نتایج جستجو برای: keywords victim

تعداد نتایج: 1984901  

2000
Jonathan Gershuny Carmel Hannan

This paper investigates a problem of 'state dependency'. People who have been unemployed in the past are much more likely than others to become unemployed in the future. But is it unemployment itself that causes future unemployment or is there something else, some measured or unmeasured form of heterogeneity, in individual characteristics or environmental circumstances, that causes both the pas...

Journal: :مجله مطالعات حقوق تطبیقی 0
محسن ایزانلو دکترای حقوق - استادیار روزبه جباری زاده دانشجوی کارشناسی ارشد حقوق خصوصی، دانشگاه تهران

bankruptcy and tort; two apparently distinct branches of law, but, in fact, some technical and theoretical issues arise from their interaction. these include, among others, the boundaries between personal rights of the victim to damages, exclusively allocated to the bankrupt, and the financial damages , which belong to the creditors ; the problems resulting from the chronological order of the b...

2012
K. Bhattacharjee

-In order to accurately model high frequency affects, inductance has been taken into consideration. No longer can interconnects be treated as mere delays or lumped RC networks. In that frequency range, the most accurate simulation model for on-chip VLSI interconnects is the distributed RLC model. Unfortunately, this model has many limitations at much higher of operating frequency used in today’...

Journal: :JIPS 2012
Koohong Kang

We propose an analytic model to compute the station’s saturated throughput and packet delay performance of the IEEE 802.11 DCF (Distributed Coordination Function) in which frame transmission error rates in the channel are different from each other. Our analytic model shows that a station experiencing worse frame error rates than the others suffers severe performance degradation below its deserv...

2013
S. Ganesan

-This paper presents a simple prioritytagging filtering mechanism, called SAP (Shrew Attack Protection), which protects well-behaved TCP flows against low-rate TCP-targeted Shrew attacks. In this scheme, a router maintains a simple set of counters and keeps track of the drop rate for each potential victim. If the monitored drop rates are low, all packets are treated as normal and equally comple...

2012
Max Schuchard Christopher Thompson Nicholas Hopper Yongdae Kim

Both academic research and historical incidents have shown that unstable BGP speakers can have extreme, undesirable impacts on network performance and reliability. Large amounts of time and energy have been invested in improving router stability. In this paper, we show how an adversary in control of a BGP speaker in a transit AS can cause a victim router in an arbitrary location on the Internet...

Journal: :International journal of offender therapy and comparative criminology 2012
Eveline van Vugt Jessica Asscher Jan Hendriks Geert Jan Stams Catrien Bijleveld Peter van der Laan

Professional decision making in forensic clinical practice may have lifelong consequences for offenders. Although information on moral development is important for prediction of reoffending and referral to adequate treatment, conclusions regarding moral development are still largely based on unstructured clinical judgment instead of assessment instruments. For this study, the authors examined t...

2003
JENNIFER BRUNO

In the wake of a sexual assault, a victim is faced with sensitive questions, grueling examinations, and life-altering decisions. To assist victims in dealing with such issues, many communities make sexual assault crisis counselors available. These counselors act as support persons for the victim as he or she deals with police, doctors, prosecutors, friends, and family. Because these counselors ...

Journal: :Violence and victims 2012
Samantha Balemba Eric Beauregard

Upon encountering victim resistance during the commission of a sexual assault, an offender makes a decision as to how to react to the resistance via the use of varying degrees of coercive or noncoercive tactics. Exhaustive chi-squared automatic interaction detection (CHAID) analyses were performed on a sample of 369 criminal events to detect the significant situational and crime-specific factor...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید