School Protection System: Protecting Who, from Whom?
نویسندگان
چکیده
منابع مشابه
Who corrupts whom? A criminal eco-system made in Italy
This research note focuses on the relationship between organised crime and corruption in Italy. It is part of a wider research project investigating that relationship across a number of European countries. In the first part of this contribution, along with a brief account of definitional issues, a summary review of previous work on the connections between organised crime and corruption is provi...
متن کاملWho Marries Whom and Why
This paper proposes and estimates a static non-parametric transferable utility model of the marriage market. The model rationalizes the standard interpretation of marriage rate regressions as well as pointing out its limitations. The model was used to estimate US marital behavior in 1971/72 and 1981/82. The estimates show that the gains to marriage for young adults fell substantially over the d...
متن کاملVocal mimicry in male bowerbirds: who learns from whom?
Vocal mimicry is one of the more striking aspects of avian vocalization and is widespread across songbirds. However, little is known about how mimics acquire heterospecific and environmental sounds. We investigated geographical and individual variation in the mimetic repertoires of males of a proficient mimic, the spotted bowerbird Ptilonorhynchus maculatus. Male bower owners shared more of the...
متن کاملWho Watches the Watchmen? Protecting Operating System Reliability Mechanisms
We present the design and initial evaluation of a resilient operating system architecture that leverages HW architectures combining few resilient with many non-resilient CPU cores. To this end, we build our system around a Reliable Computing Base (RCB) consisting of those software components that must work for reliable operation, and run the RCB on the resilient cores. The remainder of the syst...
متن کاملFrom Protecting a System to Protecting a Global Ecosystem
The area of security used to be classified by technologies: authentication, access control, monitoring, firewalls, cryptography, etc., or by systems: web security, application security, database security, operating systems security, communication security, etc. However, nowadays, in order to operate a service over the Internet, facing customers, one needs to manage a complex infrastructure. Thi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Procedia - Social and Behavioral Sciences
سال: 2012
ISSN: 1877-0428
DOI: 10.1016/j.sbspro.2012.09.521