83 resultados para invocation


Relevância:

10.00% 10.00%

Publicador:

Resumo:

The thesis is first and foremost the examination of the notion and consequences of ‘state failure’ in international law. The disputes surrounding criteria for creation and recognition of states pertain to efforts to analyse legal and factual issues unravelling throughout the continuing existence of states, as best evidenced by the ‘state failure’ phenomenon. It is argued that although the ‘statehood’ of failed states remains uncontested, their sovereignty is increasingly considered to be dependent on the existence of effective governments. The second part of this thesis focuses on the examinations of the legal consequences of the continuing existence of failed states in the context of jus ad bellum. Since the creation of the United Nations the ability of states to resort to armed force without violating what might be considered as the single most important norm of international law, has been considerably limited. State failure and increasing importance of non-state actors has become a greatly topical issue within recent years in both scholarship and the popular imagination. There have been important legal developments within international law, which have provoked much academic, and in particular, legal commentary. On one level, the thesis contributes to this commentary. Despite the fact that the international community continues to perpetuate a notion of ‘statehood’ which allows the state-centric system of international law to exist, when dealing with practical and political realities of state failure, international law may no longer consider external sovereignty of states as an undeniable entitlement to statehood. Accordingly, the main research question of this thesis is whether the implicit and explicit invocation of the state failure provides sufficient legal basis for the intervention in self-defence against non-state actors in located in failed states. It has been argued that state failure has a profound impact, the extent of which is yet to be fully explored, on the modern landscape of peace and security.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

La invocación del ideal del mos maiorum, entendido como conjunto de virtudes o rasgos ejemplares de los romanos, ha sido estudiada repetidamente en los textos de Cicerón. Analiza el tópico en relación con la discusión en torno a la identidad romana en textos del siglo I a.C. y delimita tres empleos diferentes: uno al que define como típicamente aristocrático, referido a la ascendencia noble de un individuo en particular; un segundo uso que, en vez de individualizar, amalgama a todos los ancestros en un mismo conjunto y establece una continuidad entre pasado y presente; finalmente, una tercera modalidad que propone una ruptura total entre el mundo de los antepasados y el de los contemporáneos. En este trabajo indagaremos el funcionamiento de este tópico en De diuinatione y De natura deorum de Cicerón. Desde nuestro punto de vista, el ideal del mos maiorum no solamente involucra virtudes éticas y morales sino que también supone una especial actitud con respecto a los dioses y el culto que resulta central en la definición de la identidad romana.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Este trabalho apresenta um estudo de caso sobre Programação Orientada a Aspectos e uma comparação com a Programação Orientada a Objetos. O aplicativo utilizado para o estudo combina invocações remotas de métodos, utilizando o RMI (Remote Method Invocation) um protocolo de distribuição muito utilizado em programas que envolvam métodos ou objetos remotos. São abordadas as características básicas que norteiam a Programação Orientada a Aspectos, suas vantagens e desvantagens em relação à Orientação a Objetos e os resultados obtidos com a realização dos devidos testes pelas duas formas de programação propostas nesse estudo de caso.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Starting in December 1982 the University of Nottingham decided to phototypeset almost all of its examination papers `in house' using the troff, tbl and eqn programs running under UNIX. This tutorial lecture highlights the features of the three programs with particular reference to their strengths and weaknesses in a production environment. The following issues are particularly addressed: Standards -- all three software packages require the embedding of commands and the invocation of pre-written macros, rather than `what you see is what you get'. This can help to enforce standards, in the absence of traditional compositor skills. Hardware and Software -- the requirements are analysed for an inexpensive preview facility and a low-level interface to the phototypesetter. Mathematical and Technical papers -- the fine-tuning of eqn to impose a standard house style. Staff skills and training -- systems of this kind do not require the operators to have had previous experience of phototypesetting. Of much greater importance is willingness and flexibility in learning how to use computer systems.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Public agencies are increasingly required to collaborate with each other in order to provide high-quality e-government services. This collaboration is usually based on the service-oriented approach and supported by interoperability platforms. Such platforms are specialized middleware-based infrastructures enabling the provision, discovery and invocation of interoperable software services. In turn, given that personal data handled by governments are often very sensitive, most governments have developed some sort of legislation focusing on data protection. This paper proposes solutions for monitoring and enforcing data protection laws within an E-government Interoperability Platform. In particular, the proposal addresses requirements posed by the Uruguayan Data Protection Law and the Uruguayan E-government Platform, although it can also be applied in similar scenarios. The solutions are based on well-known integration mechanisms (e.g. Enterprise Service Bus) as well as recognized security standards (e.g. eXtensible Access Control Markup Language) and were completely prototyped leveraging the SwitchYard ESB product.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Tämän tutkimuksen tavoitteena oli selvittää kuinka yrittäjän verkostot muodostuvat ja minkälainen niiden rakenne on. Tavoitteena oli myös saada tietoa yrittäjän sosiaalisten verkostojen merkityksestä yrittäjälle. Tutkimus toteutettiin laadullisena tutkimuksena. Tutkimusaineisto kerättiin strukturoidulla haastattelulla ja tutkimusaineiston rinnalla käytettiin yrittäjien havainnollistamia piirroksia sekä tieteellisiä julkaisuja ja kirjallisuutta. Haastateltavina oli sekä nais- että miesyrittäjiä eri paikkakunnilta Etelä-Suomen alueelta. Tutkimustulosten mukaan yrittäjien verkostoissa voidaan havaita eri tasoja, jotka rakentuvat eri tavoilla ja ovat yrittäjälle merkitykseltään erilaisia. Verkoston eri tasoille sijoittuu yrittäjälle tärkeitä ihmisiä sen mukaan mitä hyötyä ja arvoa heillä yrittäjälle on. Tulokset osoittavat, että verkostojen rakentamiseen vaikuttavat sekä liiketoiminnan laatu, motiivit sekä yrittäjän persoona. Tulokset ovat linjassa tämän tutkimuksen perustana olevien teorioiden kanssa. Viitteitä löytyy myös siitä, että yrittäjän sukupuolella on myös merkitystä siihen, millaiseksi sosiaaliset verkostot rakentuvat sekä henkilökohtaisessa elämässä että liike-elämän puolella. Sosiaalisista verkostoista saatavat hyödyt ovat moninaisia. Lisätutkimuksia tulisi tehdä tehokkaiden työkalujen kehittämiseksi henkilöstön ja yrittäjän omien resurssien tunnistamiseksi. Tätä kautta myös yrittäjyyskasvatusta ja yrittäjäneuvontaa voitaisiin tehostaa.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dissertação (mestrado)—Universidade de Brasília, Instituto de Psicologia, Departamento de Psicologia Clínica, Programa de Pós-Graduação em Psicologia Clínica e Cultura, 2015.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Recent years have witnessed a growing interest in context-aware recommender system (CARS), which explores the impact of context factors on personalized Web services recommendation. Basically, the general idea of CARS methods is to mine historical service invocation records through the process of context-aware similarity computation. It is observed that traditional similarity mining process would very likely generate relatively big deviations of QoS values, due to the dynamic change of contexts. As a consequence, including a considerable amount of deviated QoS values in the similarity calculation would probably result in a poor accuracy for predicting unknown QoS values. In allusion to this problem, this paper first distinguishes two definitions of Abnormal Data and True Abnormal Data, the latter of which should be eliminated. Second, we propose a novel CASR-TADE method by incorporating the effectiveness of True Abnormal Data Elimination into context-aware Web services recommendation. Finally, the experimental evaluations on a real-world Web services dataset show that the proposed CASR-TADE method significantly outperforms other existing approaches.