Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "proxy" wg kryterium: Temat


Tytuł:
Niekonstytucyjność art. 4241 § 1 K.P.C. – Studium przypadku
Unconstitutionality of article 4241 § 1 of civil proceedings law – case study
Autorzy:
Michta, Dariusz
Powiązania:
https://bibliotekanauki.pl/articles/1179738.pdf
Data publikacji:
2018
Wydawca:
Państwowa Wyższa Szkoła Zawodowa w Raciborzu
Tematy:
plaint
damage
judgment
litigant
proxy
Opis:
Author considers if Article 4241 § 1 of Civil Proceedings Law is contrary to Basic Law, when it reduces possibility of placing plaint for identifying inconsistency with law of valid court decision in case when ,by its rendering, only one litigant suffered a damage. Law mentioned previously indicates that demanding of identifying inconsistency with law of valid court decision of second instance ending proceedings in process, is possible if by its rendering, litigant suffered a damage and a change or repeal of the judgement by tenable legal means wasn’t and is still not possible. Author shows that mentioned law doesn’t warrant placing a plaint to identify inconsistency with law of valid court decision, in case when by its rendering damage wasn’t done to litigant, but to assigned proxy representing litigant.
Źródło:
Eunomia – Rozwój Zrównoważony – Sustainable Development; 2018, 1(94); 63-68
1897-2349
2657-5760
Pojawia się w:
Eunomia – Rozwój Zrównoważony – Sustainable Development
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
LAW APPLICABLE FOR THE REPRESENTATIONTO EXERCISE THE CORPORATE RIGHTS OF SHAREHOLDERSIN POLISH COMPANIES
Autorzy:
Tapek, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/915878.pdf
Data publikacji:
2017
Wydawca:
Katolicki Uniwersytet Lubelski Jana Pawła II
Tematy:
representation
proxy
law applilcable
shareholder
Opis:
Shareholders of Polish companies dispose of various rights – property as well as corporate. Majority of corporate rights can be exercised by a representative. Representation, in this regard includes two categories: proxy and statutory rep-resentation. Regulations concerning representation vary, depending on kind of company in which they are used (limited liability companies, joint – stock com-panies or public companies, whose regulation is influenced by European law). In current study representation to exercise corporate rights of shareholders will be examined on the meta-law level. Provisions of international private law shall be observed to determine that which country’s legal regime shall be applied to interpret the institution of representation in cross-border situations. Additionally, it is necessary to distinguish the scopes of laws applicable for different issues connected with representation. The dissertation is aimed to address all abovementioned questions with the reference to European and Polish law.
Źródło:
Review of European and Comparative Law; 2017, 28, 1; 129-160
2545-384X
Pojawia się w:
Review of European and Comparative Law
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Countering terrorism in the shadows: The role of private security and military companies
Autorzy:
Hlouchova, Iveta
Powiązania:
https://bibliotekanauki.pl/articles/1194366.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
security
regulations
privatization
counterterrorism
proxy
Opis:
The article identifies the main features of the PSMCs’ involvement in counterterrorism operations and outlines what their future involvement might look like with its implications for international peace and security. The main methods used to gather data and to draw inferences are a content analysis of relevant primary and secondary sources, and a discourse analysis, used as a method of examining the prevailing discourse surrounding the activities of PSMCs, seeking to understand the level of transparency, accountability and attributability of these actors. So far, the PSMCs’ potential for counterterrorism has not been fully exploited. There are many challenges surrounding the existence and operations of PSMCs, mainly lack of transparency and accountability, the continuous significance of the plausible deniability and political expediency PSMCs provide to nation governments, and an insufficient and inadequate international regulatory and control framework with no sanction or enforcement mechanisms. Most recently, the tendency to re-legitimise PSMCs’ activities can be identified. There will most probably be an expansion of PSMCs’ activities in the near future, as climate change consolidates security as a commodity, not a right. Therefore, there is a renewed urgency for adequate and effective international regulatory and control mechanisms on their activities on the international level.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 155-169
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ID-based, Proxy, Threshold Signature Scheme
Autorzy:
Pomykała, Jacek
Kułakowski, Henryk
Sapiecha, Piotr
Grela, Błażej
Powiązania:
https://bibliotekanauki.pl/articles/1844644.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
ID-based
proxy
threshold
signature
scheme
Opis:
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. The description of the system architecture and the possible application of the protocol in edge computing designs is enclosed.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 2; 201-205
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Automatic proxy generation and load-balancing-based dynamic choice of services
Autorzy:
Dąbrowski, J.
Feduniak, S.
Baliś, B.
Bartyński, T.
Funika, W.
Powiązania:
https://bibliotekanauki.pl/articles/305465.pdf
Data publikacji:
2012
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
proxy
load-balancer
load balancing
automatic generation
Opis:
The paper addresses the issues of invoking services from within workflows which are becoming an increasingly popular paradigm of distributed programming.The main idea of our research is to develop a facility which enables load balancing between the available services and their instances. The system consists of three main modules: a proxy generator for a specific service according to its interface type, a proxy that redirects requests to a concrete instance of the service and load-balancer (LB) to choose the least loaded virtual machine (VM) which hosts a single service instance. The proxy generator was implemented as a bean (in compliance to EJB standard) which generates proxy according to the WSDL service interface description using XSLT engine and then deploys it on a GlassFish application server using GlassFish API, the proxy is a BPEL module and load-balancer is a stateful Web Service.
Źródło:
Computer Science; 2012, 13 (3); 45-59
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Outsourcing warfare: Proxy forces in contemporary armed conflicts
Autorzy:
Wither, James K.
Powiązania:
https://bibliotekanauki.pl/articles/1194386.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Iran
United States
Russia
proxy forces
great power competition
Opis:
The aim of this article is to provide a comprehensive examination of the different types of armed non-state proxy groups. It discusses their characteristics and sponsorship and how they are employed by states in pursuit of their security and foreign policy objectives. The article also analyses the reasons for the recent increase in the use of proxy forces, including the benefits and risks for states that employ them, as well as the broader impact of proxy forces on the international security environment, including great power competition. Data was collected and analysed from a wide range of secondary source documents. A descriptive, qualitative research methodology was applied to print and on-line publications available from governmental, institutional and academic sources. This involved literature reviews and case studies to provide an in-depth understanding of current thinking on the topic, while also identifying potential areas for further research. The article provides a comprehensive, qualitative analysis of the existing literature and case studies on the topic of proxy forces, which due to the research methodology applied, also relies on the researcher’s judgement, choices and assumptions. Proxy wars will remain the norm for the foreseeable future. Two strategic developments drive this conclusion. Firstly, there is the renewal of great power competition for influence, resources and security, and secondly, the imperative for states to achieve these objectives without employing their military forces in a manner that could cause a major war.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 17-34
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Game of Proxies – Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine
Autorzy:
Kozera, Cyprian A.
Bernat, Paweł
Gürer, Cüneyt
Popławski, Błażej
Sözer, Mehmet A.
Powiązania:
https://bibliotekanauki.pl/articles/1194387.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Proxy Forces
Libya
Mali
Syria
Ukraine
Central African Republic
Opis:
The objective of the study is to carry out a meaningful comparison that demonstrates the similarities and differences of various conflict theatres where proxy forces were employed. The analyses of the discussed cases focused on different aspects of the conflict and nature of the proxy use. The analyses presented on the following pages were conducted on the basis of the literature on the subject, governmental research and reports, and supporting sources reporting recent developments that complemented academic sources. Various non-state actors such as ethnic militias, paramilitary units, and private military companies have become more and more visible on contemporary battlegrounds. Modern states employ those actors to further their objectives, as this limits their own political and financial costs. This increasingly visible phenomenon points to an emerging new model of warfare where state actors are relying ever more on proxies of various character and nature. It is highly likely that any future conflict will be characterised by a proxy-based model of warfare, which will consist of a limited footprint made by regular forces (or none at all) and, consequently, the extended use of proxies supported by special forces. Because such an approach is less costly, proxies will be more often employed by low-budget states, previously reluctant to carry out such costly military endeavours. Denying the actions and affiliations of these proxies will inevitably follow and, in turn, a lack of political accountability and responsibility for the conflict’s outcome.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 77-97
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Differentiated Service Model-Supported Cluster-Based Routing in Wireless Sensor Networks
Autorzy:
Agarkhed, Jayashree
Dattatraya, Patil Yogita
Patil, Siddarama
Powiązania:
https://bibliotekanauki.pl/articles/307674.pdf
Data publikacji:
2020
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
clustering
energy efficiency
proxy server
TDMA
wireless sensor networks
Opis:
Wireless Sensor Network finds its extensive use in healthcare applications for the transfer of time-critical data through wireless connectivity. The primary cause of network failure is the transfer of time-critical multimedia data. The article presents a new dfferentiated service modelsupported (DSM) cluster-based routing in wireless sensor networks (WSNs) that overcomes the above issue. DSM prioritizes the transfer of dfferent flow types based on packet type and packet size. The employment of computational offlading minimizes delay for critical and small-sized data packets and by carrying out data reduction of large-sized packets at proxy server. It outperforms the existing protocols in terms of energy efficiency, throughput, and reliability by prioritizing the transfer of time-critical health application data.
Źródło:
Journal of Telecommunications and Information Technology; 2020, 3; 1-9
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Turkey’s approach to proxy war in the Middle East and North Africa
Autorzy:
Yüksel, Engin
Powiązania:
https://bibliotekanauki.pl/articles/1194375.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Turkey
strategy
proxy war
Middle East and North Africa
Opis:
The last decade has seen a growing trend towards the use of proxies in the Middle East and North Africa following the outbreak of the Arab Spring. In this context, the issue of Turkey’s approach to proxy war in these regions has received considerable attention since 2016. Thereby, the purpose of this article is to investigate the essential characteristics of Turkish proxy war strategy in Syria and Libya. As such, this study intends to trace the development of Turkish proxy war strategy by making use of the conceptual frameworks proposed by Groh (2019), O’Brien (2012) and Art (1998). The most obvious finding to emerge from the analysis is that Turkey changed its indirect intervention strategy from donated assistance to proxy warfare in Syria and Libya when it saw a greater need to influence the result of the conflicts. In the case of Syria, this study has shown that the controlthrough-centralisation approach towards the Armed Syrian Opposition has enabled Turkey to carry out an effective proxy war strategy from 2016 onwards. In Libya, the results of this investigation have shown that theTurkish Army has pursued a proxy war strategy since Ankara and the Government of National Accord (GNA) signed an agreement on security and military cooperation in December 2019. The article concludes that Turkey has centralised many revolutionary groups under an Islamist-nationalistic vision and partnered them with its own military in order to expand its influence in the Middle East and North Africa.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 137-152
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Changing the character of proxy warfare and its consequences for geopolitical relationships
Autorzy:
Ivanov, Zoran
Powiązania:
https://bibliotekanauki.pl/articles/1194383.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
state
Proxy force
technologic empowerment
political relationships
geopolitical environment
Opis:
The main purpose of the article is to examine the causal relationship between key elements of the geostrategic environment (i.e. political, military, and technological) and the changes in the characteristics of proxy force. Qualitative data analysis is used to identify the geopolitical environment conditions, actors, and their relationship. The causal analysis between key elements of the geopolitical environment, such as politics, military, and technological, therefore influences how proxy forces change character. The findings imply that the contemporary geopolitical environment is changing the character of the proxies. They can be used as multipurpose forces depending on the desired strategic outcome. The results advocate that proxies have a global reach beyond the traditional battlefield. These capabilities allow proxies to be used in a wide range of political, economic, and military activities, especially in peacetime, and, therefore, influencing, changing, and damaging the state’s mutual relationships. Despite differences between several theoretical perspectives of security theories, many concur on the low desirability of proxy force. The changing characteristics of proxy war allow state and non-state actors to wage war with a minimal use of force, or none at all, beyond the traditional battlefield. Political violence demonstrated through proxy force to fulfil foreign policy goals has become even more violent. In such action, disregarding the sustainable strategic goal can easily damage the state’s international relations and threaten international and regional stability. The overall findings show the urgency for a more holistic approach in the analysis of proxy warfare as part of security studies and military operations.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 37-51
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Operational control over non-state proxies
Autorzy:
Bryjka, Filip
Powiązania:
https://bibliotekanauki.pl/articles/1194384.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
proxy war
hybrid threats
surrogate forces
modern warfare
special operations
Opis:
The intention of this paper is to clarify how state patrons control non-state proxy forces fighting on their behalf. In order to address the subject matter thoroughly, specific attention was paid to a number of questions including a) the criteria determining patronproxy relations, b) factors influencing the selection process of proxy forces, and c) principles governing the maximisation of potential benefits of using proxies, whilst simultaneously reducing risks and associated costs. The author applied a neo-realistic research paradigm to his work. Patron-proxy relations were presented in the context of the principal-agent theory, as well as through detailed analysis of ongoing scenarios involving Iran and Hezbollah, Russia and the Donbass separatists, Pakistan and Kashmiri militias, the US and Syrian rebels. The essence of war by proxy is to influence the strategic result of an armed conflict without direct, full-scale, military intervention. The use of non-state proxy, external actors is aimed at maximising their political goals and strategic interests whilst maintaining “plausible deniability”. By supporting non-state proxies, indirectly or by providing limited direct assistance, sponsors operate below the threshold of war. Empirical analysis of proxy war cases proves that such models may both guarantee “strategic victory” or become a “double-edged sword”. One of the key challenges for external powers engaged in war by proxy is to avoid unintended consequences (blowback). The author argues that elements such as ideology, ethnicity or religion do not necessarily ensure control over proxies, whilst the range of common goals and interests, and the level of the proxy’s dependency, are crucial.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 191-210
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Enhance performance of web proxy cache cluster using cloud computing
Autorzy:
Alsaiari, N. O.
Fayoumi, A. G.
Powiązania:
https://bibliotekanauki.pl/articles/102085.pdf
Data publikacji:
2013
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
Web proxy cache cluster
resource utilization
load balancing
cloud computing
Opis:
Web caching is a crucial technology in Internet because it represents an effective means for reducing bandwidth demands, improving web server availability and reducing network latencies. However, Web cache cluster, which is a potent solution to enhance web cache system’s capability, still, has limited capacity and cannot handle tremendous high workload. Maximizing resource utilization and system capability is a very important problem in Web cache cluster. This problem cannot be solved efficiently by merely using load balancing strategies. Thus, along with the advent of cloud computing, we can use cloud based proxies to achieve outstanding performance and higher resource efficiency, compared to traditional Web proxy cache clusters. In this paper, we propose an architecture for cloud based Web proxy cache cluster (CBWPCC) and test the effectiveness of the proposed architecture, compared with traditional one in term of response time ,resource utilization using CloudSim tool.
Źródło:
Advances in Science and Technology. Research Journal; 2013, 7, 20; 2-10
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Late Pleistocene and Holocene environmental evolution of the Wkra River Valley near Bielawy Gołuskie (central Poland) recorded in palaeo-oxbow lake deposits
Autorzy:
Niska, M.
Jonczak, J.
Gadziszewska, J.
Powiązania:
https://bibliotekanauki.pl/articles/2060392.pdf
Data publikacji:
2017
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
oxbow lake
Wkra River
Polska
Multi-proxy analysis
Early Holocene
Opis:
This study aimed to reconstruct environmental changes in the Wkra River Valley near Bielawy Gołuskie (central Poland) based on geochemical, palynological and subfossil Cladocera analysis of deposits filling a palaeo-oxbow lake. Two sediment boreholes collected from the palaeochannel bend (BG-1) and neck (BG-2) include full sequences of organic deposits lying on clastic deposits. The lower part of the BG-1 borehole contains gyttja that accumulated during the Younger Dryas and the Preboreal, which is covered by reed peat of Preboreal and Boreal age. On top of this is alder peat that accumulated during the Atlantic. The ages of the gyttja and peat were confirmed by both radiocarbon dating and palynological analysis. The peats are characterized by a significant content of organic matter, which is relatively stable over time. This indicates a low intensity of mechanical denudation in the catchment, which is supported by low concentrations of aluminum and potassium. Calcium values greatly exceed these elements, suggesting that the lake was mainly fed by groundwater. Variation in trophic conditions over time is indicated by a vertical variability in the content of nitrogen, as well as by the Cladocera population. The strong decomposition of peat in the top layer of the mire, and increased concentrations of phosphorus and heavy metals, testify to increasing human activity during the most recent time periods.
Źródło:
Geological Quarterly; 2017, 61, 2; 305--318
1641-7291
Pojawia się w:
Geological Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Climate change and human impact in the southern Baltic during the last millennium reconstructed from an ombrotrophic bog archive
Autorzy:
Lamentowicz, Mariusz
Gałka, Mariusz
Pawlyta, Jacek
Lamentowicz, Łukasz
Goslar, Tomasz
Miotk-Szpiganowicz, Grażyna
Powiązania:
https://bibliotekanauki.pl/articles/2026706.pdf
Data publikacji:
2011
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Baltic bog
last millennium
multi-proxy
Polska
peatlands
raised bog
Opis:
We pres ent the last mil len nium of his tory of a peatland lo cated in north ern Po land. Our re sults are based on two rep li - cate mono liths taken from a Bal tic raised bog. We ap plied a high-res o lu tion ap proach and ra dio car bon dat ing to the peat ma te rial to ob tain a de tailed palaeoenvironmental re con struc tion. To re con struct past peatland mois ture, we used three prox ies: tes tate amoe bae, plant macrofossils and pol len. De spite dif fer ent peat ac cu mu la tion and ex ten sive hi a tus in the for merly stud ied core, both mono liths show a sim i lar pat tern of changes. How ever, the core from this study pro - vides us with more de tailed data on S. fuscum dis ap pear ance which cor re lates well with the data from the other Bal tic bog, S³owiñskie B³oto. Our re search shows that pris tine Bal tic bogs can be dated to AD 1350. S³owiñskie B³oto palaeohydrology con firms AD 1300 as the be gin ning of the hy dro log i cal dis tur bance. In the case of the St¹¿ki and S³owiñskie B³oto bogs, the Lit tle Ice Age (LIA) is re corded be tween AD 1500 and AD 1800. How ever, this cli ma tic change might have been blurred by hu man im pact. In the case of the Bal tic bogs, their ref er ence vir gin state can be dated to AD 1200. Af ter this date, we ob served in creas ing hu man im pact and cli ma tic in sta bil ity con nected with the LIA. How ever, be tween AD 1800 and 1900, bogs were wet, most pos si bly due to cli ma tic forc ing. This fact sug gests that de spite hu man im pact, re cent peat de pos its can still re flect cli mate. Our re search pro vided in for ma tion re lated to the time of ex is tence, lo ca tion and char ac ter is tics of the nat u ral/pris tine state. High-res o lu tion peatland palaeo ec ol ogy is cru cial for res to ra tion ac tiv i ties, e.g., rewetting and en vi ron men tal man age ment. The palaeohydrological con text (sup ported by other prox ies) of the last 1000 years pro vides a re li able an swer to the ques tion: ‘To rewet or not to rewet?’
Źródło:
Studia Quaternaria; 2011, 28; 3-16
1641-5558
2300-0384
Pojawia się w:
Studia Quaternaria
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Design of a rule based monetary policy in a Central Bank Digital Currency System
Autorzy:
Wijngaard, Jacob
Van Hee, Kees
Powiązania:
https://bibliotekanauki.pl/articles/14110259.pdf
Data publikacji:
2021-12-28
Wydawca:
Wyższa Szkoła Bankowa we Wrocławiu
Tematy:
Design
CBDC
Rule-based
Monetary policy
Inflation correction
Domestic product proxy
Opis:
Aim: This paper presupposes a purely Central Bank Digital Currency (CBDC) based system. Its aim is to describe how such a system facilitates complete new possibilities to design a suitable monetary policy. More specifically, the purpose is to show that the available monetary tools can be used to design a rule-based monetary policy that guarantees stability of purchasing power and interest rates. Research methods: The paper is design oriented. It describes how the monetary system could function The important monetary variables are defined and their relationship is described. To illustrate these variables and their relationship, simulation results of their behavior are added. Conclusions: It is shown that it is indeed possible to design a monetary policy that is rule based and guarantees stability of purchasing power and interest rates. Crucial elements in the design are linking the balances of the CBDC-accounts to a proxy of the domestic product and replacing the use of government bonds by allowing the government to borrow from the Central Bank and giving households and businesses the opportunity to open a savings account at the Central Bank. Originality: The approach is completely new. It is the result of rethinking the possibilities of a complete transition of bank money to CBDC. Implications: The paper shows that a more absolute transition to the use of CBDC makes it possible to establish a clearer and more stable monetary practice, and that it is necessary therefore to revise monetary theory.
Źródło:
Central European Review of Economics and Management; 2021, 5, 4; 61-95
2543-9472
Pojawia się w:
Central European Review of Economics and Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On the Multiple Varieties, Consequences and Paradoxes of the Commodification of Nature
Autorzy:
Ziółkowski, Marek
Baranowski, Mariusz
Drozdowski, Rafał
Powiązania:
https://bibliotekanauki.pl/articles/1790370.pdf
Data publikacji:
2020-09-29
Wydawca:
Polskie Towarzystwo Socjologiczne
Tematy:
commodification
nature
proxy commodification
Karl Polanyi
fictitious commodity
climate services markets
Opis:
The article aims to characterise the variety of processes and mechanisms of nature commodification from a sociological perspective. Its general theoretical framework is based on Karl Polanyi’s The Great Transformation and the economic-sociological theory of ownership, on the basis of which the social, economic and political determinants, actual modalities, and especially the intended and unintended social and ecological consequences and paradoxes of the processes of nature commodification and decommodification are analysed. This analysis (running across unilateral typologies and approaches), tries to go beyond the narrow and one-sided characteristics of complex practices of human impact on nature, taking into account both their positive and negative consequences where the robbery policy of conquering nature is mixed with attempts of protecting it. The general theoretical argument is illustrated by concrete examples and in particular by Poland’s experiences, both from the period of real socialism and the post-socialist transformation.
Źródło:
Polish Sociological Review; 2020, 211, 3; 281-300
1231-1413
2657-4276
Pojawia się w:
Polish Sociological Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
CZY ALTERNATYWNE METODY GŁOSOWANIA I INNE UŁATWIENIA WYBORCZE MOGĄ ROZWIĄZAĆ PROBLEM PRZYMUSOWEJ ABSENCJI WYBORCZEJ? REFLEKSJE I SPOSTRZEŻENIA OSOBY NIEPEŁNOSPRAWNEJ W ŚWIETLE WYBORÓW SAMORZĄDOWYCH 2014
CAN ALTERNATIVE VOTING METHODS AND OTHER FACILITIES SOLVE THE PROBLEM OF FORCED VOTER ABSENCE? INSIGHTS FROM A DISABLED PERSON REGARDING THE LOCAL ELECTIONS OF 2014
Autorzy:
Jankowska, Magdalena
Powiązania:
https://bibliotekanauki.pl/articles/513039.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Rzeszowski. Wydawnictwo Uniwersytetu Rzeszowskiego
Tematy:
Electoral Code
alternative voting methods
postal voting
proxy voting
local elections
Opis:
The fundamental claim which accompanied the implementation of alternative vot-ing methods into the Polish Law was the guarantee of the fullest realization of the uni-versal suffrage. The current regulations of the Electoral Code allow people with disabili-ties to vote by mail or by proxy. This deviation from the rule of voting personally in a polling station and enfranchising people with disabilities is a clear sign of the adapta-tion of Polish reality to Western European standards. The enactment of the law and implementation of additional legal solutions are only the first step to a greater change. The current challenges of electoral law are both perfect-ing the new voting methods and educating voters to compel them to vote; that is to exer-cise their constitutional privilege.
Źródło:
Polityka i Społeczeństwo; 2015, 13, 3; 69-81 (13)
1732-9639
Pojawia się w:
Polityka i Społeczeństwo
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Changes in habitat conditions in a Late Glacial fluviogenic lake in response to climatic fluctuations (Warta River valley, central Poland)
Autorzy:
Forysiak, Jacek
Okupny, Daniel
Obremska, Milena
Antczak-Orlewska, Olga
Płóciennik, Mateusz
Pawłowski, Dominik
Baradyn, Daria
Kotrys, Bartosz
Luoto, Tomi P.
Nevalainen, Liisa
Borówka, Ryszard K.
Powiązania:
https://bibliotekanauki.pl/articles/13955341.pdf
Data publikacji:
2023
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
multi-proxy analysis
Late Weichselian
denudation processes
palaeoclimate
central European river
Opis:
The Warta River valley was greatly influenced by the ice sheet of the Last Glacial Maximum (LGM). A small peatland located in the Warta drainage system is here used as a palaeoarchive of climatic and habitat changes during the Late Glacial (Weichselian). The Ługi sediment profile was investigated using multi-proxy (pollen, Chironomidae, Cladocera and geochemistry) analyses that recorded changes in a fluviogenic sedimentary depression. After the Poznań Phase (LGM), Ługi functioned as an oxbow lake that was cut off from the active river channel as a result of fluvial erosion. Since that time, the Warta River has flowed only along the section now occupied by the Jeziorsko Reservoir. Sedimentation of lacustrine deposits started at the beginning of the Late Glacial. Summer temperature reconstructions indicate cool Oldest and Younger Dryas, but no clear cooling in the Older Dryas. During the Younger Dryas the palaeolake was completely occupied by a peatland (fen), which periodically dried out during the Holocene. Investigation of this site has tracked the reaction of the habitat to climatic, hydrological and geomorphological changes throughout the Late Weichselian.
Źródło:
Geological Quarterly; 2023, 67, 1; art. no. 1
1641-7291
Pojawia się w:
Geological Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Measurements of QoS/QoE parameters for media streaming in a PMIPv6 testbed with 802.11 b/g/n WLANs
Autorzy:
Hoeft, M.
Gierlowski, K.
Gierszewski, T.
Konorski, J.
Nowicki, K.
Wozniak, J.
Powiązania:
https://bibliotekanauki.pl/articles/220593.pdf
Data publikacji:
2012
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
media streaming
mobility
Proxy Mobile IPv6
IEEE 801.11
QoS/QoE
Opis:
The growing number of mobile devices and the increasing popularity of multimedia services result in a new challenge of providing mobility in access networks. The paper describes experimental research on media (audio and video) streaming in a mobile IEEE 802.11 b/g/n environment realizing network-based mobility. It is an approach to mobility that requires little or no modification of the mobile terminal. Assessment of relevant parameters has been conducted in an IPv6 testbed. During the tests, both Quality of Service (QoS) and Quality of Experience (QoE) parameters have been considered. Against the background of standard L3 and L2 handovers, an emerging mobility solution named Proxy Mobile IPv6 (PMIPv6) has been examined. Its advantages (L3 connectivity maintenance) and disadvantages (packet loss during handover) are emphasized based on the obtained results. Moreover, a new solution for handover optimization has been proposed. A handoff influence upon audio/video generation and transfer imperfections has been studied and found to be an interesting direction of future work.
Źródło:
Metrology and Measurement Systems; 2012, 19, 2; 283-294
0860-8229
Pojawia się w:
Metrology and Measurement Systems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Wpływ nowelizacji art. 39 k.c. na zasady reprezentowania spółki kapitałowej w umowach pomiędzy spółką a jej członkiem zarządu
Impact of amendment to art. 39 of the Civil Code on the principles of representing a capital company in contracts between the company and member of the management board
Autorzy:
Wyrzykowski, Wojciech
Powiązania:
https://bibliotekanauki.pl/articles/1041737.pdf
Data publikacji:
2020-01-31
Wydawca:
Polskie Wydawnictwo Ekonomiczne
Tematy:
spółka kapitałowa
zarząd
pełnomocnik
reprezentacja spółki
capital company
management board
proxy
company representation
Opis:
Reprezentacja spółek kapitałowych przy czynnościach zawieranych z członkami zarządu stanowi niezwykle istotną i doniosłą praktycznie problematykę. W literaturze przedmiotu oraz orzecznictwie odnaleźć można wiele przeciwstawnych poglądów dotyczących skutków naruszenia zasad wyrażonych w art. 210 i art. 379 Kodeksu spółek handlowych. Kwestią sporu jest tu możliwość potwierdzania czynności dokonanych z naruszeniem powołanych norm. Sprawa ta nabiera jeszcze bardziej aktualnego znaczenia z uwagi na fakt, że w 2018 r. dokonano nowelizacji w tym zakresie przepisów Kodeksu cywilnego. W artykule podjęto próbę określenia zatem wpływu nowelizacji art. 39 k.c. na zasady reprezentacji spółki kapitałowej w umowach i sporach pomiędzy spółką a jej członkami zarządu.
The representation of capital companies in the activities concluded with members of the management board is an extremely important and practically significant issue. In the literature we can find a number of opposing views regarding the effects of violation of the principles expressed in art. 210 and 379 Commercial and Company Code. The issue of dispute here is the possibility of confirming actions carried out in violation of the standards referred to. This issue is even more relevant due to the fact that in 2018 the provisions of the Civil Code were amended in this respect. The article attempts to determine the impact of the amendment to art. 39 Civil Code on the principles of representing a capital company in contracts and disputes between the company and its members of the management board.
Źródło:
Przegląd Ustawodawstwa Gospodarczego; 2020, 1; 23-28
0137-5490
Pojawia się w:
Przegląd Ustawodawstwa Gospodarczego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Münchhausenov syndrómv zastúpení v kontexte psychiatrických diagnóz
Autorzy:
Ďurkovský, Peter
Powiązania:
https://bibliotekanauki.pl/articles/2141354.pdf
Data publikacji:
2011
Wydawca:
Instytut Studiów Międzynarodowych i Edukacji Humanum
Tematy:
Anamnesis
Child abuse and neglect syndrome
Münchhausen syndrome by proxy
Social work
Violence
Opis:
Münchhausen syndrome by proxy is keeping back form of child abuse and neglect syndrome. Everyone keeps silent about it. Charitable professions keep silent about it too. Lot of charitable professions dont ́ have scientific foundation. Child is victim for parents and charitable professions. Disclousure of Münchhausen syndrome by proxy menace for lot of people. They are afraid of unemployment.
Źródło:
Humanum. Międzynarodowe Studia Społeczno-Humanistyczne; 2011, 1(6); 193-198
1898-8431
Pojawia się w:
Humanum. Międzynarodowe Studia Społeczno-Humanistyczne
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
NoPASARAN: a Novel Platform for Analysing Semi-Active elements in Routes Across a Network
Autorzy:
Benhabbour, Ilies
Dacier, Marc
Powiązania:
https://bibliotekanauki.pl/articles/27294199.pdf
Data publikacji:
2022
Wydawca:
NASK - National Research Institute
Tematy:
conformance
firewall
IPsec
Man-in-the-Middle
network
proxy
security
TLS
zgodność
sieć
bezpieczeństwo
Opis:
In this paper, we propose a novel, collaborative distributed platform to discover the presence, or analyse the configuration, of what we call semi-active elements. By doing so, we revisit the ideas initially proposed in [1, 2] with the Netalyzr tool and in [3] with Inmap-t. Our contributions lie in a simplified and more powerful design that enables the platform to be used for a variety of tasks, such as conformance verification, security testing, network configuration understanding, etc. The specifications, design and implementation choices of the platform are presented and discussed. Two use cases are revealed to illustrate how the platform can be used. We welcome any interest shown by others in deploying our tool in different environments, and encourage any subsequent collaboration in improving its expressiveness.
Źródło:
Applied Cybersecurity & Internet Governance; 2022, 1, 1; 1-25
2956-3119
2956-4395
Pojawia się w:
Applied Cybersecurity & Internet Governance
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Pełnomocnictwo do zawarcia małżeństwa w prawie kanonicznym i w polskim prawie cywilnym
The Mandate to Contract Marriage in Canon and Polish Civil Law
Autorzy:
Szustak, Sławomir
Powiązania:
https://bibliotekanauki.pl/articles/2029024.pdf
Data publikacji:
2017
Wydawca:
Katolicki Uniwersytet Lubelski Jana Pawła II. Towarzystwo Naukowe KUL
Tematy:
małżeństwo
pełnomocnik
pełnomocnictwo
prawo kanoniczne
prawo cywilne
marriage
proxy
mandate
canon law
civil law
Opis:
Możliwość zawarcia małżeństwa przez pełnomocnika jest instytucją sięgającą prawa rzymskiego, kanonizowaną na gruncie prawa kościelnego. Jako pierwszy o takiej możliwości w prawie kanonicznym wspominał Gracjan. Szczegółowo tę kwestię uregulował dopiero KPK/17 w kan. 1089-1091. Ustawodawca w KPK/83 w kan. 1105 potwierdza wcześniejsze regulacje. Określa zadania pełnomocnika i mocodawcy oraz cechy pełnomocnictwa, które jest wyjątkową formą zawarcia małżeństwa. Taką samą możliwość daje polskie prawo cywilne, stawiając jednak pełnomocnictwu nieco inne wymagania. KKKW pozostawia tę kwestię do rozstrzygnięcia poszczególnym Kościołom sui iuris.
Contracting marriage through the proxy is an institution dating back to the Roman law and canonized under Church law. Gratian was the first to mention about it, but the matter was not regulated in detail before the 1917 Code of Canon Law in can. 1089-1091. The 1983 Code of Canon Law, in can. 1105 confirms the previous regulations, specifies the duties of proxy and the one mandating and also requirements of the mandate. Both Codes still treat it as an extraordinary form of contracting the marriage. The same possibility is offered by Polish civil law, however with different requirements for the mandate. The Code of Canons of the Eastern Churches leaves the question to be resolved by particular sui iuris Churches.
Źródło:
Kościół i Prawo; 2017, 6, 1; 249-266
0208-7928
2544-5804
Pojawia się w:
Kościół i Prawo
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Granice instytucjonalnej interwencji wobec rodziny. Diagnoza syndromu zastępczego zespołu Münchhausena w Niemczech – prezentacja przypadków
Autorzy:
Jonda, Bernadette
Powiązania:
https://bibliotekanauki.pl/articles/652030.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
dzieci pozbawione rodziców
Münchhausen-by-proxy-Syndrom
Aktion Rechte für Kinder e.V.
Jugendamt
Opis:
Artykuł nawiązuje do kontrowersyjnych i stosunkowo częstych decyzji niemieckich sądów pozbawiających obywateli praw rodzicielskich, a przez to odbierających dzieciom szansę na życie we własnej rodzinie. Nie dotyczy to sytuacji, w których rozłąka z rodzicami z powodu ich winy jest konieczna (np. w związku z zaniedbaniami, znęcaniem się), lecz sytuacji, które powstają w wyniku błędnych diagnoz lekarskich. W artykule szczególną uwagę zwrócono na decyzje sądowe, które opierają się na diagnozie lekarskiej określanej terminem Münchhausen-by-proxy-Syndrom (MSBP). Wyjaśniając to zjawisko, autorka przytacza przykłady ilustrujące los dzieci, które niemieckie urzędy do spraw młodzieży (Jugendamt) i sądy rodzinne pozbawiły dzieciństwa z rodzicami, oraz pokazuje, jak istotne jest społeczne wsparcie dla ludzi dotkniętych tym losem. Przykładem obywatelskiej samoorganizacji na rzecz ochrony rodziny i interesów dzieci jest działalność stowarzyszenia Aktion Rechte für Kinder e.V.
Źródło:
Acta Universitatis Lodziensis. Folia Sociologica; 2014, 49
0208-600X
2353-4850
Pojawia się w:
Acta Universitatis Lodziensis. Folia Sociologica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Relacje saudyjsko-irańskie i układ sił na Bliskim Wschodzie
Saudi-Iranian relations and balance of power in the Middle East
Autorzy:
Belica, Beata
Powiązania:
https://bibliotekanauki.pl/articles/539946.pdf
Data publikacji:
2018
Wydawca:
Polskie Towarzystwo Geopolityczne
Tematy:
Arabia Saudyjska
Iran
konflikty zastępcze
Arabska Wiosna
Saudi Arabia
Middle East
proxy wars
Arab Spring
Opis:
W ostatnich latach wzrasta napięcie pomiędzy Iranem a Arabią Saudyjską. Wśród badaczy pojawiło się określenie „nowa” lub „bliskowschodnia” zimna wojna na określenie panującego pomiędzy Teheranem a Rijadem stanu napięcia. Określenie to jest uzasadnione, bowiem obydwa mocarstwa nie są zainteresowane bezpośrednim zaangażowaniem w konflikt zbrojny. Celem opracowania jest opis relacji saudyjskoirańskich wraz z osadzeniem ich we współczesnym układzie sił w regionie poprzez wskazanie znaczenia dla obu mocarstw poszczególnych konfliktów lokalnych dla budowania ich pozycji regionalnej. Tym samym, praca odpowie na pytanie, czy stosunki między mocarstwami oraz bieżąca sytuacja geopolityczna sprzyjają wybuchowi nowego konfliktu, czy też istniejący spór jest możliwy do zażegnania na relatywnie niskim poziomie intensywności, metodami pokojowymi. Słowa kluczowe: Arabia Saudyjska, Iran, konflikty
In recent years, tension has grown between Iran and Saudi Arabia. Among the researchers appeared the term "new" or "cold” war to describe the state of tension prevailing between Tehran and Riyadh. This term is justified because both powers are not interested in direct involvement in armed conflict. The aim of the study is to describe the Saudi-Iranian relations along with embedding them in the present-day balance of power in the region by indicating the significance for both powers of individual local conflicts for building their regional position. Thus, the work will answer the question whether relations between the great powers and the current geopolitical situation are conducive to the outbreak of a new conflict, or whether the existing dispute can be resolved at a relatively low level of intensity, by means of peaceful methods.
Źródło:
Przegląd Geopolityczny; 2018, 24; 101-111
2080-8836
2392-067X
Pojawia się w:
Przegląd Geopolityczny
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies