期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
国际投资仲裁中非法获取文件的可采用性研究 被引量:1
1
作者 裴洋 金孟歆 《商事仲裁与调解》 2020年第2期138-148,共11页
近年的国际投资仲裁中,非法获取的文件的可采用性如何认定,成了仲裁庭在审理时遇到的难题。与国内诉讼中的法官们不同,国际投资仲裁中的仲裁庭不能仅仅以来源非法直接否定文件的可采用性。实践中,大多数仲裁庭会依据自由裁量权,适用《IB... 近年的国际投资仲裁中,非法获取的文件的可采用性如何认定,成了仲裁庭在审理时遇到的难题。与国内诉讼中的法官们不同,国际投资仲裁中的仲裁庭不能仅仅以来源非法直接否定文件的可采用性。实践中,大多数仲裁庭会依据自由裁量权,适用《IBA取证规则》对具体证据问题进行审查。根据这一规则,仲裁庭应初步推定该非法获取的文件具备可采用性,然后审查案件中是否存在某些可能排除这些文件的因素。而哪些因素是仲裁庭需要审查的,现有规则中没有明确指出,但可参考此前审理国际投资案件的仲裁庭对这一问题的处理,从而明确应重点关注涉及"清白原则""免征特权"和"证据价值"的具体情形。最后,综合以上分析,仲裁庭可得出非法获取的文件是否具有可采用性的结论。 展开更多
关键词 国际投资仲裁 证据规则 非法获取的文件 可采用性
原文传递
司法实践中对手机短信作为证据的认定
2
作者 张旭 叶江霞 《江苏科技信息》 2006年第10期17-20,共4页
在现实生活中,人们经常使用移动电话发送和接收短信。在司法实践中,涉及移动电话短信息作为证据的案件不断出现。移动电话短信息作为一种新的证据形式进入了诉讼领域,对传统的证据形式提出了挑战。在诉讼中,如何对其定性是证据理论和实... 在现实生活中,人们经常使用移动电话发送和接收短信。在司法实践中,涉及移动电话短信息作为证据的案件不断出现。移动电话短信息作为一种新的证据形式进入了诉讼领域,对传统的证据形式提出了挑战。在诉讼中,如何对其定性是证据理论和实务上亟待解决的问题。同时,对证据理论的研究也需要不断创新。 展开更多
关键词 移动电话 短信息 证据效力 可采用性 可采信
下载PDF
Logistics Cost Management Models and Their Usability for Purchasing 被引量:1
3
作者 Daniel Ellstrom Jakob Rehme Maria Bjorklund Hakan Aronsson 《Journal of Modern Accounting and Auditing》 2012年第7期1066-1073,共8页
In many compames, cost management models are abandoned due to their complexity and because of this, the academic literature has experienced a downturn in publications regarding cost management. This paper deepens the ... In many compames, cost management models are abandoned due to their complexity and because of this, the academic literature has experienced a downturn in publications regarding cost management. This paper deepens the understanding regarding the practical usability of cost management models for purchasing decisions, and provides a framework for determining a desired complexity of cost management in different purchasing environments. The complexity is defined along three dimensions identified in literature and the different purchasing environments stem from an adaptation of Kraljic's (1983) matrix. 展开更多
关键词 cost management supply chain ACCOUNTING PURCHASING Kraljic's matrix
下载PDF
Research and Design on Remote Meter Reading System based on PLC Technology
4
作者 Yijiang Zhang 《International English Education Research》 2014年第9期40-43,共4页
With the deepened transformation of China's power system, the stability and reliability of power utilization have been dramatically improved, but meter reading data acquisition does not keep pace with the times. With... With the deepened transformation of China's power system, the stability and reliability of power utilization have been dramatically improved, but meter reading data acquisition does not keep pace with the times. With the continuous maturity of low-voltage power line communication (PLC), this leads us to see hopes of using PLC technology to realize remote meter reading. In this paper, based on current PLC technology and combining domestic and foreign successful cases, a beneficial exploration and research is conducted from the composition and establishment of software and the design of software and protocol. 展开更多
关键词 Remote Meter Reading PLC Communication Protocol
下载PDF
On the role of optimization algorithms in ownership-preserving data mining 被引量:1
5
作者 Muhammad KAMRAN Ehsan Ullah MUNIR 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第2期151-164,共14页
Knowledge extraction from sensitive data often needs collaborative work. Statistical databases are generated from such data and shared among various stakeholders. In this context, the ownership protection of shared da... Knowledge extraction from sensitive data often needs collaborative work. Statistical databases are generated from such data and shared among various stakeholders. In this context, the ownership protection of shared data becomes important. Watermarking is emerging to be a very effective tool for imposing ownership rights on various digital data formats. Watermarking of such datasets may bring distortions in the data. Consequently, the extracted knowledge may be inaccurate. These distortions are controlled by the usability constraints, which in turn limit the available bandwidth for watermarking. Large bandwidth ensures robustness; however, it may degrade the quality of the data. Such a situation can be resolved by optimizing the available bandwidth subject to the usability constraints. Optimization techniques, particularly bioinspired techniques, have become a preferred choice for solving such issues during the past few years. In this paper, we investigate the usability of various optimization schemes for identifying the maximum available bandwidth to achieve two objectives:(1) preserving the knowledge stored in the data;(2) maximizing the available bandwidth subject to the usability constraints to achieve maximum robustness. The first objective is achieved with a usability constraint model, which ensures that the knowledge is not compromised as a result of watermark embedding. The second objective is achieved by finding the maximum bandwidth subject to the usability constraints specified in the first objective. The performance of optimization schemes is evaluated using different metrics. 展开更多
关键词 Information security Optimization Digital fights WATERMARKING
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部