Filters
total: 9474
-
Catalog
- Publications 6276 available results
- Journals 991 available results
- Conferences 6 available results
- Publishing Houses 4 available results
- People 176 available results
- Projects 36 available results
- Laboratories 4 available results
- Research Teams 1 available results
- Research Equipment 2 available results
- e-Learning Courses 233 available results
- Events 57 available results
- Open Research Data 1688 available results
displaying 1000 best results Help
Search results for: the criminal law
-
MEDICINE AND LAW
Journals -
Communications Law
Journals -
Climate Law
Journals -
Psychology and Law
Journals -
Cybersecurity and Law
Journals -
Law and World
Journals -
Law and Business
Journals -
LAW AND PHILOSOPHY
Journals -
Criminal Behaviour & Mental Health
Journals -
Journal of Police and Criminal Psychology
Journals -
Journal of Ethnicity in Criminal Justice
Journals -
Applied Psychology in Criminal Justice
Journals -
Journal of International Criminal Justice
Journals -
JOURNAL OF CRIMINAL JUSTICE EDUCATION
Journals -
Current Issues in Criminal Justice
Journals -
International Criminal Justice Review
Journals -
Journal of Contemporary Criminal Justice
Journals -
American Journal of Criminal Justice
Journals -
Cuadernos de Política Criminal
Journals -
Criminal Justice Policy Review
Journals -
Law via the Internet
Conferences -
The law of the Iterated Logarithm for random interval homeomorphisms
PublicationA proof of the law of the iterated logarithm for random homeomorphisms of the interval is given.
-
Information Systems, Business and Law - Lessons Learnt
PublicationReferat prezentuje badania na styku wytwarzania systemów informatycznych, procesów biznesowych i powiązanych z nimi regulacji prawnych. Zawiera on opis doświadczeń wynikających z zastosowania zintegrowanej metody analizy technicznej i prawnej podczas wytwarzania systemu ochrony własności intelektualnej. Przedstawione doświadczenia i powiązane analizy mogą być przydatne podczas tworzenia taksonomii zagadnień na styku systemów informatycznych,...
-
100 years of the technical university education in Gdańsk 1904-2004.
PublicationNa tle warunków polityczno-społecznych książka przedstawia szczegółowo narodziny i działalność niemieckiej politechniki w Gdańsku w latach 1904-1945 oraz trudne początki Politechniki Gdańskiej po jej uruchomieniu w roku 1945. Angielskojęzyczna wersja książki pozwala na jej upowszechnienie za granicą, gdzie sprawy te nie są znane lub też są naświetlane dość jednostronnie.
-
The State and Critical Assessment of the Sharing Economy in Europe
Publication -
Sensitivity analysis of critical loads of I-columns
PublicationThe first order variation of critical buckling load of thin-walled columns with bisymmetric open cross-section due to some variations of the design variables such as: cross-section dimensions, or material characteristics is derived. The influence of the residual welding stresses is taken into account. In the numerical examples dealing with I-column the functions describing the effect of the variation of the dimensions of the flange...
-
Examples of Original Descriptive Geometry Task Items
PublicationThe paper presents several descriptive geometry drawing tasks and a comprehensive approach to their evaluation. The results as the task profile include the most important features and enable interpretation of the tasks in the educational system.
-
Multisensor System for the Protection of Critical Infrastructure of Seaport
PublicationThere are many separated infrastructural objects within a harbor area that may be considered “critical”, such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons...
-
Rigorous numerics for critical orbits in the quadratic family
PublicationWe develop algorithms and techniques to compute rigorous bounds for finite pieces of orbits of the critical points, for intervals of parameter values, in the quadratic family of one-dimensional maps fa(x)=a−x2. We illustrate the effectiveness of our approach by constructing a dynamically defined partition P of the parameter interval Ω=[1.4,2] into almost 4 million subintervals, for each of which we compute to high precision the...
-
Critical section maintenance in a distributed agent system
Publication -
Agile Development of Critical Software - Can It be Justified?
PublicationThe paper introduces the problem of application of agile practices in critical software development projects. It summarizes the present state of research and identifies the need for having a ready-to-use model of being agile while still meeting the required assurance levels which could be particularly useful for small and medium sized safety-critical software companies. Then the objective and scope of a research aiming at delivering...
-
Functional safety and security management in critical systems
PublicationGłównym celem referatu jest przedstawienie wybranych kwestii zarządzania bezpieczeństwem i ochroną w systemach podwyższonego ryzyka i systemach krytycznych. Zarysowuje się kilka praktycznych problemów analizy bezpieczeństwa funkcjonalnego w celu podejmowania decyzji zgodnie z normami międzynarodowymi IEC 61508 i IEC 61511. Podkreśla się, że aspekty związane z ochroną powinny być starannie rozpatrzone zarówno w fazie projektowania,...
-
Critical Inquiry
Journals -
Critical Quarterly
Journals -
Critical Review
Journals -
Critical Survey
Journals -
CRITICAL CARE
Journals -
Critical Sociology
Journals -
Critical Horizons
Journals -
Critical Education
Journals -
Critical Criminology
Journals -
Critical Stages
Journals -
Entanglement in Hooke’s Law Atoms: an Effect of the Dimensionality of the Space
Publication -
Recycling of waste tires in the light of binding law in Poland
PublicationA risings of large quantities of used rubber products, especially used tires has been increasing every year in Poland, in 2006 it was 160 thousand. The waste management and recycling of used tires become a major environmental problem. Well known methods of utilization of used tires are presented in this article. The main problem is ignorance of the law by tyre manufactures and users. In Poland first act on waste introduces ban...
-
Safety and security governance problems of critical systems and infrastructures
PublicationW artykule przedstawiono kilka problemów związanych z zarządzaniem bezpieczeństwem i ochroną informacji w systemach i infrastrukturach krytycznych.Bardzo ważne jest zidentyfikowanie i scharakteryzowanie infrastruktury krytycznej. Przedstawiono nowe wyzwania związane z łączeniem podejścia bezpieczeństwa i ochrony informacji w procesie podejmowania decyzji
-
Critical Reappraisal of Casagrande and Taylor Methods for Coefficient of Consolidation
Publication -
Original article Polish normalization of the Body Esteem Scale
Publication -
Uniform Expansivity Outside a Critical Neighborhood in the Quadratic Family
Publication -
Wireless Networks as an Infrastructure for Mission-Critical Business Applications
PublicationDespite the dynamic growth of wireless network systems, their pres-ence in business-support infrastructure has been limited. In the article we provide an overview of generic corporate network architecture and examine usefulness of available wireless network solutions in such systems. Following this overview we analyze new wireless network architecture which currently undergoes standardization process - wireless mesh. It can result...
-
Managing the security vulnerabilities of critical systems and hazardous plants
PublicationRozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....