804 research outputs found

    Recidivism in the State of California

    Get PDF
    Recidivism in the State of California

    Country and currency diversification of bond investments: do they really make sense for Swiss investors?

    Get PDF
    The inclusion of hedged or unhedged foreign currency bonds within a strategic assetallocation is a crucial decision which should be analyzed carefully. The goal of this paper is to provide a contribution to this analysis by focusing particularly on the time horizon of the investment. Results are analyzed from the perspective of a Swiss investor. We find that over the last 21years, investing in bonds denominated in Swiss Francs has been clearly less efficient in terms of risk-adjusted returns than investing in a hedged global bond portfolio. For short-term investors, we find robust evidence against the hypothesis of investing in unhedged foreign currency bonds. The picture changes dramatically, however, when we consider an investment horizon of 6years and the normal case of balanced portfolios including also equities and domestic bonds. In this case, the optimal strategy for the period we analyzed would have been to hedge only the exposure to US dollar bond

    Advanced security aspects on Industrial Control Network.

    Get PDF
    Security threats are one of the main problems of this computer-based era. All systems making use of information and communication technologies (ICT) are prone to failures and vulnerabilities that can be exploited by malicious software and agents. In the latest years, Industrial Critical Installations started to use massively network interconnections as well, and what it is worst they came in contact with the public network, i.e. with Internet. Industrial networks are responsible for process and manufacturing operations of almost every scale, and as a result the successful penetration of a control system network can be used to directly impact those processes. Consequences could potentially range from relatively benign disruptions, such as the disruption of the operation (taking a facility offline), the alteration of an operational process (changing the formula of a chemical process), all the way to deliberate acts of sabotage that are intended to cause harm. The interconnectivity of Industrial Control Systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This presents presents an innovative approach to Intrusion Detection in SCADA systems based on the concept of Critical State Analysis and State Proximity. The theoretical framework is supported by tests conducted with an Intrusion Detection System prototype implementing the proposed detection approach

    Le corps comme voie mythique dans quelques textes de blake et de viel Temperley

    Get PDF
    Las características de la poesía de Héctor Viel Temperley han hecho de él un poeta de gran predicamento en el contexto literario argentino actual. En ella, la exaltación del cuerpo, del deporte, de la sensualidad y la sexualidad constituyen una peculiar forma de búsqueda de lo sagrado. En este sentido, la poesía del autor de Hospital Británico guarda similitudes con la inquietante lírica de William Blake. Aunque el tenor de la producción de Viel Temperley es diferente de la del inglés, hay en ambas una misma actitud de exaltación del cuerpo como vía de acceso a lo sagrado. En el presente trabajo, abordaré algunos textos de ambos autores como muestras de una mística del cuerpo.The characteristics of Héctor Viel Temperley’s poetry have made him a prestigious poet in the Argentinian literary current context. In this poetry, the exaltation of the body, sport, sensuality and sexuality, do not contradict but makes a peculiar way of search for the sacred. In this sense, the poetry of the author of Hospital Británico is related to William Blake’s disturbing poetry. Obviously, the tenor of both poetic outputs are different, but a similar attitude towards the body and its exaltation as a way of purifi cation can be noticed in both. In this article, I will study some texts of both authors as examples of a body mystic.Les caractéristiques de la poésie d’Hector Viel Temperley ont fait de lui, un poète d’un grand prestige dans le contexte littéraire argentin actuel. Dans cette poésie-là, l’exaltation du corps, du sport, de la sensualité et de la sexualité non seulement la contredisent, mais constituent, une forme particulière de chercher ce qui est sacré. Dans ce sens, la poésie de l’auteur de l’Hôpital Britannique garde des similitudes avec l’inquiétante lyrique de William Blake. Bien que la teneur de la production de Viel Temperley soit différente de celle de l’anglais, les deux ont une même attitude d’exaltation du corps en tant que voie d’accès à ce qui est sacré. Dans ce travail, on abordera quelques textes des deux auteurs, en tant qu’échantillons d’une mystique du corps.Fil: Carcano, Enzo. Universidad del Salvador; Argentina. Consejo Nacional de Investigaciones Científicas y Técnicas; Argentin

    On the Relationship between International Humanitarian Law and Human Rights Law in Times of Belligerent Occupation: Not Yet a Coherent Framework

    Get PDF
    This contribution analyses the relationship between the law of belligerent occupation and its relationship with IHRL. After first illustrating the legal basis on which one can argue that a state is required to comply with IHRL in the territory it happens to occupy, the chapter explores the extent to which IHRL has impacted on the authorities, responsibilities, and duties of an occupying power as framed by the law of occupation. It further examines the implications of the law of occupation as lex specialis for the applicability of IHRL during occupation, as well as whether adherence to IHRL standards could augment the normative powers of the occupying power

    Advanced security aspects on Industrial Control Network.

    Get PDF
    Security threats are one of the main problems of this computer-based era. All systems making use of information and communication technologies (ICT) are prone to failures and vulnerabilities that can be exploited by malicious software and agents. In the latest years, Industrial Critical Installations started to use massively network interconnections as well, and what it is worst they came in contact with the public network, i.e. with Internet. Industrial networks are responsible for process and manufacturing operations of almost every scale, and as a result the successful penetration of a control system network can be used to directly impact those processes. Consequences could potentially range from relatively benign disruptions, such as the disruption of the operation (taking a facility offline), the alteration of an operational process (changing the formula of a chemical process), all the way to deliberate acts of sabotage that are intended to cause harm. The interconnectivity of Industrial Control Systems with corporate networks and the Internet has significantly increased the threats to critical infrastructure assets. Meanwhile, traditional IT security solutions such as firewalls, intrusion detection systems and antivirus software are relatively ineffective against attacks that specifically target vulnerabilities in SCADA protocols. This presents presents an innovative approach to Intrusion Detection in SCADA systems based on the concept of Critical State Analysis and State Proximity. The theoretical framework is supported by tests conducted with an Intrusion Detection System prototype implementing the proposed detection approach

    Of efficiency and fairness in the administration of international justice: Can the Residual Mechanism provide adequately reasoned judgments?

    Get PDF
    This paper discusses some of the structural and procedural innovations that the Security Council introduced in the Statute of the International Residual Mechanism for Criminal Tribunals (Mechanism)[1] and reflects on how some of these developments impact on the exercise of the Mechanism\u2019s judicial function. These innovations constitute a unicum in the field of international criminal justice. At a micro-level, they bring about a shift in the modalities through which the judges of the Mechanism shall exercise the judicial function in respect of their colleagues at the ad hoc Tribunals. At a macro-level, they provide an opportunity to reflect on the kind of judicial institutions that should be devised in future in order to combat impunity in a fair and efficient manne

    Of Fragmentation and Precedents in International Criminal Law: Possible Lessons from Recent Jurisprudence on Aiding and Abetting Liability

    Get PDF
    After discussing the notion of ‘fragmentation’ and the value of using the metaphor in the context of ICL, the author turns to substantive criminal law to try and determine the correct actus reus of aiding and abetting liability in contemporary ICL, and to ask whether ‘specific direction’ has any role to play therein. He then addresses the more general problem of determining the role of coherence and consistency in the development of ICL, the function of precedents within and across international courts and tribunals, and the evolving role and function of customary international law in contemporary ICL to draw lessons for the International Criminal Court

    Uses and possible misuses of a Comparative International Law approach

    Get PDF
    Should international lawyers embrace the Comparative International Law project (CIL)? One can readily with the noble aspiration to renew international law and to deal more effectively with the challenges of our times and on the need to engagein a more constructive and effective communication among international lawyers of different origins and backgrounds. Still, the complexity and the breadth of the CIL project as both a legal and a political tool commands a more nuanced response. To this end, this paper is divided in three parts. First, it illustrates the theoretical and factual basis underlying the CIL project. Second, it provides an overview of the function(s) that comparative law currently plays in different branches of public international law and asks in what way a more robust turn to comparative law than is currently in place may enrich international law. Third, it reflects on the relationship between the CIL approach and the existing system of international law as a set of primary and secondary rules
    • …
    corecore