991 resultados para unconditional guarantees


Relevância:

20.00% 20.00%

Publicador:

Resumo:

"August 23, 1993."

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Shipping list no.: 2004-0272-P/CORRECTION.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

"Jan. 1979".

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The effects of unconditional stimulus (US) valence (aversive electro-tactile stimulus vs. nonaversive imperative stimulus of a RT task) and conditioning paradigm (delay vs. trace) on affective learning as indexed by verbal ratings of conditional stimulus (CS) pleasantness and blink startle modulation and on relational learning as indexed by electrodermal responses were investigated. Affective learning was not affected by the conditioning paradigm; however, electrodermal responses and blink latency shortening indicated delayed learning in the trace procedure. Changes in rated CS pleasantness were found with the aversive US, but not with the non-aversive US. Differential conditioning as indexed by electrodermal responses and startle modulation was found regardless of US valence. The finding of significant differential blink modulation and electrodermal responding in the absence of a change in rated CS pleasantness as a result of conditioning with a non-aversive US was replicated in a second experiment. These results seem to indicate that startle modulation during conditioning is mediated by the arousal level of the anticipated US, rather than by the valence of the CS. (C) 2002 Elsevier Science (USA). All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Case: Beardsley Theobalds Retirement Benefit Scheme Trustees v Yardley [2011] EWHC 1380 (QB) (QBD). The recent case of Beardsley Theobalds Retirement Benefit Scheme Trustees v Yardley, nicely illustrates, inter alia, the impact of the contractual defences of undue influence and the plea of non est factum in the context of avoiding liability under leasehold guarantees, within the setting of the landlord and tenant relationship. Additionally, the case also gives us an insight into the possible application of other technical defences relating to the law of formalities for leases. Judgment in this case was handed down on September 30, 2011.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

*Supported in part by GAˇ CR 201-98-1449 and AV 101 9003. This paper is based on a part of the author’s MSc thesis written under the supervison of Professor V. Zizler.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we give a criterion for unconditional convergence with respect to some summability methods, dealing with the topological size of the set of choices of sign providing convergence. We obtain similar results for boundedness. In particular, quasi-sure unconditional convergence implies unconditional convergence.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Ordinary desktop computers continue to obtain ever more resources – in-creased processing power, memory, network speed and bandwidth – yet these resources spend much of their time underutilised. Cycle stealing frameworks harness these resources so they can be used for high-performance computing. Traditionally cycle stealing systems have used client-server based architectures which place significant limits on their ability to scale and the range of applica-tions they can support. By applying a fully decentralised network model to cycle stealing the limits of centralised models can be overcome. Using decentralised networks in this manner presents some difficulties which have not been encountered in their previous uses. Generally decentralised ap-plications do not require any significant fault tolerance guarantees. High-performance computing on the other hand requires very stringent guarantees to ensure correct results are obtained. Unfortunately mechanisms developed for traditional high-performance computing cannot be simply translated because of their reliance on a reliable storage mechanism. In the highly dynamic world of P2P computing this reliable storage is not available. As part of this research a fault tolerance system has been created which provides considerable reliability without the need for a persistent storage. As well as increased scalability, fully decentralised networks offer the ability for volunteers to communicate directly. This ability provides the possibility of supporting applications whose tasks require direct, message passing style communication. Previous cycle stealing systems have only supported embarrassingly parallel applications and applications with limited forms of communication so a new programming model has been developed which can support this style of communication within a cycle stealing context. In this thesis I present a fully decentralised cycle stealing framework. The framework addresses the problems of providing a reliable fault tolerance sys-tem and supporting direct communication between parallel tasks. The thesis includes a programming model for developing cycle stealing applications with direct inter-process communication and methods for optimising object locality on decentralised networks.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A configurable process model provides a consolidated view of a family of business processes. It promotes the reuse of proven practices by providing analysts with a generic modelling artifact from which to derive individual process models. Unfortunately, the scope of existing notations for configurable process modelling is restricted, thus hindering their applicability. Specifically, these notations focus on capturing tasks and control-flow dependencies, neglecting equally important ingredients of business processes such as data and resources. This research fills this gap by proposing a configurable process modelling notation incorporating features for capturing resources, data and physical objects involved in the performance of tasks. The proposal has been implemented in a toolset that assists analysts during the configuration phase and guarantees the correctness of the resulting process models. The approach has been validated by means of a case study from the film industry.