- Ardal, C. et al. Open Source Drug Discovery in Practice: A Case Study National Center for Biotechnology Information (Sep. 20, 2012); https://www.ncbi.nlm.nih.gov/pmc/articles/PMC3447952/Google Scholar
- Boydston, J. John Dewey: The Later Works 1925--1953, Vol. 81933 Essays and How We Think, Revised Edition. Southern Illinois University Press, Carbondale, 1986.Google Scholar
- Cech, E. and Sherick, H. Depoliticization and the structure of engineering education. In International Perspectives on Engineering Education (2015).Google ScholarCross Ref
- Farra, H. The reflective thought process: John Dewey re-visited. The Journal of Creative Behavior (Mar. 1988): https://doi-org.proxy.library.nyu.edu/10.1002/j.2162-6057.1988.tb01338.xGoogle Scholar
- Getzels, J. and Csikszentmihalyi, M. The Creative Vision: A Longitudinal Study of Problem Finding in Art. Wiley, New York, 1976.Google Scholar
- Giridharadas, A. Winners Take All: The Elite Charade of Changing the World. Knopf Doubleday Publishing Group, New York, 2018.Google Scholar
- Jonassen, D. Learning to Solve Problems: An Instructional Design Guide. Wiley, New York, 2003.Google Scholar
- McGuinness, T. and Slaughter, A. The new practice of public problem solving. Stanford Social Innovation Review (2019); https://ssir.org/articles/entry/the_new_practice_of_public_problem_solving#Google Scholar
- National Academies of Sciences, Engineering, and Medicine. The Growing Gap in Life Expectancy by Income: Implications for Federal Programs and Policy Responses. The National Academies Press, Washington DC, 2015 Google ScholarCross Ref
- Noveck, B. Smart Citizens, Smarter State: The Technologies of Expertise and the Future of Governing. Harvard University Press, Cambridge, 2015.Google Scholar
- Savin-Baden, M. The problem-based learning landscape. Planet (2001) Google ScholarCross Ref
Index Terms
- Public entrepreneurship and policy engineering
Recommendations
A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds
Ciphertext-policy attribute-based proxy re-encryption CP-ABPRE extends the traditional Proxy Re-Encryption PRE by allowing a semi-trusted proxy to transform a ciphertext under an access policy to another ciphertext with the same plaintext under a new ...
Securely combining public-key cryptosystems
CCS '01: Proceedings of the 8th ACM conference on Computer and Communications SecurityIt is a maxim of sound computer-security practice that a cryptographic key should have only a single use. For example, an RSA key pair should be used only for public-key encryption or only for digital signatures, and not for both.In this paper we show ...
Policy-controlled signatures and their applications
In this paper, we present a new cryptographic primitive called "policy-controlled signatures". In this notion, a signer can sign a message and attach it with some policies. Only a verifier who satisfies the policies attached can verify the authenticity ...
Comments