نتایج جستجو برای: party program
تعداد نتایج: 492855 فیلتر نتایج به سال:
A party develops its identity by adopting biased policy positions consistently over time. Existing rational voting models explain distinct party identities by assuming intrinsic policy-motivated parties or candidates. We show that distinct party identities may arise when parties are purely o ce-motivated in a dynamic setting with impressionable voters. In particular, a voter is more likely to v...
— Across sub-Saharan Africa agricultural subsidy programs have again become a common strategy for combatting rural poverty, increasing agricultural production, and reducing food insecurity. Despite a large literature examining subsidies’ effects on output and welfare, little is known about their political effects. This paper examines Malawi’s Agricultural Input Subsidy Programme, one of the lar...
With Medicaid programs in most States coming under ever-increasing fiscal pressures, the issue of third-party liability is receiving more attention and scrutiny. A relatively small investment in determining health insurance coverage can yield significant savings. In New York State's program, counties are compared and ranked to give a view of how well they are succeeding in identifying eligibles...
We present a new method for secure two-party Random Access Memory (RAM) program computation that does not require taking a program and first turning it into a circuit. The method achieves logarithmic overhead compared to an insecure program execution. In the heart of our construction is a new Oblivious RAM construction where a client interacts with two non-communicating servers. Our two-server ...
The author analyzes the solution of social issue in programs Russian political parties. It is noted that not all parties have a program, despite fact opportunity to formulate main directions policy and implement them. program documents such as United Russia, Just Communist Party Federation are most informative. Pension provision demanded by parties, therefore, each contains proposals for its so...
Introduction The board of directors and senior management of an insured depository institution (institution) are ultimately responsible for managing activities conducted through third-party relationships, and identifying and controlling the risks arising from such relationships, to the same extent as if the activity were handled within the institution. The use of third-party relationships does ...
The paper describes a verification technique based on program transformation with unfolding. The technique allows to find short attacks on multi-party ping-pong protocols in the Dolev–Yao intruder model. Protocols are modelled by prefix grammars, and questions of model optimization and complexity are considered. Examples of model programs for protocols were written in a functional language and ...
Aim. To analyze the election programs of non-parliamentary political parties regarding frequency and effectiveness using image future as an electoral technique. Research objectives are to establish whether use is a common tool in elections State Duma VIII th convocation, well find out how effective conditions formed state strategy for medium long term. Methodology. The analysis "Yabloko", "Russ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید