4 research outputs found

    A human rights-consistent approach to multidimensional welfare measurement applied to sub-Saharan Africa

    Get PDF
    We discuss and compare the properties of the multidimensional poverty index and first-order dominance approach and apply both measures to 26 African countries using data near 2002 and 2012. Results across the two measures are broadly similar but not the same. For example, while the multidimensional poverty index suggests that all countries are advancing, FOD indicates that 14 countries experience broad-based progress, two countries show more moderate likelihoods of progress, and the remaining 10 countries neither improve nor deteriorate in terms of attainment of rights for the dimensions considered. We conclude that the multidimensional poverty index and first-order dominance approaches are useful complements that should be employed in tandem.PRIFPRI3; ISI; 5 Strengthening Institutions and Governance; G Cross-cutting gender themeEPT

    Original signé par Frédéric Painchaud

    No full text
    Chef de Section, Gestion de l’Information et de la Connaissance Ce travail a été effectué à RDDC – Valcartier en collaboration avec l’Université Laval entre mai et août 2002. © Her Majesty the Queen as represented by the Minister of National Defence, 2002 © Sa majesté la reine, représentée par le ministre de la Défense nationale, 2002 In this document, three recently published papers on different aspects of Java Security are summarized. These papers appeared in international conference proceedings and computer science journals. The first paper presents an approach aiming at replacing the dataflow analysis carried out by the Bytecode Verifier in the Java Virtual Machine. This approach is based on model checking. The second paper presents an approach aiming at instrumenting Java bytecode to ensure better security of applets and Jini services. This new approach makes it possible to detect and stop certain types of denial of service, to ensure integrity of critical data and confidentiality of the system and even to thwart certain types of spoofing. Finally, the third and last paper presents a securit

    Rapport technique

    No full text
    Le modèle de connaissances CommonKADS pour la recherche et sauvetage I. Abi-Zei
    corecore