898 resultados para Protection in Working
Resumo:
This report is part of a University of Oxford John Fell funded collaborative project: Informality and the Media in Consumer Protection in Emerging Economies. This pilot project seeks to shed light upon consumer complaint behaviour through social media in emerging economies.
Resumo:
This article examines child welfare workers' understanding of physical child abuse and the Implications for those supervising these workers. The article Is based on the results of a study that involved In-depth Interviews and focus groups with statutory child welfare workers. Analysis revealed that workers' understanding of physical child abuse embodied a wide range of ideas that were generally consistent with existing literature. The study highlights the value and utility of a reflective approach In stimulating and making explicit the theoretical underpinnings of child welfare workers practice. Specific Implications for professional supervision are addressed.
Resumo:
In this paper, a method for enhancing current QoS routing methods by means of QoS protection is presented. In an MPLS network, the segments (links) to be protected are predefined and an LSP request involves, apart from establishing a working path, creating a specific type of backup path (local, reverse or global). Different QoS parameters, such as network load balancing, resource optimization and minimization of LSP request rejection should be considered. QoS protection is defined as a function of QoS parameters, such as packet loss, restoration time, and resource optimization. A framework to add QoS protection to many of the current QoS routing algorithms is introduced. A backup decision module to select the most suitable protection method is formulated and different case studies are analyzed
Resumo:
In this paper, a method for enhancing current QoS routing methods by means of QoS protection is presented. In an MPLS network, the segments (links) to be protected are predefined and an LSP request involves, apart from establishing a working path, creating a specific type of backup path (local, reverse or global). Different QoS parameters, such as network load balancing, resource optimization and minimization of LSP request rejection should be considered. QoS protection is defined as a function of QoS parameters, such as packet loss, restoration time, and resource optimization. A framework to add QoS protection to many of the current QoS routing algorithms is introduced. A backup decision module to select the most suitable protection method is formulated and different case studies are analyzed
Resumo:
This paper analyses the equilibrium structure of protection in Mercosul, developing empirical analyses based on the literature ensuing from the sequence of models set forth by Grossman and Helpman since 1994. Not only Mercosul’s common external tariff (CET) may be explained under a political economy perspective, but the existence of deviations, both at the level of the external tariffs and at that of the internal ones, make it interesting to contrast several structures under this approach. Different general equilibrium frameworks, in which governments are concerned with campaign contributions and with the welfare of the average voter, while organized special-interest groups care only about the welfare of their members, are used as the theoretical basis of the empirical tests. We build a single equation for explaining the CET and two fourequations systems (one equation for each member) for explaining deviations from the CET and from the internal free trade between members. The results (at the two-digit level) shed an interesting light on the sectoral dynamics of protection in each country; notably, Brazil seems to fit in better in the model framework, followed by Uruguay. In the case of the CET, and of deviations from it, the interaction between the domestic lobbies in the four countries plays a major role. There is also suggestion that the lobby structure that bid for deviations, be they internal or external, differs from the one which bid for the CET.
Resumo:
Incluye Bibliografía
Resumo:
Establishing a fault-tolerant connection in a network involves computation of diverse working and protection paths. The Shared Risk Link Group (SRLG) [1] concept is used to model several types of failure conditions such as link, node, fiber conduit, etc. In this work we focus on the problem of computing optimal SRLG/link diverse paths under shared protection. Shared protection technique improves network resource utilization by allowing protection paths of multiple connections to share resources. In this work we propose an iterative heuristic for computing SRLG/link diverse paths. We present a method to calculate a quantitative measure that provides a bounded guarantee on the optimality of the diverse paths computed by the heuristic. The experimental results on computing link diverse paths show that our proposed heuristic is efficient in terms of number of iterations required (time taken) to compute diverse paths when compared to other previously proposed heuristics.