نتایج جستجو برای: larceny

تعداد نتایج: 100  

2007
Gabriel Rodríguez

Using Markov Switching Autoregressive models the behaviour of four crime variables and unemployment rate during the period of study is investigated and different regimes for each variable determined. Using some nonparametric measures such as the Concordance Index (Harding and Pagan, 2002) and Independence of Chronologies (Bodman and Crosby, 2005), among others, the independency of cycles of une...

2014
Carl Friedrich Bolz Tobias Pape Jeremy Siek

Tracing just-in-time (JIT) compilers record and optimize the instruction sequences they observe at runtime. With some modifications, a tracing JIT can perform well even when the executed program is itself an interpreter, an approach called meta-tracing. The advantage of meta-tracing is that it separates the concern of JIT compilation from language implementation, enabling the same JIT compiler ...

2007
Samuel L. Myers

Crime supply functions are reestimated in this paper using data corrected for victim underreporting. It is found in both a meanvariance specification and a conventional crime supply function which includes measures of the offender's gains and losses involved in property crimes that certainty and severity of punishment still deter. When correction for underreporting is made, the effects on the r...

Journal: :The European respiratory journal 2008
A Mehta A E Lichtin A Vigg J G Parambil

Rapid oxygen consumption by markedly increased numbers of hypermetabolic leukocytes in leukaemic patients resulting in the apparent diagnosis of hypoxaemia on arterial blood gas analyses is termed leukocyte larceny. In the present report, a case of polycythaemia vera, extreme thrombocytosis, normal leukocyte counts and arterial hypoxaemia in the absence of clinical, radiological or physiologica...

Journal: :JCP 2006
Chichao Lu WenYuan Jen Weiping Chang Shihchieh Chou

This paper explores the increasing number of cybercrime cases in Taiwan and examines the demographic characteristics of those responsible for this criminal activity. The report is based upon data taken from the Criminal Investigation Bureau of Taiwan’s cybercrime database over the interval of 1999 through 2004. The paper defines cybercrime, analyses cybercrime case statistics and examines profi...

Journal: :California Law Review 1998

1998
Anthony J. H. Simons

Dynamic memory management in C++ is complex, especially across the boundaries of library abstract data types. C++ libraries designed in the orthodox canonical form (OCF) alleviate some of the problems by ensuring that classes which manage any kind of heap structures faithfully copy and delete these. However, in certain common circumstances, OCF heap structures are wastefully copied multiple tim...

2000
John J. Wilson David Finkelhor

Part of the Office of Juvenile Justice and Delinquency Prevention’s Crimes Against Children Series, this Bulletin describes juveniles’ risks for property victimization and the nature of such crimes. Unfortunately, property crimes against juveniles are seldom reported to the police. In fact, a larceny or theft perpetrated against a juvenile is three times less likely to be reported than one for ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید