Search results for "Justice"

showing 10 items of 1379 documents

What Human Rights are not (Or not Only). A Negative Path to Human Rights Practice

2014

What human rights are not (or not only) could offer an inclusive and intersectional approach able to get together the different dimensions (moral, legal, social ones) of the international and domestic practice of protecting individuals against violations and discriminations. The book aims at offering an overview of the current phase of the protection of rights, its relationships with and differences from natural rights and liberal rights of the Western tradition, an approach to their content and their possible uses in the domestic and international domain.

Theories of RightsJusticeHuman RightInternational Community
researchProduct

Introduction: Security, Criminal Justice and Human Rights in Countering Terrorism in the Post 9/11 Era

2012

In the aftermath of the 9/11 attacks on New York and Washington, many commentators claimed that the world had changed ‘forever’ with international terrorism constituting one of the defining global security challenges of the twenty-first century. The renewed focus on counter-terrorism law and policy also called into question whether the lessons drawn from previous terrorism emergencies are pertinent to the post-9/11 environment. Indeed, to what extent, if at all, are the principles identified for the liberal democratic response to traditional forms of terrorism applicable to a response to contemporary international terrorism? The historical, political and security implications of 9/11 notwit…

Theory of criminal justicePoliticsHuman rightsLawPolitical sciencemedia_common.quotation_subjectTerrorismPolitical violenceInternational securityDemocracyCriminal justicemedia_common
researchProduct

Minimal forbidden words and factor automata

1998

International audience; Let L(M) be the (factorial) language avoiding a given antifactorial language M. We design an automaton accepting L(M) and built from the language M. The construction is eff ective if M is finite. If M is the set of minimal forbidden words of a single word v, the automaton turns out to be the factor automaton of v (the minimal automaton accepting the set of factors of v). We also give an algorithm that builds the trie of M from the factor automaton of a single word. It yields a non-trivial upper bound on the number of minimal forbidden words of a word.

TheoryofComputation_COMPUTATIONBYABSTRACTDEVICESfailure functionfactor code[INFO.INFO-DS]Computer Science [cs]/Data Structures and Algorithms [cs.DS]Büchi automatonComputerApplications_COMPUTERSINOTHERSYSTEMS[INFO.INFO-DS] Computer Science [cs]/Data Structures and Algorithms [cs.DS]0102 computer and information sciencesavoiding a wordω-automaton01 natural sciencesfactorial languageReversible cellular automatonCombinatoricsDeterministic automatonanti-factorial languageNondeterministic finite automaton0101 mathematicsMathematicsfactor automatonPowerset constructionLevenshtein automaton010102 general mathematicsforbidden wordComputer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing)16. Peace & justiceNonlinear Sciences::Cellular Automata and Lattice GasesTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES010201 computation theory & mathematicsProbabilistic automatonPhysics::Accelerator PhysicsComputer Science::Programming LanguagesHigh Energy Physics::ExperimentComputer Science::Formal Languages and Automata Theory
researchProduct

Properties and constraints of cheating-immune secret sharing schemes

2006

AbstractA secret sharing scheme is a cryptographic protocol by means of which a dealer shares a secret among a set of participants in such a way that it can be subsequently reconstructed by certain qualified subsets. The setting we consider is the following: in a first phase, the dealer gives in a secure way a piece of information, called a share, to each participant. Then, participants belonging to a qualified subset send in a secure way their shares to a trusted party, referred to as a combiner, who computes the secret and sends it back to the participants.Cheating-immune secret sharing schemes are secret sharing schemes in the above setting where dishonest participants, during the recons…

TheoryofComputation_MISCELLANEOUSHomomorphic secret sharingCryptography0102 computer and information sciences02 engineering and technologyShared secretComputer securitycomputer.software_genre01 natural sciencesSecret sharingCheating0202 electrical engineering electronic engineering information engineeringDiscrete Mathematics and CombinatoricsSecret sharingMathematicsbusiness.industryApplied MathematicsCryptographic protocol16. Peace & justiceShamir's Secret Sharing010201 computation theory & mathematicsResilient functionsCryptographySecure multi-party computation020201 artificial intelligence & image processingVerifiable secret sharingbusinesscomputerDiscrete Applied Mathematics
researchProduct

L'équité en éducation selon les théories de la justice

2000

International audience; Quelles inégalités, dans le domaine de l'éducation, peut-on tenir pour compatibles avec la justice ? Les réponses que proposent les différentes théories de la justice diffèrent. Certaines de ces réponses sont présentées, en prenant comme pivot la théorie de Rawls : celles des théories qu'il critique (utilitarisme, intuitionnisme), puis celle de la Théorie de la Justice, puis celles des théories qui se proposent de la critiquer ou de la dépasser (Walzer, Nozick, Sen). On argumente en conclusion en faveur de la réponse rawlsienne.

Théorie de la justice[SHS.EDU]Humanities and Social Sciences/Education[SHS.EDU] Humanities and Social Sciences/EducationJustice socialeEquité
researchProduct

Prejudiciālie nolēmumi Eiropas Savienībā: aktuālie problēmjautājumi un tiesiskā regulējuma pilnveidošanas iespējas

2013

Elektroniskā versija nesatur pielikumus

Tiesību piemērošanaCourt of Justice of the European CommunitiesTiesību zinātneJuridiskā zinātne
researchProduct

Oxygen uptake kinetics and energy system's contribution around maximal lactate steady state swimming intensity

2017

Made available in DSpace on 2018-11-26T17:20:55Z (GMT). No. of bitstreams: 0 Previous issue date: 2017-02-28 Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) Ministry of Education of Brazil The purpose of this study was to examine the oxygen uptake ((V) over dotO(2)) kinetics and the energy systems' contribution at 97.5, 100 and 102.5% of the maximal lactate steady state (MLSS) swimming intensity. Ten elite female swimmers performed three-to-five 30 min submaximal constant swimming bouts at imposed paces for the determination of the swimming velocity (v) at 100% MLSS based on a 7 x 200 m intermittent incremental protocol until voluntary exhaustion to find the v associated…

Time FactorsAnaerobic ThresholdPhysiologyVelocitylcsh:MedicinePathology and Laboratory MedicineOxygenBiochemistryOxygen uptake kinetics0302 clinical medicineMedicine and Health SciencesPublic and Occupational Healthlcsh:ScienceFatigueMultidisciplinaryChemistryPhysicsTime constantClassical Mechanics16. Peace & justiceSports ScienceBody FluidsChemistryvVO2maxBloodPhysical SciencesLactatesFemaleAnatomyAnaerobic exerciseResearch ArticleChemical ElementsSportsAdolescentchemistry.chemical_elementBioenergetics03 medical and health sciencesYoung AdultMotionAnimal scienceOxygen ConsumptionSigns and SymptomsDiagnostic MedicineHumansLactic AcidSports and Exercise MedicineEnergy systemExerciseSwimmingBehaviorBiological Locomotionlcsh:RBiology and Life Sciences030229 sport sciencesPhysical ActivityIntensity (physics)OxygenKineticsAthletesPhysical FitnessExercise TestPhysical EnduranceRecreationlcsh:QSteady state (chemistry)Energy Metabolism030217 neurology & neurosurgery
researchProduct

Smooth surjections and surjective restrictions

2017

Given a surjective mapping $f : E \to F$ between Banach spaces, we investigate the existence of a subspace $G$ of $E$, with the same density character as $F$, such that the restriction of $f$ to $G$ remains surjective. We obtain a positive answer whenever $f$ is continuous and uniformly open. In the smooth case, we deduce a positive answer when $f$ is a $C^1$-smooth surjection whose set of critical values is countable. Finally we show that, when $f$ takes values in the Euclidean space $\mathbb R^n$, in order to obtain this result it is not sufficient to assume that the set of critical values of $f$ has zero-measure.

TopologíaPure mathematicsmetric spaces46B80 46T20General Mathematicssmooth surjective mappingBanach spacesurjective restrictionnonlinear quotient01 natural sciencesfunctional analysisSurjective functionuniformly open mapMathematics - Metric GeometryFOS: MathematicsMathematics (all)Order (group theory)Countable set0101 mathematicsAnálisis funcional y teoría de operadoresDensity character; Nonlinear quotient; Smooth surjective mapping; Surjective restriction; Uniformly open map; Mathematics (all)MathematicsEuclidean spaceta111010102 general mathematicsMetric Geometry (math.MG)16. Peace & justicemetriset avaruudetFunctional Analysis (math.FA)Mathematics - Functional Analysis010101 applied mathematicsCharacter (mathematics)density characterfunktionaalianalyysiBijection injection and surjectionSubspace topology
researchProduct

Management and educational practices in re-education centers of Comunitat Valenciana

2014

[EN] In the present communication aspects that define the political rehabilitation of Valencia are analyzed. The role of rehabilitation centers and educational practices are evaluated, for it’s taken as indicators as coordination mechanisms with the open environment, relations with the community, the proportion of investment spending and public administration performed on the juvenile justice system, the public policy commitment to integration of teen in conflict with the law, etc. The research is mainly qualitative, based on the analysis of in-depth professional and life stories of teens complemented with documentary data provided background information. The main conclusion suggests that t…

Trabajo Social y Servicios SocialesComunidad Juvenile JusticeComunidadOrganic ChemistryJuvenile justiceModelos de intervenciónCommunityIntervention modelsResponsabilidad PúblicaIntervention ModelsBiochemistryJusticia juvenilPublic ResponsibilityEducació socialResponsabilidad públicaJusticia JuvenilPublic responsibilityModelos de Intervención
researchProduct

Re-education policy in the Comunitat Valenciana region: an analysis of educational practices in juvenile justice centers

2013

En el presente artículo se analizan aspectos que definen la política de reeducación de la Comunitat Valenciana. Se examina el papel de los Centros de Reeducación y sus prácticas educativas, para ello se toma como indicadores: los mecanismos de coordinación con el medio abierto, las relaciones con la comunidad, la proporción del gasto e inversión que la administración pública realiza sobre el sistema de justicia juvenil, el compromiso de las políticas públicas con la integración de los Adolescentes en Conflicto con la Ley, etc. La investigación es fundamentalmente cualitativa, basada en el análisis de entrevistas en profundidad de profesionales y de relatos de vida de adolescentes complement…

Trabajo Social y Servicios SocialesHealth (social science)Sociology and Political ScienceComunidadEducació i delinqüènciaTreball social amb els jovesSocial SciencesJuvenile justiceModelos de intervenciónCommunityIntervention modelsJusticia juvenilPublic responsabilityHResponsabilidad públicaSocial Sciences (miscellaneous)
researchProduct