نتایج جستجو برای: victim

تعداد نتایج: 8817  

Journal: :Chinese Journal of International Law 2014

2005
Michael Zhang Krste Asanovic

Future CMPs will have more cores and greater onchip cache capacity. The on-chip cache can either be divided into separate private L2 caches for each core, or treated as a large shared L2 cache. Private caches provide low hit latency but low capacity, while shared caches have higher hit latencies but greater capacity. Victim replication was previously introduced as a way of reducing the average ...

2013
Elisabetta Palagi Ivan Norscia

Post-conflict third-party affiliation has been reported to have different functional meanings, one of them being consolation. Here, we tested the main hypotheses that have been put forth to explain the presence of this phenomenon at a functional level in the bonobo: Self-Protection Hypothesis, Victim-Protection Hypothesis, Relationship-Repair or Substitute for Reconciliation Hypothesis, and Con...

2005
Michael Zhang

Future CMPs will have more cores and greater onchip cache capacity. The on-chip cache can either be divided into separate private L2 caches for each core, or treated as a large shared L2 cache. Private caches provide low hit latency but low capacity, while shared caches have higher hit latencies but greater capacity. Victim replication was previously introduced as a way of reducing the average ...

,

Background: With the idea of victim protection emerging and the emergence of supportive victimology in the twentieth century, the forgotten position of the victim in the criminal process has been restored and its findings expressed in the form of universal standards for victim protection. Support for the victim is indispensable and indisputable in criminal proceedings. This support has various ...

Journal: :The Journal of Criminal Law, Criminology, and Police Science 1957

2004
Michael Biggs

The hunger strike is a strange technique of civil war. Physical suffering—possibly even death—is inflicted on oneself, rather than on the opponent. The technique can be conceived as a paradoxical inversion of hostage-taking or kidnapping, analyzed by Elster (2004). With kidnapping, A threatens to kill a victim B in order to force concessions from the target C; sometimes the victim is also the t...

Journal: :The Lancet 1910

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید