نتایج جستجو برای: language policies

تعداد نتایج: 546758  

2008
Mark Hills Feng Chen Grigore Roşu

Many programs make implicit assumptions about data. Common assumptions include whether a variable has been initialized or can only contain non-null references. Domain-specific examples are also common, with many scientific programs manipulating values with implicit units of measurement. However, in languages like C, there is no language facility for representing these assumptions, making violat...

2006
Andrew Pimlott Oleg Kiselyov

We describe the design and implementation of a trust-management system Soutei, a dialect of Binder, for access control in distributed systems. Soutei policies and credentials are written in a declarative logic-based security language and thus constitute distributed logic programs. Soutei policies are modular, concise, and readable. They support policy verification, and, despite the simplicity o...

2014
HONG WANG Liying Cheng

This study explores the implementation of the mandatory national college English curriculum within a Chinese tertiary context. Using a mixed methods approach, I conducted the study by engaging three groups of participants. I interviewed four national policymakers in terms of syllabi, textbooks, and tests to identify the intended curriculum. I interviewed six departmental administrators to deter...

Journal: :The Annals of occupational hygiene 2009
Celeste Monforton Colin L Soskolne John M Last Joseph Ladou Daniel Thau Teitelbaum Kathleen Ruff

Many concerns would find it useful to have a publicly available database recording exposures to particular substances, with contextual information. The European Union's Registration, Evaluations, Authorisation, and restriction of Chemicals regulation has increased interest in this. It has been suggested that journals should require detailed publication of exposure data with papers. But there ar...

Journal: :Medicine and law 2007
Ana Marusic Vedran Katavic Matko Marusic

Scientific journals have a central place in protecting research integrity because published articles are the most visible documentation of research. We used SWOT analysis to audit (S)trengths and (W)eaknesses as internal and (O)pportunities and (T)hreats as external factors affecting journals' responsibility in addressing research integrity issues. Strengths include editorial independence, auth...

2013
Hrvoje Barić Dora Polšek Lidija Andrijašević Srećko Gajović

The Croatian Medical Journal (CMJ), as a small journal that is not part of any publishing group faces serious challenges to prosper in a multitude of diverse biomedical journals. In such a complex situation, adaptations are always necessary. They include changing the editorial policy, embracing new ideas, and introducing new members to the Managing Team. Besides selecting the right articles, ex...

Journal: :تحقیقات اقتصادی 0
mozhgan moallemi

during the last two decades, decentralization has been supposed as a tool for making the public sector policies more efficient. despite the claimed benefits, there are some costs; some of decentralization theorists believe that devolution of pure public goods provision to local governments has led to the failure of decentralization policies. this article uses game theory to study the implicatio...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1388

since the 1960s the age effects on learning both first and second language have been explored by many linguists and applied linguists (e.g lennerberg, 1967; schachter, 1996; long, 1990) and the existence of critical period for language acquisition was found to be a common ground of all these studies. in spite of some common findings, some issues about the impacts of age on acquiring a second or...

2011
Richard Macfarlane Owen Lo

Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific policies, or configurations, written by network system administrators. There exists a multitude of research into policy-based network systems which has been undertaken. This paper provides an overview of the different type...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید