نتایج جستجو برای: corruption programs
تعداد نتایج: 207824 فیلتر نتایج به سال:
Our experiences interfacing Python with optimization software are presented. The same work was done using extension programming and scripting. Due to the nature of the C libraries we were using, we found problems related to memory corruption and C namespace collisions when we used the libraries as Python extensions. For our application and the software we are interfacing to, we found that using...
abstract birbery and corruption and other criminal and as such is one of social phenomena , and i can firmly say that society is protected and safe from harm , this is criminal . eache community is familiar with these crimes and the crime associated ( direct or indirect ) with the political economic , social , and cultural beliefs and religious issues , especially with the community . admitted...
Concurrent programs are widespread in modern systems. They make better use of processor resources but inevitably introduce a new set problems terms reliability and security. Concurrency bugs usually lead to program crashes unexpected behavior, an active research topic. From security perspective, concurrency vulnerabilities those that exhibit harmful behavior exclusively concurrent executions. c...
today, information technology and computers are indispensable tools of any profession and translation technologies have become an indispensable part of translator’s workstation. with the increasing demands for high productivity and speed as well as consistency and with the rise of new demands for translation and localization, it is necessary for translators to be familiar with market demands an...
This paper examines the conceptual and empirical basis of corruption and governance and concludes that decentralized local governance is conducive to reduced corruption in the long run. This is because localization helps to break the monopoly of power at the national level by bringing decision making closer to people. Localization strengthens government accountability to citizens by involving c...
While some recent evidence suggests that more decentralization is associated with reduced corruption, no empirical work has examined whether different types of decentralization have differential effects on corruption. The theoretical literature has emphasized that expenditure decentralization will only be effective if accompanied by the devolution of revenue generation to local governments. In ...
The paper explores a game-theoretic model of petty corruption involving a sequence of entrepreneurs and a track of bureaucrats. Each entrepreneur’s project is approved if and only if it is cleared by each bureaucrat. The project value is stochastic; its value is observed only by the entrepreneur, but its distribution is common knowledge. Each bureaucrat clears the project only if a bribe is pai...
Copious amounts of high-performance and low-level systems code are written in memory-unsafe languages such as C and C++. Unfortunately, the lack of memory safety undermines security and reliability; for example, memory-corruption bugs in programs can breach security, and faults in kernel extensions can bring down the entire operating system. Memory-safe languages, however, are unlikely to displ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید