10 resultados para Restrictive convenants
em Digital Commons at Florida International University
Resumo:
This dissertation presents an analysis of the impacts of trade policy reforms in Sri Lanka. A Computable General Equilibrium (CGE) model is constructed with detailed description of the domestic production structure and foreign trade. The model is then used to investigate the effects of trade policy reforms on resource allocation and welfare.^ Prior to 1977, Sri Lanka maintained stringent control over its imports through rigid quantitative restrictions. A new economic policy reform package was introduced in 1977, and it shifted Sri Lanka's development strategy toward an export oriented policy regime. The shift of policy focus from a restrictive trade regime toward a more open trade regime is expected to have a significant impact on the volume of external trade, domestic production structure, allocation of resources, and social welfare.^ Simulations are carried out to assess the effects of three major policy reforms: (1) a devaluation of the Sri Lanka rupee, (2) a partial or a complete elimination of export duties, and (3) a devaluation-cum-removal of export duties.^ Simulation results indicate that the macroeconomic impact of a devaluation-cum-removal of export duties can be substantial. They also suggest that the resource-pull effects of a devaluation and a devaluation-cum-export duty removal policy are significant. However, the model shows that a devaluation combined with an export duty reduction is likely to be a superior strategy. ^
Resumo:
Database design is a difficult problem for non-expert designers. It is desirable to assist such designers during the problem solving process by means of a knowledge based (KB) system. A number of prototype KB systems have been proposed, however there are many shortcomings. Few have incorporated sufficient expertise in modeling relationships, particularly higher order relationships. There has been no empirical study that experimentally tested the effectiveness of any of these KB tools. Problem solving behavior of non-experts, whom the systems were intended to assist, has not been one of the bases for system design. In this project a consulting system for conceptual database design that addresses the above short comings was developed and empirically validated.^ The system incorporates (a) findings on why non-experts commit errors and (b) heuristics for modeling relationships. Two approaches to knowledge base implementation--system restrictiveness and decisional guidance--were used and compared in this project. The Restrictive approach is proscriptive and limits the designer's choices at various design phases by forcing him/her to follow a specific design path. The Guidance system approach which is less restrictive, provides context specific, informative and suggestive guidance throughout the design process. The main objectives of the study are to evaluate (1) whether the knowledge-based system is more effective than a system without the knowledge-base and (2) which knowledge implementation--restrictive or guidance--strategy is more effective. To evaluate the effectiveness of the knowledge base itself, the two systems were compared with a system that does not incorporate the expertise (Control).^ The experimental procedure involved the student subjects solving a task without using the system (pre-treatment task) and another task using one of the three systems (experimental task). The experimental task scores of those subjects who performed satisfactorily in the pre-treatment task were analyzed. Results are (1) The knowledge based approach to database design support lead to more accurate solutions than the control system; (2) No significant difference between the two KB approaches; (3) Guidance approach led to best performance; and (4) The subjects perceived the Restrictive system easier to use than the Guidance system. ^
Resumo:
If we classify variables in a program into various security levels, then a secure information flow analysis aims to verify statically that information in a program can flow only in ways consistent with the specified security levels. One well-studied approach is to formulate the rules of the secure information flow analysis as a type system. A major trend of recent research focuses on how to accommodate various sophisticated modern language features. However, this approach often leads to overly complicated and restrictive type systems, making them unfit for practical use. Also, problems essential to practical use, such as type inference and error reporting, have received little attention. This dissertation identified and solved major theoretical and practical hurdles to the application of secure information flow. ^ We adopted a minimalist approach to designing our language to ensure a simple lenient type system. We started out with a small simple imperative language and only added features that we deemed most important for practical use. One language feature we addressed is arrays. Due to the various leaking channels associated with array operations, arrays have received complicated and restrictive typing rules in other secure languages. We presented a novel approach for lenient array operations, which lead to simple and lenient typing of arrays. ^ Type inference is necessary because usually a user is only concerned with the security types for input/output variables of a program and would like to have all types for auxiliary variables inferred automatically. We presented a type inference algorithm B and proved its soundness and completeness. Moreover, algorithm B stays close to the program and the type system and therefore facilitates informative error reporting that is generated in a cascading fashion. Algorithm B and error reporting have been implemented and tested. ^ Lastly, we presented a novel framework for developing applications that ensure user information privacy. In this framework, core computations are defined as code modules that involve input/output data from multiple parties. Incrementally, secure flow policies are refined based on feedback from the type checking/inference. Core computations only interact with code modules from involved parties through well-defined interfaces. All code modules are digitally signed to ensure their authenticity and integrity. ^
Resumo:
FDI is believed to be a conduit of new technologies between countries. The first chapter of this dissertation studies the advantages of outward FDI for the home country of multinationals conducting research and development abroad. We use patent citations as a proxy for technology spillovers and we bring empirical evidence that supports the hypothesis that a U.S. subsidiary conducting research and development overseas facilitates the flow of knowledge between its host and home countries.^ The second chapter examines the impact of intellectual property rights (IPR) reforms on the technology flows between the U.S. and host countries of U.S. affiliates. We again use patent citations to examine whether the diffusion of new technology between the host countries and the U.S. is accelerated by the reforms. Our results suggest that the reforms favor innovative efforts of domestic firms in the reforming countries rather than U.S. affiliates efforts. In other words, reforms mediate the technology flows from the U.S. to the reforming countries.^ The third chapter deals with another form of IPR, open source (OS) licenses. These differ in the conditions under which licensors and OS contributors are allowed to modify and redistribute the source code. We measure OS project quality by the speed with which programming bugs are fixed and test whether the license chosen by project leaders influences bug resolution rates. In initial regressions, we find a strong correlation between the hazard of bug resolution and the use of highly restrictive licenses. However, license choices are likely to be endogenous. We instrument license choice using (i) the human language in which contributors operate and (ii) the license choice of the project leaders for a previous project. We then find weak evidence that restrictive licenses adversely affect project success.^
Resumo:
The number of students identified as having autism increased by 500% in the past 10 years (United States Government Accountability Office, 2005). All students with disabilities are required to be placed in least restrictive environments and to be given access to the general curriculum in the major subjects of math, reading, writing, and science as mandated by federal legislation such as the Individuals with Disabilities Education Act (IDEA, 2004) and No Child Left Behind (NCLB, 2001). As a result of this legislation, an increasing number of students with autism are being educated in inclusive classrooms. Most studies on general education access and curriculum modifications and/or instructional accommodations center on students with intellectual disabilities (e.g. Soukup, Wehmeyer, Bashinski, & Boviard, 2007; Wehmeyer, Lattin, Lapp-Rincker, & Agran, 2003). Wehmeyer et al. (2003) and Soukup et al. (2007) found included students with intellectual disabilities had more access to the general curriculum than mostly self-contained students. This meant included students were more likely to be working on the general curriculum as mandated by NCLB than those in only self-contained classrooms. This study builds and expands the research of Wehmeyer et al., as well as Soukup et al., by examining how students with autism are given access to the general curriculum through curriculum modifications and instructional accommodations used by general education teachers in three schools. This investigation focused on nine inclusive classrooms for students with autism using a parallel mixed methods design (Newman, Newman, & Newman, 2011). Classroom observations using both an IEP related checklist and field notes, teacher interviews, an archival document review of the Individual Education Plan (IEP) for the selected students with autism were performed. Findings of this study were organized by interview questions and subsequent coding categories. Quantitative data were organized in a nominal scale. Participants asserted that their middle school students with autism functioned well in their classrooms, occasionally exhibiting behavioral differences. Most instructional accommodations on IEPs were being implemented by participants, and participants often provided additional instructional accommodations not mandated by the IEP. The majority of participants credited county workshops for their knowledge of instructional accommodations.
Resumo:
Black students, in general, are underserved academically (Darling-Hammond, 2000; Townsend, 2002) and overrepresented in special education (Donovan & Cross, 2002). Black students with disabilities are further overrepresented in more restrictive educational environments (Skiba, Poloni-Staudinger, Gallini, Simmons & Feggins-Azziz, 2006). Although the National Longitudinal Transition Study 2 (NLTS2) revealed that the academic performance of students with learning disabilities is positively related to the percentage of courses taken in the general education setting (Newman, 2006), the research specifically on placement of Black students with disabilities, particularly at the secondary level, as it relates to academic achievement is lacking. While previous studies have sought to determine which placement is better for students with disabilities, no study was found that specifically examined the impact of placement specific to Black students with specific learning disabilities (SLD) in urban settings (Fore, III, Hagan-Burke, Burke, Boon & Smith, 2008; Rea, McLaughlin & Walther-Thomas, 2002). This study examined educational placement, instructional best practices, and achievement gains of Black students with SLD in urban secondary settings using an ex post facto research design. Achievement, placement, and demographic data were collected and analyzed on approximately 314 Black eighth grade students with SLD. The Teacher Instructional Practices Survey was developed and used to collect and analyze data from the teachers of 78 of these students as it relates to instructional best practices. Results indicate no significant difference in reading but a significant difference in math gains of students served in inclusive settings as compared to resource settings with a small effect size. Also, no significant relationship was found between achievement gains and the reported use of instructional best practices. However, there was a relationship between educational placement and the use of instructional best practices. The results implied that there is a need for training with both general and special education teachers on instructional best practices for SWD and that there should be certain IEP team considerations when making placement decisions for this population of students with disabilities. It is recommended that future research in this area include classroom observations and factors other than test scores to measure growth in achievement.
Resumo:
In the article - Planning Buy-Sell Agreements In The Hospitality Industry - by John M. Tarras, Assistant Professor, School of Hotel, Restaurant and Institutional Management at Michigan State University, the author initially observes: “The vast majority of hospitality firms (restaurants, hotels, etc.) would be considered closely-held corporations. As such, they have unique planning problems compared to large, publicly-traded hospitality firms. One area of special concern to the closely-held hospitality firm is the planning and adoption of a buy-sell agreement.” The above thesis statement outlines the heart of the article; the buy-sell agreement in regard to smaller [closely held, as Tarras calls them] corporations. The theory is narrow and pro-active, spanning the gap between personal-to-corporate stock manipulations. “The primary purpose of a buy-sell agreement is to contribute to the orderly transfer of a shareholder's stock in a hospitality firm upon some future incident [typically retirement, withdrawal of a shareholder, disability, or death], as Tarras defines the concept. “The hospitality firm or the other shareholders would be committed to purchase the departing shareholder's stock at an agreed upon price and method, and to ensure that ample cash will be obtainable for such an impending sale. The buy-sell agreement provides a market for the shareholder or the shareholder's estate for the sale of otherwise illiquid stock,” the author further provides as canons of buy-sell agreements. In defining the buy-sell agreement with restrictive clauses, Tarras demonstrates, “…many closely-held hospitality firms desire to limit ownership to those individuals, either family or principal corporate employees, who are essential to the well-being of the firm.” Tarras says, another element of the buy-sell agreement is to furnish the departing shareholder with liquidity. “…there typically is some form of cash down payment with the remainder denoted by an interest-bearing promissory note [usually 5 to 15 years],” he informs. “The departing shareholders may require that the hospitality firm pledge the assets of the firm and that the remaining shareholders personally guarantee the promissory note.” “…the most frequent reason for establishing buy-sell agreements is for estate planning purposes,” Tarras says. There are tax advantages and liabilities for both the seller and buyer of stock via the buy-sell agreement, and the author enumerates many of these. One, big advantage of the buy-sell agreement is that it provides for the running of the company with a minimum of disruption through the stock-cash transition process, Tarras offers.
Resumo:
Protecting confidential information from improper disclosure is a fundamental security goal. While encryption and access control are important tools for ensuring confidentiality, they cannot prevent an authorized system from leaking confidential information to its publicly observable outputs, whether inadvertently or maliciously. Hence, secure information flow aims to provide end-to-end control of information flow. Unfortunately, the traditionally-adopted policy of noninterference, which forbids all improper leakage, is often too restrictive. Theories of quantitative information flow address this issue by quantifying the amount of confidential information leaked by a system, with the goal of showing that it is intuitively "small" enough to be tolerated. Given such a theory, it is crucial to develop automated techniques for calculating the leakage in a system. ^ This dissertation is concerned with program analysis for calculating the maximum leakage, or capacity, of confidential information in the context of deterministic systems and under three proposed entropy measures of information leakage: Shannon entropy leakage, min-entropy leakage, and g-leakage. In this context, it turns out that calculating the maximum leakage of a program reduces to counting the number of possible outputs that it can produce. ^ The new approach introduced in this dissertation is to determine two-bit patterns, the relationships among pairs of bits in the output; for instance we might determine that two bits must be unequal. By counting the number of solutions to the two-bit patterns, we obtain an upper bound on the number of possible outputs. Hence, the maximum leakage can be bounded. We first describe a straightforward computation of the two-bit patterns using an automated prover. We then show a more efficient implementation that uses an implication graph to represent the two- bit patterns. It efficiently constructs the graph through the use of an automated prover, random executions, STP counterexamples, and deductive closure. The effectiveness of our techniques, both in terms of efficiency and accuracy, is shown through a number of case studies found in recent literature. ^
Resumo:
Prostitution scandals stigmatize workers for their entire lives, but the politician involved is marred for only one news cycle. “White knight” feminists shame women for sexually catering to the patriarchy but talk from a place of economic privilege. Religious organizations engage in misguided attempts to “save” women who use the industry as a job. Exploitive policies aimed at curtailing sex work hurt the individuals who wish to practice safe sex for their own protection. In the guise of aiding sex workers, or saving them from themselves, those that would advocate for more restrictive policies ignore the ramifications of what these laws would entail.
Resumo:
Database design is a difficult problem for non-expert designers. It is desirable to assist such designers during the problem solving process by means of a knowledge based (KB) system. Although a number of prototype KB systems have been proposed, there are many shortcomings. Firstly, few have incorporated sufficient expertise in modeling relationships, particularly higher order relationships. Secondly, there does not seem to be any published empirical study that experimentally tested the effectiveness of any of these KB tools. Thirdly, problem solving behavior of non-experts, whom the systems were intended to assist, has not been one of the bases for system design. In this project, a consulting system, called CODA, for conceptual database design that addresses the above short comings was developed and empirically validated. More specifically, the CODA system incorporates (a) findings on why non-experts commit errors and (b) heuristics for modeling relationships. Two approaches to knowledge base implementation were used and compared in this project, namely system restrictiveness and decisional guidance (Silver 1990). The Restrictive system uses a proscriptive approach and limits the designer's choices at various design phases by forcing him/her to follow a specific design path. The Guidance system approach, which is less restrictive, involves providing context specific, informative and suggestive guidance throughout the design process. Both the approaches would prevent erroneous design decisions. The main objectives of the study are to evaluate (1) whether the knowledge-based system is more effective than the system without a knowledge-base and (2) which approach to knowledge implementation - whether Restrictive or Guidance - is more effective. To evaluate the effectiveness of the knowledge base itself, the systems were compared with a system that does not incorporate the expertise (Control). An experimental procedure using student subjects was used to test the effectiveness of the systems. The subjects solved a task without using the system (pre-treatment task) and another task using one of the three systems, viz. Control, Guidance or Restrictive (experimental task). Analysis of experimental task scores of those subjects who performed satisfactorily in the pre-treatment task revealed that the knowledge based approach to database design support lead to more accurate solutions than the control system. Among the two KB approaches, Guidance approach was found to lead to better performance when compared to the Control system. It was found that the subjects perceived the Restrictive system easier to use than the Guidance system.