نتایج جستجو برای: spending

تعداد نتایج: 16337  

Journal: :Health affairs 2009
Richard A Cooper

Based on broad measures of health system quality and performance, states with more total health spending per capita have better-quality care. This fact contrasts with a previous finding that states with higher Medicare spending per enrollee have poorer-quality care. However, quality results from the total funds available and not from Medicare or any single payer. Moreover, Medicare payments are...

2013
Biswajit Maitra C. K. Mukhopadhyay

sectors is examined with regard to promoting the gross domestic product (GDP) of 12 countries in Asia and the Pacific over the last three decades. In six of those countries, namely Bangladesh, Kiribati, Malaysia, Maldives, the Philippines and the Republic of Korea, Johansen cointegration tests confirmed the existence of cointegrating relations. In the remaining countries, namely Fiji, Nepal, Si...

Journal: :Revista de saude publica 2009
Fabiola Sulpino Vieira

OBJECTIVE To analyze the evolution of the Ministry of Health's spending on drugs. METHODS The Ministry of Health's total (added) spending on drugs and its (not added) programs' were analyzed between 2002 and 2007. Actions that financed drug acquisition were obtained from the Siga Brasil system and classified according to pharmaceutical service programs. Settled values were identified for each...

2015
Foteini Baldimtsi Melissa Chase Georg Fuchsbauer Markulf Kohlweiss

Cryptographic e-cash allows off-line electronic transactions between a bank, users and merchants in a secure and anonymous fashion. A plethora of e-cash constructions has been proposed in the literature; however, these traditional e-cash schemes only allow coins to be transferred once between users and merchants. Ideally, we would like users to be able to transfer coins between each other multi...

Journal: :CoRR 2014
Nicolas Courtois

In this paper we revisit some major orthodoxies which lie at the heart of the bitcoin crypto currency and its numerous clones. In particular we look at The Longest Chain Rule, the monetary supply policies and the exact mechanisms which implement them. We claim that these built-in properties are not as brilliant as they are sometimes claimed. A closer examination reveals that they are closer to ...

Journal: :IACR Cryptology ePrint Archive 2016
Hitesh Tewari Arthur Hughes

Numerous electronic cash schemes have been proposed over the years ranging from Ecash, Mondex to Millicent. However none of these schemes have been adopted by the financial institutions as an alternative to traditional paper based currency. The Ecash scheme was the closest to a system that mimicked fiat currency with the property that it provided anonymity for users when buying coins from the B...

2016
Mihajlo Jakovljevic Marija Lazarevic Olivera Milovanovic Tatjana Kanjevac

HIGHLIGHTS Since the geopolitical developments of 1989, former centrally planned economies of Eastern Europe followed distinctively different pathways in national pharmaceutical expenditure evolution as compared to their free market Western European counterparts.Long term spending on pharmaceuticals expressed as percentage of total health expenditure was falling in free market economies as of 1...

2004
Flavio D. Garcia

P2P and grid systems allow their users to exchange information and share resources in a uniform and reliable manner. In an ideal world, users make roughly as much resources available as they use. In reality, this is not always the case, and some kind of currency or barter (called karma) is needed that can be exchanged for resources to limit abuse. P2P and grid systems are distributed systems wi...

Journal: :IACR Cryptology ePrint Archive 2017
Sanjay Bhattacherjee Palash Sarkar

This work shows that weighted majority voting games occur in cryptocurrencies. In particular, two such games are highlighted. The first game, which we call the Rule Game, pertains to the scenario where the entities in the system engage in a voting procedure to accept or reject a change of rules. The second game, which we call the Attack Game, refers to the scenario where a group of entities in ...

Journal: :IACR Cryptology ePrint Archive 2013
Stefan Dziembowski Sebastian Faust Vladimir Kolmogorov Krzysztof Pietrzak

Proofs of work (PoW) have been suggested by Dwork and Naor (Crypto’92) as protection to a shared resource. The basic idea is to ask the service requestor to dedicate some non-trivial amount of computational work to every request. The original applications included prevention of spam and protection against denial of service attacks. More recently, PoWs have been used to prevent double spending i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید