نتایج جستجو برای: parties
تعداد نتایج: 28754 فیلتر نتایج به سال:
Social host policies focused on underage drinking parties are implemented to reduce social availability of alcohol and high-risk drinking by adolescents in private locations. We examined the policies' relationship with drinking location, peer-group drinking size, heavy episodic drinking, and nonviolent consequences. Cross-sectional data from 11,205, 14-20-year olds, were analyzed using multilev...
We analyze existence of divergent equilibria in a model of endogenous party platforms with stochastic membership. The parties proposals depend on their membership, while the membership depends both on the proposals of the parties and the unobserved idiosyncratic preferences of citizens over parties. It is shown that when citizens view the parties as similar, apart from their policy proposals (i...
In a public-key encryption scheme, if a sender is not concerned about the security of a message and is unwilling to generate costly randomness, the security of the encrypted message can be compromised. This is caused by the laziness of the sender. In this work, we characterize lazy parties in cryptography. Lazy parties are regarded as honest parties in a protocol, but they are not concerned abo...
Service Oriented Enterprises (SOEs) are subject to constant change and variation. In this paper, the changes are considered from an economic perspective based on service culture notion. Once a change is implemented, the costs of some member services may increase, whereas the costs of some other services may reduce. We construct a game theoretic model trying to capture the possible conflicting i...
This paper studies a model of how political parties use resources for campaigning to inform voters. Each party has a predetermined ideology that is drawn from some distribution. To a¤ect the voters the parties use campaigning to inform the voters about the policy of the party. We study a symmetric model with two parties and ...nd that, the farther away parties are from each other (on average), ...
abstract the feminist movement in the united states like other countries has tried to establish equality for women. from the first attempts to gain constitutional right for vote, up to the current radical demands, feminists have struggled to make changes in the u.s. party politics and obtain their rights within the parties. one of the important issues in which women played a key role in party p...
چکیده ندارد.
Contract signing protocol is a new way of interacting two parties online though communication devices. Since communication is done though internet or media so authentication is required between these parties to check the contract is done between right parties or not. The main aim of contract signing is fairness between parties. Although there are various techniques implemented to provide authen...
Why do some new political parties take root after rising to electoral prominence, while others collapse after their initial success? Although strong parties are critical for stable, high-quality democracy, relatively little is known about the conditions under which strong parties emerge. The classic literature on party-system development is largely based on studies of the United States and West...
Trust is a key component in any ubiquitous computing system. Users have to trust the devices to be secure, devices have to authenticate the users in order to trust their inputs and devices have to trust each others’ identity and authorisation. A central question in dealing with trust is how to distribute copies of a user’s public key in such a way that other users can verify that it does, indee...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید