School Protection System: Protecting Who, from Whom?

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Who corrupts whom? A criminal eco-system made in Italy

This research note focuses on the relationship between organised crime and corruption in Italy. It is part of a wider research project investigating that relationship across a number of European countries. In the first part of this contribution, along with a brief account of definitional issues, a summary review of previous work on the connections between organised crime and corruption is provi...

متن کامل

Who Marries Whom and Why

This paper proposes and estimates a static non-parametric transferable utility model of the marriage market. The model rationalizes the standard interpretation of marriage rate regressions as well as pointing out its limitations. The model was used to estimate US marital behavior in 1971/72 and 1981/82. The estimates show that the gains to marriage for young adults fell substantially over the d...

متن کامل

Vocal mimicry in male bowerbirds: who learns from whom?

Vocal mimicry is one of the more striking aspects of avian vocalization and is widespread across songbirds. However, little is known about how mimics acquire heterospecific and environmental sounds. We investigated geographical and individual variation in the mimetic repertoires of males of a proficient mimic, the spotted bowerbird Ptilonorhynchus maculatus. Male bower owners shared more of the...

متن کامل

Who Watches the Watchmen? Protecting Operating System Reliability Mechanisms

We present the design and initial evaluation of a resilient operating system architecture that leverages HW architectures combining few resilient with many non-resilient CPU cores. To this end, we build our system around a Reliable Computing Base (RCB) consisting of those software components that must work for reliable operation, and run the RCB on the resilient cores. The remainder of the syst...

متن کامل

From Protecting a System to Protecting a Global Ecosystem

The area of security used to be classified by technologies: authentication, access control, monitoring, firewalls, cryptography, etc., or by systems: web security, application security, database security, operating systems security, communication security, etc. However, nowadays, in order to operate a service over the Internet, facing customers, one needs to manage a complex infrastructure. Thi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Procedia - Social and Behavioral Sciences

سال: 2012

ISSN: 1877-0428

DOI: 10.1016/j.sbspro.2012.09.521