نتایج جستجو برای: proxy

تعداد نتایج: 25930  

Journal: :New Journal of Physics 2015

Journal: :Pediatric Hematology and Oncology 1993

Journal: :Civil Wars 2021

This article presents a definitional structure for the notion of ‘proxy war’ organised around three components: (1) material-constitutive feature, (2) processual feature and (3) relational feature. First, evaluates multiple usages term in light its contested character. Second, it proposes way making sense literature’s conceptual turmoil by analysing different attempts at defining notion. To thi...

Journal: :Journal of Business & Economic Statistics 2021

In proxy vector autoregressive models, the structural shocks of interest are identified by an instrument. Although heteroscedasticity is occasionally allowed for in inference, it typically taken granted that impact effects time-invariant despite change their variances. We develop a test this implicit assumption and present evidence may be violated previously used empirical models.

Journal: :Journal of Applied Business Research (JABR) 2011

Journal: :British Journal of Psychiatry 1994

Journal: :Criminal Law and Philosophy 2021

A solution to the problem of “overcriminalization” appears be decriminalization certain crimes. This Essay focuses on a group crimes that has been labeled “proxy crimes” as candidate eliminated. What are proxy crimes? Douglas Husak defines them “offenses designed achieve purpose other than prevent conduct they explicitly proscribe.” Michael Moore describes involving situations where we “use one...

Journal: :Journal of Corporate Finance 2021

This paper studies the communication of “voice” in shareholder activism. Using hand-collected data, I investigate how use investor presentations, among other strategies, affects outcomes proxy contests. Being first to make presentations investors increases dissident's chance winning by 60%. To understand this first-mover advantage, examine allocation attention and variation sophistication. The ...

2003
Fangguo Zhang Reihaneh Safavi-Naini Chih-Yin Lin

Proxy signatures are very useful tools when one needs to delegate his/her signing capability to other party. After Mambo et al.’s first scheme was announced, many proxy signature schemes and various types of proxy signature schemes have been proposed. Due to the various applications of the bilinear pairings in cryptography, there are many IDbased signature schemes have been proposed. In this pa...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید