نتایج جستجو برای: policy analysis matrix

تعداد نتایج: 3297680  

Journal: :Computational Statistics & Data Analysis 2015

2014
Laurence J. Kotlikoff

This paper shows how changes in generational accounts relate to the gen­ erational incidence of fiscal policy. To illustrate the relationship, it uses the Auerbach-KotlikofF Dynamic Life-Cycle Simulation Model to compare policyinduced changes in generational accounts with actual changes in generations' Utilities. The paper considers a wide ränge of policies in closed and small open economies as...

Journal: :Journal of Public Administration and Policy Research 2021

This study aims at assessing the extent to which Ethiopian policies are based on rational policy analysis. Explanatory analysis methods used analyze primary and secondary qualitative data. The finding shows that in making process only one option was investigated crafted; criteria evaluate proposal not clear; sophisticated solution haven’t been used. Though there were many consultations wi...

2002
ADAM B. JAFFE RICHARD G. NEWELL ROBERT N. STAVINS

The relationship between technological change and environmental policy has received increasing attention from scholars and policy makers alike over the past ten years. This is partly because the environmental impacts of social activity are significantly affected by technological change, and partly because environmental policy interventions themselves create new constraints and incentives that a...

2005
P. WHITTLE

The aim of this paper is to evaluate the performance of the optimal policy (the Gittins index policy) for open tax problems of the type considered byKlimov in the undiscounted limit. In this limit, the state-dependent part of the cost is linear in the state occupation numbers for the multi-armed bandit, but is quadratic for the tax problem. The discussion of the passage to the limit for the tax...

2017
Rostislav Razumchik Miklós Telek

Resequencing of customers during the service process results in hard to analyze delay distributions. A set of models with various service and resequencing policies have been analyzed already for memoryless arrival, service and resequencing processes with an intensive use of transform domain descriptions. In case of Markov modulated arrival, service and resequencing processes those methods are n...

2017
Rachel C Shelton James Colgrove Grace Lee Michelle Truong Gina M Wingood

OBJECTIVE We conducted a content analysis of public comments to understand the key framing approaches used by private industry v. public health sector, with the goal of informing future public health messaging, framing and advocacy in the context of policy making. DESIGN Comments to the proposed menu-labelling policy were extracted from Regulations.gov and analysed. A framing matrix was used ...

Journal: :IACR Cryptology ePrint Archive 2010
Zhen Liu Zhenfu Cao

Ciphertext-Policy Attribute-Based Encryption(CP-ABE) is a system for realizing complex access control on encrypted data, in which attributes are used to describe a user’s credentials and a party encrypting data determines a policy over attributes for who can decrypt. In CP-ABE schemes, access policy is attached to the ciphertext to be the input of the decryption algorithm. An access policy can ...

2014
Noreen Kearns Liam Coen

INTRODUCTION This paper assesses the policy developments pertaining to the implementation of an integrated approach to domestic violence over the past 15 years. The contextual setting is outlined in terms of the international policy response to the problem of domestic violence based on an ecological perspective. DESCRIPTION OF POLICY AND CASE Periods of core strategic policy and related struc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید