internal sorting
Recently Published Documents


TOTAL DOCUMENTS

24
(FIVE YEARS 1)

H-INDEX

5
(FIVE YEARS 0)

2019 ◽  
Vol 18 (4) ◽  
pp. 631-645
Author(s):  
Siobhan O’Sullivan ◽  
Michael McGann ◽  
Mark Considine

A key question concerning the marketisation of employment services is the interaction between performance management systems and frontline client-selection practices. While the internal sorting of clients for employability by agencies has received much attention, less is known about how performance management shapes official categorisation practices at the point of programme referral. Drawing on case studies of four Australian agencies, this study examines the ways in which frontline staff contest how jobseekers are officially classified by the benefit administration agency. With this assessment pivotal in determining payment levels and activity requirements, we find that reassessing jobseekers so they are moved to a more disadvantaged category, suspended, or removed from the system entirely have become major elements of casework. These category manoeuvres help to protect providers from adverse performance rankings. Yet, an additional consequence is that jobseekers are rendered fully or partially inactive, within the context of a system designed to activate.


2015 ◽  
Vol 88 (1-2) ◽  
pp. 3-20 ◽  
Author(s):  
Dwayne D. Hegedus ◽  
Cathy Coutu ◽  
Myrtle Harrington ◽  
Brad Hope ◽  
Kelsey Gerbrandt ◽  
...  

Author(s):  
Aneel Rahim ◽  
Zeeshan Shafi Khan ◽  
Fahad Bin Muhaya ◽  
Muhammad Sher ◽  
Muhammad Khurram Khan

Relevance Technique broadcast the useful information and removes the redundant data. 802.11e protocol implementation has certain flaws and is not suitable for VANETs scenarios. Main issue in 802.11e protocol is internal sorting of packets, no priority mechanism within the queues and often lower priority traffic get more medium than high priority traffic. In this paper, the mathematical model of relevance scheme is enhanced so that it can consider the network control in real scenario by considering the impact of malicious node in network. Problems of 802.11e protocol can be resolved by making virtual queue at application level. We analyze the comparison of simple virtual queue with the over all impact of virtual queue and mathematical model. Similarly we compare the mathematical model with over all impact of virtual queue and modified mathematical model using NS-2 simulator.


1996 ◽  
Author(s):  
Al Beechick ◽  
Steve Casselman ◽  
Lynn D. Yarbrough
Keyword(s):  

1989 ◽  
Vol 11 (1) ◽  
pp. 117-119 ◽  
Author(s):  
J Moscinski ◽  
Z.A Rycerz ◽  
P.W.M Jacobs

Sign in / Sign up

Export Citation Format

Share Document