نتایج جستجو برای: prohibitions
تعداد نتایج: 916 فیلتر نتایج به سال:
The antitrust prohibitions of the Sherman Act' in many ways have a "unique relationship ' 2 with the free speech guarantees of the first amendment. 3 By protecting the free flow of information between buyers and sellers, 4 the Sherman Act protects first amendment rights to disseminate and receive information. 5 By defining competition as the goal of its prohibitions, 6 the Sherman Act, like the...
C-O Diagrams have been introduced as a means to have a more visual representation of electronic contracts, where it is possible to represent the obligations, permissions and prohibitions of the different signatories, as well as what are the penalties in case of not fulfillment of their obligations and prohibitions. In such diagrams we are also able to represent absolute and relative timing cons...
To adequately deal with the unpredictable and dynamic environments normative frameworks are typically deployed in, mechanisms for modifying the norms at runtime are crucial. We present the syntax and operational semantics of generic programming constructs to facilitate runtime norm modification, allowing a programmer to specify when and how the norms may be changed by external agents or by the ...
Beginning with Kelley’s and Iannaccone’s foundational studies, scholars have examined how strictness impacts congregational outcomes. This paper seeks to further develop the strict church thesis by examining Iannaccone’s concept of “optimal level of strictness”, an idea that there are limits to strictness. Using Stark and Finke’s theoretical framework of religious niches and data from the 2005 ...
Motivated by a new point of view to study occurrences of consecutive patterns in permutations, we introduce the notion of uniquely k-determined permutations. We give two criteria for a permutation to be uniquely k-determined: one in terms of the distance between two consecutive elements in a permutation, and the other one in terms of directed hamiltonian paths in the certain graphs called path-...
We consider the extension of fair event system specifications by concepts of access control (prohibitions, user rights, and obligations). We give proof rules for verifying that an access control policy is correctly implemented in a system, and consider preservation of access control by refinement of event systems. Prohibitions and obligations are expressed as properties of traces and are preser...
Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/page/info/about/policies/terms.jsp. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید