975 resultados para Canon law (Pre-code)
Resumo:
Este documento trata de: aspectos conceituais da lei: finalidade, import??ncia e hierarquia da lei.; no????es gerais da lei de licita????es - Lei n?? 8.666/93; tipos de licita????o:menor pre??o, melhor t??cnica, t??cnica e pre??o e maior lance ou oferta; modalidades de licita????o: concorr??ncia, tomada de pre??os, convite, concurso e leil??o; exce????es ?? obrigatoriedade de licita????o: dispensa e inexigibilidade; regime de execu????o indireta; comiss??o de licita????o; etapas do processo licitat??rio: edital, procedimentos/documentos do certame, registro cadastral, habilita????o dos interessados, julgamento e encerramento; preg??o; registro de pre??os
Resumo:
Este documento trata de: aspectos conceituais da lei: finalidade, import??ncia e hierarquia da lei; no????es gerais da lei de licita????es - Lei n?? 8.666/93; tipos de licita????o:menor pre??o, melhor t??cnica, t??cnica e pre??o e maior lance ou oferta; modalidades de licita????o: concorr??ncia, tomada de pre??os, convite, concurso e leil??o; exce????es ?? obrigatoriedade de licita????o: dispensa e inexigibilidade; regime de execu????o indireta; comiss??o de licita????o; etapas do processo licitat??rio: edital, procedimentos/documentos do certame, registro cadastral, habilita????o dos interessados, julgamento e encerramento; preg??o; registro de pre??os
Resumo:
Este documento trata de: aspectos conceituais da lei: finalidade, import??ncia e hierarquia da lei; no????es gerais da lei de licita????es - Lei n?? 8.666/93; tipos de licita????o:menor pre??o, melhor t??cnica, t??cnica e pre??o e maior lance ou oferta; modalidades de licita????o: concorr??ncia, tomada de pre??os, convite, concurso e leil??o; exce????es ?? obrigatoriedade de licita????o: dispensa e inexigibilidade; regime de execu????o indireta; comiss??o de licita????o; etapas do processo licitat??rio: edital, procedimentos/documentos do certame, registro cadastral, habilita????o dos interessados, julgamento e encerramento; preg??o; registro de pre??os
Resumo:
The edification of the landscape in the scientific and social field, in speech as in the method, is taken in this study as a complex process, from which were developed relationships of dominance on the perception of space, which persist strongly consolidated, since the genesis of the conceptual practice till its actual praxis. Historically, the landscape studies took place slowly, immersed in many questions, in face of the multiplicity of meanings that the concept offers. In the psyche, the notion of landscape is present since a long time ago, as an unconscious human being practice, even before any ideological hypothesis formulation. However its materialization in the social conscious will come only from painting, and specially with the perspective, through the technicity of the view, at first wandering the infinity, now ordained in a frame‟. Since then, the landscape is perceived according to the order of the view, as the equivalent of nature and beauty, assuming at the same time, an important symbolic value, since it is linked to mnemonic and subjective processes that the being build with the territory. The domain on this space-cognitive experience, characteristic of the contemporary, consolidates in the social imaginary, building consensus on the landscape, whose aesthetic references make a cultural appeal, very pertinent to the actual capitalist dynamics of production the space worldwide, mainly of the spectacle and commodification of cities promoted by the city marketing. In Brazil, this consensual ideology of the landscape surpass the social imaginary and also dominates the political imaginary, whereas the main instrument for preserving the landscape, Decree-law 25, from November 30, 1937, and its limit to those of exceptional value or remarkable feature. The analysis of the processes for putting under governmental trust for inscription of goods by the landscape value, reveals the dominant, if not exclusive, adoption of selection criteria related to aesthetic aspects. Abstain, therefore, from what the nation considers patrimony , other landscapes that, besides not having, at first, remarkable aesthetic value, play a crucial role as an inheritance from ancestor relations between man and space and pre- existing condition for the same present and future relations. From this historical background, the research seeks to transfer into contemporaneity, the ideological analysis of the concept and its relation with the building of the landscape in the collective imaginary, in order to recognize, in current practices to landscape preservation, as much this genesis, rooted in aesthetics, remains strongly consolidated, feeding the current dynamics of consumption and commodification of the city. Therefore, as preliminary conclusion, one can state that the identification of landscapes of different value, especially aesthetic, maintains and intensify the treatment of the city as an object, a standard‟ commodity to be sold / traded on the world market, in detriment of its recognition as a dynamic process that, even though inserted in the global context, develops specificifities and peculiarities, inherent to the production of space, as Lefebvre preconizes, that is, to the production of life, social product , as characteristic, dissent generator
Resumo:
The article attempt to demonstrate the evolution of international law in connected to the subject of the forced immigrants'. The author supported by several texts, cases and resolutions of the regional level, through interamerican court and European court, and the global level, through the international court. It's shown the evolution that occurred in international law in millennium turn over, which recognize the immigrants' rights. However, it's stressed the necessity of the development of those laws connected to the theme e the recognition, from the States; the importance of law's that effort to ensure the respect to human rights relative to the immigrants and their families.
Resumo:
As with any variety of rice, red rice characteristics are subject to varietal differences, growing conditions, types of processing, and nutritional and rheological properties. This study determined the nutritional characteristics (centesimal composition and minerals) and paste viscosity properties of raw grains of four red rice genotypes (Tradicional MNAPB0405, MNACE0501 and MNACH0501) and the paste viscosity properties of pre-gelatinized flours obtained at different cooking times (20, 30 and 40 min). The main nutritional properties were correlated with the pasting properties of the pre-gelatinized flours. The samples showed differences in nutritional properties and paste viscosity. MNAPB0405 and MNACE0501 showed higher levels of fiber and fat and provided higher caloric energy than Tradicional and MNACH0501, which, in turn, showed higher levels of amylose. MNACH0501 showed higher peak viscosity (2402 cP), higher breakdown viscosity (696 cP) and a greater tendency to retrogradation (1510 cP), while Tradicional, MNAPB0405 and MNACE0501 had pasting profiles with peak viscosities varying between 855 and 1093 cP, breaking viscosity below 85 cP and retrogradation tendency between 376 and 1206 cP. The factors genotype and cooking time influenced the rheological behavior of pre-gelatinized flours, decreasing their pasting properties. The protein and amylose levels are correlated with the pasting properties and can be used as indicators of these properties in different genotypes of red rice, whether raw or processed into pre-gelatinized flours.
Resumo:
Graphical user interfaces (GUIs) are critical components of todays software. Given their increased relevance, correctness and usability of GUIs are becoming essential. This paper describes the latest results in the development of our tool to reverse engineer the GUI layer of interactive computing systems. We use static analysis techniques to generate models of the user interface behaviour from source code. Models help in graphical user interface inspection by allowing designers to concentrate on its more important aspects. One particularly type of model that the tool is able to generate is state machines. The paper shows how graph theory can be useful when applied to these models. A number of metrics and algorithms are used in the analysis of aspects of the user interface's quality. The ultimate goal of the tool is to enable analysis of interactive system through GUIs source code inspection.
Resumo:
When developing interactive applications, considering the correctness of graphical user interfaces (GUIs) code is essential. GUIs are critical components of today's software, and contemporary software tools do not provide enough support for ensuring GUIs' code quality. GUIsurfer, a GUI reverse engineering tool, enables evaluation of behavioral properties of user interfaces. It performs static analysis of GUI code, generating state machines that can help in the evaluation of interactive applications. This paper describes the design, software architecture, and the use of GUIsurfer through an example. The tool is easily re-targetable, and support is available to Java/Swing, and WxHaskell. The paper sets the ground for a generalization effort to consider rich internet applications. It explores the GWT web applications' user interface programming toolkit.
Resumo:
Graphical user interfaces (GUIs) are critical components of today's software. Developers are dedicating a larger portion of code to implementing them. Given their increased importance, correctness of GUIs code is becoming essential. This paper describes the latest results in the development of GUISurfer, a tool to reverse engineer the GUI layer of interactive computing systems. The ultimate goal of the tool is to enable analysis of interactive system from source code.
Resumo:
More and more current software systems rely on non trivial coordination logic for combining autonomous services typically running on different platforms and often owned by different organizations. Often, however, coordination data is deeply entangled in the code and, therefore, difficult to isolate and analyse separately. COORDINSPECTOR is a software tool which combines slicing and program analysis techniques to isolate all coordination elements from the source code of an existing application. Such a reverse engineering process provides a clear view of the actually invoked services as well as of the orchestration patterns which bind them together. The tool analyses Common Intermediate Language (CIL) code, the native language of Microsoft .Net Framework. Therefore, the scope of application of COORDINSPECTOR is quite large: potentially any piece of code developed in any of the programming languages which compiles to the .Net Framework. The tool generates graphical representations of the coordination layer together and identifies the underlying business process orchestrations, rendering them as Orc specifications
Resumo:
A large and growing amount of software systems rely on non-trivial coordination logic for making use of third party services or components. Therefore, it is of outmost importance to understand and capture rigorously this continuously growing layer of coordination as this will make easier not only the veri cation of such systems with respect to their original speci cations, but also maintenance, further development, testing, deployment and integration. This paper introduces a method based on several program analysis techniques (namely, dependence graphs, program slicing, and graph pattern analysis) to extract coordination logic from legacy systems source code. This process is driven by a series of pre-de ned coordination patterns and captured by a special purpose graph structure from which coordination speci cations can be generated in a number of di erent formalisms
Resumo:
Resumo: 1 – Introdução; 2 – Breve nota de Criminologia e Política Criminal no que diz respeito ao papel das polícias perante a teoria da discricionariedade no contexto do problema da corrupção, igualmente económica e social; 3 - O problema da «corrupção», sobretudo no seio do Direito penal económico e social: o caso da importância da empresa; 4 – Algumas pré-conclusões sobre a dificuldade de imputar crimes, nomeadamente crimes de corrupção, às «empresas»; 5 – Conclusão. § Abstract: 1 - Introduction 2 - a brief note of Criminology and Criminal Policy in relation to the role of the police before the theory of discretion in the context of the problem of corruption, also economic and social development; 3 - the problem of the «corruption», especially within the social and economic criminal law: the case of the importance of the company; 4 - Some pre-conclusions about the difficulty of attributing crimes, including crimes of corruption, the «companies», 5 - Conclusion.
Resumo:
Abstract: in Portugal, and in much of the legal systems of Europe, «legal persons» are likely to be criminally responsibilities also for cybercrimes. Like for example the following crimes: «false information»; «damage on other programs or computer data»; «computer-software sabotage»; «illegitimate access»; «unlawful interception» and «illegitimate reproduction of protected program». However, in Portugal, have many exceptions. Exceptions to the «question of criminal liability» of «legal persons». Some «legal persons» can not be blamed for cybercrime. The legislature did not leave! These «legal persons» are v.g. the following («public entities»): legal persons under public law, which include the public business entities; entities utilities, regardless of ownership; or other legal persons exercising public powers. In other words, and again as an example, a Portuguese public university or a private concessionaire of a public service in Portugal, can not commit (in Portugal) any one of cybercrime pointed. Fair? Unfair. All laws should provide that all legal persons can commit cybercrimes. PS: resumo do artigo em inglês.
Resumo:
Resumo: 1 – Sumário do Acórdão do Supremo Tribunal de Justiça, de 13 de Abril de 2011; 2 – Texto completo do Acórdão do Supremo Tribunal de Justiça, de 13 de Abril de 2009, Juiz Conselheiro Rodrigues da COSTA (Relator), Juiz Conselheiro Arménio SOTTOMAYOR (vencido nos termos da declaração junta) e Juiz Conselheiro Mota MIRANDA: cfr. http://www.dgsi.pt , 26 de Abril de 2011; 3 – Anotação; 3.1 – Introdução à anotação; 3.2 – A questão do suposto «bem jurídico» que seria tutelado pelo crime de «lenocínio» p.p.p.p.p. 169.º do código penal português; 3.2.1 – Ainda a questão do suposto «bem jurídico» que seria tutelado pelo crime de «lenocínio» p.p.p.p.p. 169.º do código penal português: uma maior procura e concretização jurídica e científica; 4 – Conclusões; § Abstract: 1 - Summary of the Sentence of the Supreme Court of Justice, 13 of April of 2011; 2 - Complete text of the Sentence of the Supreme Court of Justice, 13 of April of 2009, Advising Judge Rodrigues da COSTA (Reporter), Advising Judge Arménio SOTTOMAYOR (looser in the terms of the together declaration) and Advising Judge Mota MIRANDA: cfr. http://www.dgsi.pt , 26 of April of 2011; 3 - Notation; 3.1 - Introduction to the notation; 3.2 - The question of the presumption «legally protected interest» that would be tutored person for the crime of «pimpery (“pimping”)» p.p.p.p.p. 169.º of the Portuguese criminal code; 3.2.1 - Still the question of the presumption «legally protected interest» that would be tutored person for the crime of «pimpery» («pimping») p.p.p.p.p. 169.º of the Portuguese criminal code: a bigger search and legal and scientific concretion; 4 - Conclusions;
Resumo:
Current software development relies increasingly on non-trivial coordination logic for com- bining autonomous services often running on di erent platforms. As a rule, however, in typical non-trivial software systems, such a coordination layer is strongly weaved within the application at source code level. Therefore, its precise identi cation becomes a major methodological (and technical) problem which cannot be overestimated along any program understanding or refactoring process. Open access to source code, as granted in OSS certi cation, provides an opportunity for the devel- opment of methods and technologies to extract, from source code, the relevant coordination information. This paper is a step in this direction, combining a number of program analysis techniques to automatically recover coordination information from legacy code. Such information is then expressed as a model in Orc, a general purpose orchestration language