2015
DOI: 10.1177/2158244015581554
|View full text |Cite
|
Sign up to set email alerts
|

The Impacts of Worktime Control in Context

Abstract: This article examines the relationships between workers' control over their working time and their well-being, looking at how these relationships differ across a set of health care occupations that are stratified by class, gender, and race (physicians, nurses, emergency medical technicians [EMTs], and certified nursing assistants [CNAs]). Across occupations, workers' ability to control their schedules decreases their job-related stress. The results show that different dimensions of worktime control (WTC) affec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(11 citation statements)
references
References 65 publications
(88 reference statements)
0
11
0
Order By: Relevance
“…Note that Conjecture 1.2 says that the peak location is between 0.5n and roughly 0.5528n . Computations on Sage [10,11] confirm this conjecture for all trees of order at most 20. In this section we show that the peak location is at most 0.6667n for all trees of order n, and at least n−2 1+d for a tree of diameter d and order n. Furthermore, the upper bound we establish is better for a "star-like" tree, that is, when the tree has a high fraction of the number of paths of length 2 in a star (which attains the maximum possible number of paths of length 2).…”
Section: Bounds On the Peak Locationmentioning
confidence: 74%
“…Note that Conjecture 1.2 says that the peak location is between 0.5n and roughly 0.5528n . Computations on Sage [10,11] confirm this conjecture for all trees of order at most 20. In this section we show that the peak location is at most 0.6667n for all trees of order n, and at least n−2 1+d for a tree of diameter d and order n. Furthermore, the upper bound we establish is better for a "star-like" tree, that is, when the tree has a high fraction of the number of paths of length 2 in a star (which attains the maximum possible number of paths of length 2).…”
Section: Bounds On the Peak Locationmentioning
confidence: 74%
“…By SageMath [12], we have check that the result holds in (3.11) for n = 5, 6 with − δ ≤ 3. This completes the proof.…”
Section: Thus We Have G(x)mentioning
confidence: 91%
“…Our attack is implemented using the Sage computer algebra system [50]. We took 0x5AFEBADA55ECC5AFEBADA55ECC5AFEBADA55ECC5AFEBADA55ECC5AFEBADA55EC as the start value for b and incremented b until we found a curve that meets the public security criteria.…”
Section: Methodsmentioning
confidence: 99%
“…We now switch from considering rho attacks against arbitrary curves to considering twist attacks against curves with cofactor 1. For a twist attack to fit into 2 50 elliptic-curve operations, the largest prime dividing p+1+t must be below 2 100 , but also the second-largest prime dividing p + 1 + t must be below 2 50 ; see generally [9]. In other words, p + 1 + t must be (2 100 , 2 50 )-semismooth.…”
Section: Ecc Security Vs Ecdlp Securitymentioning
confidence: 99%