|
|
Showing 1 - 10 of
10 matches in All Departments
For many years now, there has been a strong economic scholarship
pointing to the importance of institutions in general - and, more
particularly, legal rules and the rule of law - for economic
development. The importance of law for economic growth has also
been empirically tested in many well-known and often cited studies.
These studies seem to indicate not only that law is relevant in the
development of countries and their economic growth in particular,
but more specifically, that particular legal systems do better than
others. The tenant of this scholarship (especially initiated by
Andrej Schleifer and others) is that the common law would be a more
efficient system in promoting economic growth than the civil law.
However, many scholars doubt the empirical claim of this and
criticize these findings, both on methodological grounds as well as
on grounds of a misconception of differences between the civil and
the common law. The interest in legal origins for the efficiency of
the legal system also focuses on particular legal regimes, such as
accident law, environmental law, or corporate law. Increasingly,
the question is also asked whether legal institutions and the rule
of law are also important in the process whereby poor nations
develop their economy. For example, Cooter, Schafer, and Ulen have
attempted to examine why particular developing countries do
relatively better than others and, roughly speaking, also attribute
(part of the) success of some developing countries to legal
institutions. However, others (more particularly Ulen) point at the
fact that legal rules may play some role, but perhaps only a modest
role in economic development. A powerful example which is quoted in
that respect is the one of China which, at least at first blush,
does not seem to rely strongly on legal institutions (at least in
the traditional sense) and nevertheless has experienced a
spectacular economic growth. The particular case of China hence
remains somewhat puzzling in this debate. So far, these various
streams of literature paying attention to the question to what
extent legal origins matter for economic growth have not been
strongly integrated and have, to a large extent, been developed in
separate social sciences (institutional economics, development
economics, and comparative law). This multi-disciplinary book
brings these approaches together in an integrated and structural
manner. (Series: Ius Commune Europaeum - Vol. 100)
In numerous fields of law, ranging from family law to company law,
private actors increasingly set their own rules, revert to private
enforcement of those rules and choose the applicable law. Within
each field this tendency has already been scrutinised. Until now,
however, few attempts have been made to look at these phenomena
together with a view to arriving at conclusions that go beyond one
specific field. This book is a first attempt to fill this gap. It
is relevant for scholars and practitioners working in the
individual fields of law covered (private international law,
company law, family law, consumer law and commercial law) as well
as for scholars and policy makers trying to grasp the overall
nature of the increasing privatisation of the law.
The first Annual Working Conference ofWG11.4oftheInter
nationalFederationforInformation Processing (IFIP), focuseson
variousstate of the art concepts in the field of Network and Dis
tributedSystemsSecurity. Oursocietyisrapidly evolvingand
irreversibly set onacourse governedby electronicinteractions.
Wehave seen thebirthofe mail in the early seventies, and are now
facing new challenging applicationssuchase commerce, e government,
....Themoreour societyrelies on electronicforms ofcommunication,
themorethe securityofthesecommunicationnetworks
isessentialforitswell functioning. Asaconsequence,
researchonmethodsandtechniques toimprove network security iso
fparam ount importance. ThisWorking Conference
bringstogetherresearchersandprac tionersofvariousdisciplines,
organisationsandcountries, todiscuss
thelatestdevelopmentsinsecurity protocols, secure software engin
eering, mobileagentsecurity, e commercesecurityandsecurityfor
distributedcomputing.
Wearealsopleasedtohaveattractedtwointernationalspeakers
topresenttwo case studies, one dealing withBelgium'sintentionto
replacetheidentity card ofitscitizensbyanelectronicversion, and
theotherdiscussingtheimplicationsofthesecuritycertificationin
amultinationalcorporation. ThisWorking Conference s
houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof
which can be summarizedas follows: topromoteresearch on technical
measures forsecuringcom puternetworks, including bothhardware
andsoftware based techniques. to promote dissemination of research
results in the field of network security in real lifenetworks in
industry, academia and administrative ins titutions. viii
topromoteeducationintheapplicationofsecuritytechniques,
andtopromotegeneral awarenessa boutsecurityproblems in
thebroadfieldofinformationtechnology. Researchers and practioners
who want to get involved in this Working Group, are
kindlyrequestedtocontactthechairman.
MoreinformationontheworkingsofWG11.4isavailable from the
officialIFIP website: http: //www.ifip.at.org/. Finally, wewish
toexpressour gratitudetoallthosewho have
contributedtothisconference in one wayoranother. Wearegr ate
fultothe internationalrefereeboard whoreviewedallthe papers
andtotheauthorsandinvitedspeakers, whosecontributionswere essential
to the successof the conference. We would alsoliketo
thanktheparticipantswhosepresenceand interest, togetherwith
thechangingimperativesofsociety, willprovea drivingforce for
futureconferen
As the European Union (EU) matures, there is an increasing debate,
partly fuelled by fierce national criticism offered by Eurosceptic
politicians, partly initiated by the EU institutions themselves, on
the way in which the EU has developed and what the EU must look
like in the future. This debate includes a discussion on one of the
core aspects of European integration: at which level should the
rules be set and who decides where the authority to do so should
lie? Private law has an important role to play in this discussion.
Many private law rules touch on the core of the internal market as
they serve to foster trade or to offer protection to market
participants, such as consumers.In 2011, the Maastricht European
Private Law Institute (M-EPLI) was founded. M-EPLI researchers
combine European Private Law scholarship in the fields of contract,
property, commercial and procedural law as well as legal theory. In
this book M-EPLI fellows present perspectives on the allocation of
competences in European Private Law. This includes both general
perspectives and criteria on the basis of which to decide who does
what in European Private Law, but also specific perspectives
relating to the various fields M-EPLI's researchers cover. All
contributions share a common approach in which each author or team
of authors addresses the same two questions: (i) What are the
criteria to decide upon the ideal design of their field of law for
the EU?; (ii) Who should set the rules: what is in the author(s)
view the optimal mix of national and European producers of legal
norms?
This comprehensive overview brings the reader up-to-date on new
technologies for low-speed data, speech and broadband
communications, competing standards, adjacent technologies, new
generation networks and future developments. It covers all EU
countries, Norway, Switzerland, the USA and Japan. The text
includes up-to-date discussions on standards such as
TETRA/Tetrapol, POGSAC/ERMES/FLEX and W-CDMA, several adjacent
technologies such as VSAT, (d-)GSP and DAB broadcasting, and US and
Japanese standards such as IS-95, CDMA, D-AMPS, FLEX/ReFlex and
PDC.
This book provides a concise introduction to quantum fields on a
lattice: a precise and non-perturbative definition of quantum field
theory obtained by replacing continuous space-time by a discrete
set of points on a lattice. The path integral on the lattice is
explained in concrete examples using weak and strong coupling
expansions. Fundamental concepts such as 'triviality' of Higgs
fields and confinement of quarks and gluons into hadrons are
described and illustrated with the results of numerical
simulations. The book also provides an introduction to chiral
symmetry and chiral gauge theory, as well as quantized non-Abelian
gauge fields, scaling and universality. Based on the lecture notes
of a course given by the author, this book contains many
explanatory examples and exercises, and is suitable as a textbook
for advanced undergraduate and graduate courses. Originally
published in 2002, this title has been reissued as an Open Access
publication on Cambridge Core.
The first Annual Working Conference ofWG11.4oftheInter
nationalFederationforInformation Processing (IFIP),focuseson
variousstate of the art concepts in the field of Network and Dis
tributedSystemsSecurity. Oursocietyisrapidly evolvingand
irreversibly set onacourse governedby electronicinteractions.
Wehave seen thebirthofe mail in the early seventies, and are now
facing new challenging applicationssuchase commerce, e
government,...Themoreour societyrelies on electronicforms
ofcommunication,themorethe securityofthesecommunicationnetworks
isessentialforitswell functioning.
Asaconsequence,researchonmethodsandtechniques toimprove network
security iso fparam ount importance. ThisWorking Conference
bringstogetherresearchersandprac
tionersofvariousdisciplines,organisationsandcountries,todiscuss
thelatestdevelopmentsinsecurity protocols, secure software engin
eering,mobileagentsecurity,e commercesecurityandsecurityfor
distributedcomputing.
Wearealsopleasedtohaveattractedtwointernationalspeakers
topresenttwo case studies,one dealing withBelgium'sintentionto
replacetheidentity card ofitscitizensbyanelectronicversion,and
theotherdiscussingtheimplicationsofthesecuritycertificationin
amultinationalcorporation. ThisWorking Conference s
houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof
which can be summarizedas follows: topromoteresearch on technical
measures forsecuringcom puternetworks, including bothhardware
andsoftware based techniques. to promote dissemination of research
results in the field of network security in real lifenetworks in
industry, academia and administrative ins titutions. viii
topromoteeducationintheapplicationofsecuritytechniques,
andtopromotegeneral awarenessa boutsecurityproblems in
thebroadfieldofinformationtechnology. Researchers and practioners
who want to get involved in this Working Group, are
kindlyrequestedtocontactthechairman.
MoreinformationontheworkingsofWG11.4isavailable from the
officialIFIP website:http://www.ifip.at.org/. Finally,wewish
toexpressour gratitudetoallthosewho have
contributedtothisconference in one wayoranother. Wearegr ate
fultothe internationalrefereeboard whoreviewedallthe papers
andtotheauthorsandinvitedspeakers,whosecontributionswere essential
to the successof the conference. We would alsoliketo
thanktheparticipantswhosepresenceand interest, togetherwith
thechangingimperativesofsociety,willprovea drivingforce for
futureconferencestocome.
This book provides a concise introduction to quantum fields on a
lattice: a precise and non-perturbative definition of quantum field
theory obtained by replacing continuous space-time by a discrete
set of points on a lattice. The path integral on the lattice is
explained in concrete examples using weak and strong coupling
expansions. Fundamental concepts such as 'triviality' of Higgs
fields and confinement of quarks and gluons into hadrons are
described and illustrated with the results of numerical
simulations. The book also provides an introduction to chiral
symmetry and chiral gauge theory, as well as quantized non-Abelian
gauge fields, scaling and universality. Based on the lecture notes
of a course given by the author, this book contains many
explanatory examples and exercises, and is suitable as a textbook
for advanced undergraduate and graduate courses. Originally
published in 2002, this title has been reissued as an Open Access
publication on Cambridge Core.
|
You may like...
The Party
Elizabeth Day
Paperback
(1)
R290
R264
Discovery Miles 2 640
Sleeper
Mike Nicol
Paperback
R300
R277
Discovery Miles 2 770
Katvis
Annelie Botes
Paperback
(1)
R360
R332
Discovery Miles 3 320
In Too Deep
Lee Child, Andrew Child
Paperback
R395
R353
Discovery Miles 3 530
Small Mercies
Dennis Lehane
Paperback
R436
R398
Discovery Miles 3 980
Nobody's Fool
Harlan Coben
Paperback
R395
R353
Discovery Miles 3 530
|