Results 81 to 90 of about 495,140 (349)

Aspect-Oriented Programming using Composition-Filters [PDF]

open access: yes, 1998
Software engineers may experience problems in modeling certain aspects while applying object-oriented techniques [4, 10, 11]. Composition-Filters are capable of expressing various different kinds of aspects in a uniform manner.
Aksit, Mehmet, Tekinerdogan, Bedir
core   +4 more sources

Assessment of suspected cadaver desecration and the role of forensic anthropology

open access: yesRevSALUS, 2022
José Carlos Silva   +4 more
doaj   +1 more source

Visit of Yugoslav president Josip Broz to Egypt (28. 12. 1955 - 06. 01. 1956) [PDF]

open access: yesBaština, 2018
The trip of the Yugoslav delegation to Egypt took place at the end of December 1955. It was a demanding diplomatic campaign. In the course of ten-day stay in the country situated on the Nile River, Josip Broz Tito had several conversations with Gamal ...
Živković Milutin D.
doaj  

Dimensions of the AI Divide: Digital Inequality and Psychological Consequences

open access: yesAI &Innovation, EarlyView.
ABSTRACT Artificial intelligence (AI) has become a foundational component of contemporary social, economic, and political life. Yet, the ways in which AI reshapes patterns of exclusion beyond questions of access and technical capability remain insufficiently theorized.
Christos Papaioannou
wiley   +1 more source

Causal analysis of trade loss from pathogens: A global study of foot and mouth disease impacts on meat exports

open access: yesAmerican Journal of Agricultural Economics, EarlyView.
Abstract Our general interest is in global trade loss from livestock pathogens, specifically exports. We adopt a causal inference approach that considers animal disease outbreaks over time as non‐staggered binary treatments with the potential for switching in (infection) and out of treatment (recovery) within the sample period. The outcome evolution of
Mohammad Maksudur Rahman   +1 more
wiley   +1 more source

SoK: Delegation and Revocation, the Missing Links in the Web's Chain of Trust

open access: yesEuropean Symposium on Security and Privacy, 2019
The ability to quickly revoke a compromised key is critical to the security of any public-key infrastructure. Regrettably, most traditional certificate revocation schemes suffer from latency, availability, or privacy problems.
L. Chuat   +5 more
semanticscholar   +1 more source

Arm’s Length Provision of Public Services [PDF]

open access: yes
We analyze the economic consequences of strategic delegation of the right to decide between public or private provision of governmental service and/or the authority to negotiate and renegotiate with the chosen service provider.
Christian Schultz, Morten Bennedsen
core  

‘The Other Parent’: A Critical Policy Analysis of Fatherhood Discourses in the Australian Government's Paid Parental Leave Scheme

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT The Australian paid parental leave (PPL) government scheme aims to support working parents through financial assistance and the promotion of gender equality in caregiving responsibilities. However, the scheme's implementation has been critiqued for its gendered design, which marginalises fathers and reinforces traditional gender roles.
Lily Lewington   +2 more
wiley   +1 more source

Understanding Delegation Through Machine Learning: A Method and Application to the European Union

open access: yesAmerican Political Science Review, 2019
Delegation of powers represents a grant of authority by politicians to one or more agents whose powers are determined by the conditions in enabling statutes.
L. Anastasopoulos   +3 more
semanticscholar   +1 more source

How Delegation Improves Commitment [PDF]

open access: yes
We often use delegation as a commitment device if a government faces problems of timeinconsistency. McCallum (1995, AER P&P) challenged this practice, claiming that delegation merely relocates the commitment problem but does not solve it.
Grischa Perino
core  

Home - About - Disclaimer - Privacy