por parte de diretores, coordenadores e professores, para compor o perfil dos gestores, visando o exerc?cio de suas fun??es. Para a consecu??o do presente estudo, optou-se pela confec??o de um question?rio, que foi respondido por profissionais pertencentes a uma institui??o de ensino superior de car?ter privado. A pesquisa foi levada a efeito entre os meses de novembro de 2005 e janeiro de 2006. A no??o de compet?ncia, mais especificamente centrada em dois de seus componentes, as habilidades e as atitudes, teve suas relev?ncias evidenciadas segundo a percep??o dos entrevistados. Os resultados alcan?ados na presente pesquisa apontam aqueles atributos que, de acordo com a percep??o dos entrevistados, foram considerados como relevantes. Dentre esses atributos foram evidenciadas, dentre outras, as habilidades de comunica??o, negocia??o, criatividade, l?gica e conviv?ncia, e as atitudes de responsabilidade, honestidade, equil?brio, ?tica e disciplina.
Książki na temat "Private attribute"
Giornata di studi sui Fondi oro della collezione Crespi (2004 Milan, Italy). I Fondi oro della collezione Alberto Crespi al Museo diocesano di Milano: Questioni iconografiche e attributive : atti della Giornata di studi, 11 ottobre 2004. Cinisello Balsamo, Milano: Silvana, 2009.
Znajdź pełny tekst źródłaCensi, Martina. Rituali di segni e metamorfosi Ṭuqūs al-išārāt wa-l-taḥawwulāt. Venice: Fondazione Università Ca’ Foscari, 2020. http://dx.doi.org/10.30687/978-88-6969-475-2.
Pełny tekst źródłaHotel Drouot. Ensemble de 16 œuvres par Henri Matisse, tableaux et sculptures modernes, art nouveau, art déco: C. Berard, J. Cartier, E. Cortès, A. Foächz, L. Icart, S. Lalique, H. Lebasque, Paubes, H. Plisson, H.J. Pontoy, A.G. Privat, E.M. Sandoz, O. Spielmann, P.R. Chevré, J. Coquillay, A. Gennarelli, V. Hayez, M.E. Jacquin, C. Marioton, M. Quef, A. Rodin, J. Terzi ef : objets d'art - céramiques par : Bing & Groendahl, T.J. Deck, Denbac, E. Gallé, M. Goupy, A. Heiligeinstein, R. Lallemant, E. Müller & J.A. Dampt, E. Müller & E. Bussière & Keller & Guérin, Picasso, Sèvres : verreries par Daum, E. Gallé, Jean, R. Lalique, Schneider : mobilier par ou attribué à Airborne, Courtray, A. Domin & M. Genevrière, Dominique, E. Gallé, J. & J. Kohn, G. Modigliani. Paris: Hôtel Drouot, 2001.
Znajdź pełny tekst źródłaWalsch, Neale Donald. Conversations with God, Book 4: Awaken the Species. Rainbow Ridge Publishing, 2019.
Znajdź pełny tekst źródłaMariAnna, Cara. Abortion. www. praeger. com, 2002. http://dx.doi.org/10.5040/9798216188384.
Pełny tekst źródłaMiner, Jeremy T., Lynn E. Miner i Jerry Griffith. Collaborative Grantseeking. ABC-CLIO, LLC, 2011. http://dx.doi.org/10.5040/9798400628221.
Pełny tekst źródłaPetrisko, Thomas. The Kingdom of Our Father. St. Andrew\'s Productions, 2001.
Znajdź pełny tekst źródłaRANGANATHAN, VINAY, i E. ESWARA REDDY. A STUDY ON LEADERSHIP STYLES OF PRINCIPALS AND ORGANIZATIONAL COMMITMENT OF TEACHERS IN SECONDARY SCHOOLS OF BENGALURU CITY. Jupiter Publications Consortium, 2023. http://dx.doi.org/10.47715/jpc.b.978-93-91303-72-3.
Pełny tekst źródłaChadwick, Anna. Law and the Political Economy of Hunger. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780198823940.001.0001.
Pełny tekst źródłaLi-Huang, Rebecca. The Psychology of High Net Worth Individuals. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190269999.003.0010.
Pełny tekst źródłaCzęści książek na temat "Private attribute"
Zhou, Xianlin, Hailong Ye i Jun Ye. "Attribute-Based Encryption Without Abuse of Private Keys". W Advances in Intelligent Systems and Computing, 1475–80. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25128-4_180.
Pełny tekst źródłaLin, Xi, i Yiliang Han. "Hierarchical Access Control Scheme of Private Data Based on Attribute Encryption". W Communications in Computer and Information Science, 220–30. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6385-5_19.
Pełny tekst źródłaLiu, Bo, Baokang Zhao, Bo Liu i Chunqing Wu. "An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks". W Security Engineering and Intelligence Informatics, 393–407. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-40588-4_27.
Pełny tekst źródłaLiu, Huichuan, Yong Zeng, Jiale Liu, Zhihong Liu, Jianfeng Ma i Xiaoyan Zhu. "Perosonalized Differentially Private Location Collection Method with Adaptive GPS Discretization". W Communications in Computer and Information Science, 175–90. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_13.
Pełny tekst źródłaDi Crescenzo, Giovanni, Debra Cook, Allen McIntosh i Euthimios Panagos. "Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database". W Lecture Notes in Computer Science, 339–55. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43936-4_22.
Pełny tekst źródłaNastou, Panayotis E., Dimitra Nastouli, Panos M. Pardalos i Yannis C. Stamatiou. "A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies". W Computation, Cryptography, and Network Security, 399–412. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-18275-9_17.
Pełny tekst źródłaDe Soete, Marijke. "Attribute Certificate". W Encyclopedia of Cryptography, Security and Privacy, 1–2. Berlin, Heidelberg: Springer Berlin Heidelberg, 2023. http://dx.doi.org/10.1007/978-3-642-27739-9_279-2.
Pełny tekst źródłaRot, Peter, Peter Peer i Vitomir Štruc. "Detecting Soft-Biometric Privacy Enhancement". W Handbook of Digital Face Manipulation and Detection, 391–411. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_18.
Pełny tekst źródłaAbendroth, Joerg, Marit Hansen, Ioannis Krontiris, Ahmad Sabouri, Eva Schlehahn, Robert Seidl i Harald Zwingelberg. "Privacy-ABC Usage Scenarios". W Attribute-based Credentials for Trust, 319–43. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14439-9_10.
Pełny tekst źródłaBichsel, Patrik, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann i in. "An Architecture for Privacy-ABCs". W Attribute-based Credentials for Trust, 11–78. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-14439-9_2.
Pełny tekst źródłaStreszczenia konferencji na temat "Private attribute"
Masoud Jafarpisheh, Amir, Mahtab Mirmohseni i Mohammad Ali Maddah-Ali. "Distributed Attribute-based Private Access Control". W 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022. http://dx.doi.org/10.1109/isit50566.2022.9834564.
Pełny tekst źródłaChaves, Iago, i Javam Machado. "Differentially Private Group-by Data Releasing Algorithm". W XXXIV Simpósio Brasileiro de Banco de Dados. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbbd.2019.8835.
Pełny tekst źródłaBeigi, Ghazaleh, Ahmadreza Mosallanezhad, Ruocheng Guo, Hamidreza Alvari, Alexander Nou i Huan Liu. "Privacy-Aware Recommendation with Private-Attribute Protection using Adversarial Learning". W WSDM '20: The Thirteenth ACM International Conference on Web Search and Data Mining. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3336191.3371832.
Pełny tekst źródłaShan Yinan i Zhenfu Cao. "Extended attribute based encryption for private information retrieval". W 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems (MASS). IEEE, 2009. http://dx.doi.org/10.1109/mobhoc.2009.5336932.
Pełny tekst źródłaWang, Jian, i Jiajin Le. "Based on Private Matching and Min-attribute Generalization for Privacy Preserving in Cloud Computing". W 2010 Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2010. http://dx.doi.org/10.1109/iihmsp.2010.186.
Pełny tekst źródłaMosallanezhad, Ahmadreza, Ghazaleh Beigi i Huan Liu. "Deep Reinforcement Learning-based Text Anonymization against Private-Attribute Inference". W Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP). Stroudsburg, PA, USA: Association for Computational Linguistics, 2019. http://dx.doi.org/10.18653/v1/d19-1240.
Pełny tekst źródłaPei, Xin, Yongjian Wang, Wei Yao, Jiuchuan Lin i Ruxiang Peng. "Security Enhanced Attribute Based Signcryption for Private Data Sharing in Cloud". W 2016 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2016. http://dx.doi.org/10.1109/trustcom.2016.0133.
Pełny tekst źródłaMon, Ei Ei, i Thinn Thu Naing. "The privacy-aware access control system using attribute-and role-based access control in private cloud". W Multimedia Technology (IC-BNMT 2011). IEEE, 2011. http://dx.doi.org/10.1109/icbnmt.2011.6155974.
Pełny tekst źródłaNadendla, Venkata Sriram Siddhardh, i Cedric Langbort. "On estimating multi-attribute choice preferences using private signals and matrix factorization". W 2018 52nd Annual Conference on Information Sciences and Systems (CISS). IEEE, 2018. http://dx.doi.org/10.1109/ciss.2018.8362279.
Pełny tekst źródłaCabot-Nadal, Miquel À., Brendan Playford, M. Magdalena Payeras-Capellà, Sebastian Gerske, Macià Mut-Puigserver i Rosa Pericàs-Gornals. "Private Identity-Related Attribute Verification Protocol Using SoulBound Tokens and Zero-Knowledge Proofs". W 2023 7th Cyber Security in Networking Conference (CSNet). IEEE, 2023. http://dx.doi.org/10.1109/csnet59123.2023.10339754.
Pełny tekst źródłaRaporty organizacyjne na temat "Private attribute"
Hausmann, Ricardo, i Eduardo Fernández-Arias. The Redesign of the International Financial Architecture from a Latin American Perspective: Who Pays the Bill? Inter-American Development Bank, grudzień 2000. http://dx.doi.org/10.18235/0010789.
Pełny tekst źródłaZorn, G. RADIUS Attributes for IEEE 802.16 Privacy Key Management Version 1 (PKMv1) Protocol Support. RFC Editor, czerwiec 2010. http://dx.doi.org/10.17487/rfc5904.
Pełny tekst źródłaElacqua, Gregory, Nicolas Figueroa, Andrés Fontaine, Juan Francisco Margitic i Carolina Méndez. COVID-19 Exodus: Parent preferences for public schools in Peru. Inter-American Development Bank, sierpień 2023. http://dx.doi.org/10.18235/0005095.
Pełny tekst źródłaMartinez-Carrasco, José, Otavio Conceição i Ana Lúcia Dezolt. More Information, Lower Price? Access Market-based Reference Prices and Gains in Public Procurement Efficiency. Inter-American Development Bank, marzec 2023. http://dx.doi.org/10.18235/0004794.
Pełny tekst źródłaElacqua, Gregory, Nicolas Figueroa, Andrés Fontaine, Juan Francisco Margitic i Carolina Méndez. Exodus to Public School: Parent Preferences for Public Schools in Peru. Inter-American Development Bank, grudzień 2023. http://dx.doi.org/10.18235/0005497.
Pełny tekst źródłaElacqua, Gregory, i Macarena Kutscher. Navigating Centralized Admissions: The Role of Parental Preferences in School Segregation in Chile. Inter-American Development Bank, grudzień 2023. http://dx.doi.org/10.18235/0005484.
Pełny tekst źródłaVillacis, Alexis, Victor Barrera, Jeffrey Alwang, Carlos Caicedo i James Quiroz. Strategies to strengthen Ecuador's high-value cacao value chain. Inter-American Development Bank, styczeń 2022. http://dx.doi.org/10.18235/0003960.
Pełny tekst źródłaAkbari, Chirag, Ninad Gore i Srinivas Pulugurtha. Understanding the Effect of Pervasive Events on Vehicle Travel Time Patterns. Mineta Transportation Institute, grudzień 2023. http://dx.doi.org/10.31979/mti.2023.2319.
Pełny tekst źródłaУдріс, Ірина Миколаївна, i Наталя Сергіївна Удріс-Бородавко. Design of the Franco-Belgian Exhibition Poster of the 1890-s in the Context of the Art Nouveau Style Formation. КНУКіМ, 2019. http://dx.doi.org/10.31812/123456789/5087.
Pełny tekst źródłaChong, Alberto E., i Florencio López-de-Silanes. Privatization in Mexico. Inter-American Development Bank, sierpień 2004. http://dx.doi.org/10.18235/0010832.
Pełny tekst źródła