نتایج جستجو برای: party action
تعداد نتایج: 642404 فیلتر نتایج به سال:
Politicians perceive their representative role in a variety of ways: as delegate party, voters, or trustee who exercises mandate independent any external principal. Existing research finds that the tendency to adopt specific style representation depends on system-level institutions and individuals’ political experience profile. The influence party organisational context remains little-understoo...
We examine the nature of the coordination failure in Rubinstein’s Electronic Mail Game, a classic game-theoretic paradox in which parties are unable to coordinate on a mutually beneficial action, and we propose a principle for designing more successful signaling protocols. When signaling technology is such that signals fail to reach their destination with small probability, it is important that...
knowing of formation of a legal rule is an efficient way to recognizing and assessing of that rule. anticipatory breach doctrine became apparent in common law when the court in hochster versus de la tour case (1980), hold that a party could breach an executor contract prior to the performance date and injured party entitle to sue at once. before it, courts had made a negative answer to this mat...
this paper tries to explore and asses the political party activities in iran after the islamic revolution. it believes that that formation of political parties was a result of political modernization in iran after the revolution. the authors further examine this modernization based on huntington's theory about modernization including stages of faction creation (factionalism), polarization,...
ارزیابی ریسک بهداشت، ایمنی و زیست محیطی با روش شاخص گذاری مطالعه موردی: خط لوله نفت کرمانشاه – سنندج
Background and AimsUsing pipelines for oil products transportation involves ranges of safety, health and environmental risks, this option however, is dominant with numerous advantages. The purpose of this study was relative risk assessment of abovementioned risk in Kermanshah-Sanandaj Oil Pipeline.MethodsThe method used in this study was Kent Muhlbauer method in which relative risk was assesse...
We conduct a reduction-based security analysis of the Extensible Authentication Protocol (EAP), a widely used three-party authentication framework. EAP is often found in enterprise networks where it allows a client and an authenticator to establish a shared key with the help of a mutually trusted server. Considered as a three-party authenticated key exchange protocol, we show that the general E...
We consider dynamic capacity booking problems faced by multiple manufacturers each outsourcing certain operations to a common third-party firm. Each manufacturer, upon observing the current state of the third-party schedule, books capacity with the objective to jointly minimize holding costs that result from early deliveries, tardiness penalties due to late deliveries, and third-party capacity ...
We develop a model of government personnel policy with electoral competition in an effort to understand when high quality bureaucracies will be created and sustained. In the model, two parties compete for office over an infinite horizon, and politicians in office choose a mix between civil servants (who produce public goods in a good bureaucracy) and patronage appointees (who produce private go...
Unlike traditional media, our interactions with political parties via social media are generally public, subject to scrutiny by others and, consequently, a self-presentation concern. This paper contributes to theory on impression management within social network sites (SNSs) by providing an understanding of the effect of visible affiliation on page ‘Liking’ behavior in the context of political ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید