نتایج جستجو برای: multilateral well

تعداد نتایج: 1525940  

2011
Yu-Feng Diana

Yu-Feng (Diana) Yang, National Sun Yat-Sen University This qualitative study aims to understand how English learners interpret shared space in an online multilateral English blogging context and how their interpretations of shared space contribute to their multilateral exchange experience. Twenty-four Asian learners of English from two different universities—one in Japan and one in Taiwan—parti...

Journal: :Computer Networks 2001
Sebastian Clauß Marit Köhntopp

We show our approach in developing an identity management system with respect to multilateral security. After examining digital pseudonyms and credentials as basic concepts of such a system, we give an introduction to technologies for multilateral security and describe an architecture which enables multilaterally secure communication. By means of di€erent scenarios we show requirements of an id...

2004
Emanuel Ornelas

I evaluate in this paper the impact of free trade areas (FTAs) on the world trading system. I use an oligopolistic-political-economy model where the external tariffs of FTA members, as well as the decision to form FTAs, are endogenously determined. In this context, I show that FTAs are primarily beneficial to the multilateral trading system. This conclusion is based, first, upon the finding tha...

2004
Parthapratim Pal

One of the most striking development in the world trading system since the mid 1990s is a surge in Regional Trade Agreements (RTAs). From about 50 till 1990, the number of RTAs notified to the World Trade Organization (WTO) has crossed 250 in 2003 and estimates indicate that over 300 RTAs will be in effect by 2007. Initially WTO encouraged the growth of RTAs because it believed that regional in...

2006
Raechelle Mascarenhas Todd Sandler

Donor_s demand equations for alternative forms of aid are derived for three allocation processes: noncooperative Nash-Cournot, cooperative Lindahl, and bureaucratic. Based on OECD data for official development assistance for 1970– 2001, we apply non-nested tests to distinguish between Nash-Cournot and Lindahl reduced-form equations for 15 major donor nations. Noncooperative Nash-Cournot behavio...

Journal: :it+ti - Informationstechnik und Technische Informatik 1996
Kai Rannenberg Andreas Pfitzmann Günter Müller

Security, in respect of information technology (IT) systems, refers to the fact that protection goals are achieved in spite of intelligent attacks. This paper commences with a brief discussion of the term security in the context of IT systems. Of particular importance is the broadening of the term's meaning which has resulted from the development and more widespread deployment of IT, in particu...

2000
Galina A. Schwartz

We model agents’ incentives to invest in production of export goods when governments are commitment constrained with respect to their trade obligations. Once irreversible investments have been undertaken, the governments have incentives to renegotiate the tariff rates to higher values. The renegotiations are costly; the greater the tariff rate adjustment, the greater the expenses. We find that ...

2004
Jean Monnet

The main aspects of the building process of the Euro-Mediterranean security system are assessed in this article with the tools of analysis of the regional security systems. The Mediterranean security project is also compared with other forms and cases of regional security system. The presence of other multilateral initiatives on Mediterranean security is pointed out as a strategic tool for the ...

2015
Yasushi Kawabata

We study the endogenous formation of free trade agreements (FTAs) in a symmetric three-country model with vertically related markets characterized by Cournot competition. We analyze the coalition-proof Nash equilibria in an FTA formation game in which each country forms an FTA with one, both, or none of its trading partners. We show that multilateral free trade is the unique stable equilibrium ...

2004
Li Zhou Clifford Neuman

Grid computing enables the sharing of heterogeneous resources within virtual organizations. Since entities in virtual organizations are independently administrated, cross-domain management of access control and intrusion protection is critical for grid services. To provide better protection in grid systems, multiple domains collaborate in making security decisions. Unfortunately, the absence of...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید