The Internet Archive has digitized a microfilm copy of this work. It may be possible to borrow a copy for reading.
Filters
Page 7463 of Mathematical Reviews Vol. , Issue 98K
[page]
1998
Mathematical Reviews
, Ashish V. (1-CHI-C; Chicago, IL)
Efficient algorithms for a scheduling problem and its applications to illicit drug market crackdowns. ...
By duality we transform a special case of the drug market crackdown scheduling problem to the above job scheduling problem and thus derive polynomial time algorithms to the sec- ond problem. ...
Bitcoin and Ethics in a Technological Society
[chapter]
2021
Blockchain Potential in AI [Working Title]
Bitcoin came into existence as a peer-to-peer payment system for use on online transactions. ...
In this chapter, we first look at the history of Bitcoin together with that of those behind it. We then review the mixed reception it obtained after coming to the market. ...
pushes the same buttons as their gold fetish and it does not look like a "Fiat currency", it will become central to a commodities markets where the goods traded will include assassination, drugs, child ...
doi:10.5772/intechopen.96798
fatcat:qcot72ofb5avvjms2tgylmkyom
Methods and motives: Exploring links between transnational organized crime and international terrorism
2005
Trends in Organized Crime
Clearly, it is more efficient to outsource a service -such as passport forgery -to an established specialist than to try and master the necessary techniques yourself. ...
Many individuals belong to both terror and organized crime groups, and conduct a variety of tasks for both. ...
Finally, and certainly not least, the project team would like to thank NIJ, particularly Jay Albanese and Jennifer Hanley, for their guidance and assistance in seeing this project through to completion ...
doi:10.1007/s12117-005-1024-x
fatcat:nruoibnonvdmblve7cuxyb4dqe
Abstracts of Working Papers in Economics
2001
Abstracts of Working Papers in Economics
The second topic concerns augmentation algorithms and test sets, including the role played by Hilbert and Grobner bases in the development of a primal approach to solve a family of problems for all righthand ...
The QTE estimator can be computed as the solution to a convex linear programming problem, although this requires first-step estimation of a nuisance function. ...
Because that market exhibits many complementarities between applicants and between positions, the theory of simple matching markets does not apply directly. ...
doi:10.1017/s0951007900005210
fatcat:veyvhaf3tjdwphmwkmo64q43fy
Introduction
[chapter]
1996
Exploring the Underground Economy: Studies of Illegal and Unreported Activity
Burma has been estimated to be the largest producer of opium for the illicit market since the early 1980s; since 1989 it may have accounted for over half of world production. ...
These problems are exacerbated by the fact that the National Insti tute on Drug Abuse (NIDA), the principal federal research agency con cerned with illicit drugs, and the Substance Abuse and Mental Health ...
INDEX Abrahamse, Allan, 92 Abt Associates, 8 Adjusted gross income (AGI) gap between IRS reports and NIPA estimates, 11-12 as indicator of underground activities, 11 Allingham, Michael G., 105 Aim, ...
doi:10.17848/9780880994279.ch1
fatcat:hipwb4gmyjcrxlzonlvylyybse
Page 2100 of Mathematical Reviews Vol. , Issue Index
[page]
Mathematical Reviews
Efficient algorithms for a scheduling problem and its applications to illicit drug market crackdowns. ...
(with Lee, Loohay; Ho, Yu-Chi) On stochastic optimization and its applications to manufacturing. ...
The Metaphor Is the Key: Cryptography, the Clipper Chip, and the Constitution
1995
University of Pennsylvania law review
Ohio, 392 U.S. 1 (1968), and contracting the definition of a search); Steven Wisotsky, Crackdown: The Emerging "Drug Exception" to the Bill of Rights, 38 HASTINGS L.J. 889, 907 (1987) (noting that "[i] ...
Reg. 12,134, 12,134 (1975) ("In order to insure compatibility of secure data, it is necessary to establish a data encryption standard and develop guidelines for its implementation and use."). 04 The algorithm ...
Applicants for these licenses were required to provide 15 copies of their code with the application. See id. § 1801.49 . ...
doi:10.2307/3312529
fatcat:2lx6judk65b2flyzwpnkcusj4e
Dosing Discrimination: Regulating PDMP Risk Scores
2022
PDMPs use proprietary algorithms to determine a patient's risk for prescription drug misuse, diversion, and overdose. ...
Law enforcement conducts dragnet sweeps of PDMP data to target providers that the platform characterizes as "overprescribers" and patients that it deems as high risk of drug diversion, misuse, and overdose ...
As the Cold War set in, the drug returned to illicit urban markets and its consumers were predominantly Black and Latinx Americans. 50 The federal government responded by enacting legislation that imposed ...
doi:10.15779/z38z31np8j
fatcat:fmkx3mwoq5ddfcc3nnv6vdjgjy
Bashar H. Malkawi, Western Hemispheric Trade Conference 2020
[article]
2020
Figshare
World Trade Organization (WTO) members recognized the benefits digital trade offers and have developed a work program to facilitate the development of digital trade. ...
However, WTO efforts to facilitatedigital trade have stalled, leading to a slower than anticipated progress. ...
Title V -Building Scholars is a partnership between Texas A&M International University (TAMIU) and Laredo College (LC), formerly Laredo Community College. ...
doi:10.6084/m9.figshare.12133122.v1
fatcat:hmanz7u5xrgsle5kj4aaq6g5h4
Page 1002 of Mathematical Reviews Vol. , Issue Author Index
[page]
Mathematical Reviews
A resource-constrained optimal control model for crackdown on illicit drug markets (English summary) Special issue in honor of Richard Bellman. J. Math. Anal. Appl. 249 (2000), no. 1, 53-79. ...
(with Dems, K.; Rousselet, Bernard) Application of first- and second-order sensitivities in domain optimization for steady conduction problem. (English summary) J. ...
Page 1156 of Mathematical Reviews Vol. , Issue Index
[page]
Mathematical Reviews
(Marius Zimand) 98a:68070 68Q15
— (with Cai, Pu; Cai, Jin-Yi) Efficient algorithms for a scheduling problem and its applications to illicit drug market crackdowns. (English summary) J. Comb. ...
Ennes) 98m:81156 81T30 (81R10)
Naito, Shozo (with Takagi, Tsuyoshi) The multi-variable modular polynomial and its applications to cryptography. ...
Hiding from Whom?
2018
intermédialités
ACKNOWLEDGEMENTS The authors would like to extend their deepest gratitude to a number of individuals who have provided support and feedback in the production of this report, including (in alphabetical ...
order) Bram Abramson, Nate Cardozo, Masashi Crete-Nishihata, Ron Deibert, Mickael E.B., Andrew Hilts, Jeffrey Knockel, Adam Molnar, Christopher Prince, Tina Salameh, Amie Stepanovich, and Mari Jing Zhou ...
As a 247 result of the 2010 consultation, Canada expanded its exemption for mass market encryption, effectively decontrolling cryptographic products and technologies that were marketed to the general public ...
doi:10.7202/1058473ar
fatcat:z2x3cfbpczehjgpmlzxjsfkrd4
Secrecy World - Inside Panama Papers : Jake Bernstein
[article]
2020
Figshare
This is a book on Panama Papers and secrecy world of global elite, by Jake Bernstein ( a renowned investigative journalist) ...
Thoroughly indoctrinated in the cult of market efficiency, Haarde quoted Ronald Reagan: "The government is not the solution to our problems, the government is the problem." ...
Prosecutors did not have to undertake the expense and uncertainty of a trial. It was a very Swiss solution. Practical. Efficient. And yet it was also revolutionary for the country. ...
doi:10.6084/m9.figshare.12398585.v1
fatcat:d5wns6e4szbdbf3rtqp5ur437a
Structuring Disincentives for Online Criminals
2018
Consequently, interventions targeting such components can reduce the opportunities and incentives to engage in online crime through an increase in criminal operational costs, and in the risk of apprehension ...
We argue that countermeasures, as defined in the context of situational crime prevention, can be effective for a long-term reduction in the occurrence of online crime. ...
For instance, while it is useful to know that scheduled drugs are offered under 15 different names, it would Drug ingredients
#Unlic. ...
doi:10.1184/r1/6723266.v1
fatcat:5us6ajombzbb3o7ssqv2lchhda
The First National Scientific Meeting of the Social and Behavioral Science Research Network
2008
Journal of Acquired Immune Deficiency Syndromes
The group thought that the value added by the SBSRN to each CFAR had the potential to encourage all sites to include support for this effort in their respective competitive renewal applications and that ...
These included Web-based tools useful in the preparation of interdisciplinary research applications, a common database for tracking service delivery in social and behavioral sciences, a national directory ...
Warner Greene, and Brenda G. Sanchez. ...
doi:10.1097/qai.0b013e3181605888
pmid:18301127
fatcat:kimvtxnrjbc7nnvdhfagpugdji
« Previous
Showing results 1 — 15 out of 45 results