Showing 101 - 120 results of 186 for search '(((pinggang OR espinar) OR (espina OR spinae)) OR (((ruling OR bina) OR pings) OR ping))', query time: 0.08s Refine Results
  1. 101

    The use of artificial intelligence in digital forensics and incident response in a constrained environment by Dunsin, Dipo, Ghanem, Mohamed Chahine, Quazzane, Karim

    Published 2022
    “…The agents communicate to address particular tasks jointly and keep the same objectives in mind during each task. The rules and knowledge contained within each agent are dependent on the investigation type. …”
    Get full text
    Article
  2. 102

    Global governance and the United Nations: the ‘clash of civilisations’ and the ‘rise’ of RNGOs by Haynes, Jeffrey

    Published 2017
    “…Cambridge : Cambridge University Press, 2012 Global Governance and Rules for the Post-2015 Era : Addressing Emerging Issues in the Global Environment (The United Nations Series on Development) / edited by Jose Antonio Ocampo, Jose Antonio Alonso. …”
    Article
  3. 103
  4. 104

    The use of artificial intelligence in digital forensics and incident response (DFIR) in a constrained environment by Dunsin, Dipo, Ghanem, Mohamed Chahine, Ouazzane, Karim

    Published 2022
    “…The agents communicate to address particular tasks jointly and keep the same objectives in mind during each task. The rules and knowledge contained within each agent are dependent on the investigation type. …”
    Get full text
    Conference or Workshop Item
  5. 105

    Tradition and historicism in the remodelling of Tate Britain by Frost, Christian W.

    Published 2016
    “…Using the example of Caruso St John’s recent work to the Tate Britain Gallery in London, this chapter questions the current rules that determine the way architectural heritage is protected and adapted, suggesting that more flexibility should be afforded to architectural work undertaken on existing listed structures.…”
    Get full text
    Book Section
  6. 106

    The unintended consequences of improving police recording of rape in England and Wales by Lovett, Jo, Kelly, Liz, Vera-Gray, Fiona

    Published 2024
    “…We argue that changes to the Home Office Counting Rules since 2014 have resulted in the recording of a significant proportion of cases which are not reports from victim-survivors and which they did not consent to. …”
    Get full text
    Article
  7. 107

    Terrorism and the proportionality of internet surveillance by Brown, Ian, Korff, Douwe

    Published 2009
    “…We argue that their disproportionate nature is problematic for democracy and the rule of law, and will lead to practical difficulties for cross-border cooperation between law enforcement agencies.…”
    Article
  8. 108

    Eurocentric fables of international debt and China. China report by Nayak, Bhabani Shankar

    Published 2024
    “…The article argues that it is time to democratise rules, regulations and institutions that govern international debt to ensure egalitarian political economy of development focusing on people and the planet. …”
    Get full text
    Article
  9. 109

    Regulation of labour market intermediaries and the role of social partners in preventing trafficking of labour by Paraskevopoulou, Anna, Fromm, Andrea, Clark, Nick

    Published 2016
    “…This report aims to contribute to the development of a best practice guide for public authorities on monitoring and enforcing rules and regulations relevant to labour market intermediaries to prevent trafficking for labour exploitation. …”
    Get full text
    Monograph
  10. 110

    Westminister in Uk context by Haughey, Sean, Shephard, Mark, Stirbu, Diana

    Published 2025
    “…Initiated in 1998, devolution transferred certain powers to legislatures in Scotland, Wales, and Northern Ireland, enabling a degree of self-rule over domestic affairs. Though subordinate to Westminster, these legislatures are now integral to the UK’s parliamentary system. …”
    Get full text
    Book Section
  11. 111

    “Time out”: a strategy for reducing men’s violence against women in relationships? by Wistow, Richard, Kelly, Liz, Westmarland, Nicole

    Published 2016
    “…We describe three ways in which the technique was used: first, as intended, to interrupt potential physical violence; second, through the effective adaption of the time-out rules by victim-survivors; and finally, misappropriation by some men to continue and extend their controlling behaviors. …”
    Get full text
    Article
  12. 112

    The protection of confidentiality in arbitration: balancing the tensions between commerce and public policy by Brown, Julian Christopher Patric

    Published 2021
    “…A comparative analysis is conducted of arbitral confidentiality in jurisdictions outside England and Wales, and the rules and terms of selected arbitral institutions worldwide. …”
    Get full text
    Thesis
  13. 113

    Political prisoners in contemporary Georgia by Koroteev, Kirill

    Published 2010
    “…After coming to power, President Saakashvili released those who had been considered as political prisoners under the rule of President Shevarnadze, but the policies of the new administration against the opposition forced civil society to raise the issue anew. …”
    Get full text
    Article
  14. 114

    Fact-finding missions : the Strasbourg experience by Paraskeva, Costas

    Published 2010
    “…However, in 2003, the ECtHR introduced an annex to its Rules of Court which deals specifically and in some detail with the conduct of such investigations.…”
    Get full text
    Article
  15. 115

    The secret language of objects: Geraldo De Barros's industrial design by Oropallo, Gabriele

    Published 2013
    “…The relation between user and object is non-verbal and non-narrative, as a form of education it is powerful in that it is ruled by its own time.…”
    Get full text
    Book Section
  16. 116
  17. 117
  18. 118

    Ontological foundations of modelling security policies for analysis by Bataityte, Karolina, Vassilev, Vassil, Gill, Olivia

    Published 2020
    “…Key concepts are the situations, actions, events and rules. Our framework has potential use for analysis of a wide range of transactional systems within the financial, commercial and business domains and further work will include analytical level where we can perform vulnerability analysis of the model.…”
    Get full text
    Conference or Workshop Item
  19. 119

    An investigation into student sense of belonging at a post-1992 university by Curran, John G. M.

    Published 2016
    “…The resulting analysis is influenced by Bourdieu's concepts of habitus, field, capital and knowledge of the rules of the game, which are used to explore the impact of student dispositions on their experiences and perceptions of belonging. …”
    Get full text
    Thesis
  20. 120

    Validation of the short flow in work scale (SFWS) by Moneta, Giovanni B.

    Published 2017
    “…Study 2 used confirmatory factor analysis on two-wave data gathered from 101 workers, and corroborated the factor structure, ruled out response styles, and established scalar invariance across administrations. …”
    Get full text
    Article