public announcement
Recently Published Documents


TOTAL DOCUMENTS

111
(FIVE YEARS 27)

H-INDEX

14
(FIVE YEARS 1)

2021 ◽  
pp. 1-42
Author(s):  
Mo Liu ◽  
Jie Fan ◽  
Hans Van Ditmarsch ◽  
Louwe B. Kuijer

In this paper, we propose three knowability logics LK, LK−, and LK=. In the single-agent case, LK is equally expressive as arbitrary public announcement logic APAL and public announcement logic PAL, whereas in the multi-agent case, LK is more expressive than PAL. In contrast, both LK− and LK= are equally expressive as classical propositional logic PL. We present the axiomatizations of the three knowability logics and show their soundness and completeness. We show that all three knowability logics possess the properties of Church-Rosser and McKinsey. Although LK is undecidable when at least three agents are involved, LK− and LK= are both decidable.


Author(s):  
Mário Benevides ◽  
Alexandre Madeira ◽  
Manuel A. Martins

2021 ◽  
Vol 13 (10) ◽  
pp. 169
Author(s):  
Khairul Kabir Sumon ◽  
Md. Sazib Miyan

This study investigates the question of whether an announcement of bank loan agreement increases the abnormal return. That is, the bank loan agreement conveys some positive information about the borrowing firm. The study used three different event windows (i.e.) two-day, three-day, and five-day windows to check the effect of the announcement for a period of 1995 to 2015. In order to measure the effect, the return has been calculated using the market model, then CARs have been calculated. The study found that CARs is statistically significant for all of the three-event windows. In the two-day window, it is found that abnormal return increases by 15 BPS within these two days, which is almost 19.315% on an annual basis. It is also evident in the study that the effect of the announcement is more on small size firms.


2021 ◽  
Vol 3 ◽  
pp. 123-143
Author(s):  
Jakub Polanowski

This article is conceptual in nature and addresses the application of the rules on the participation of participants in administrative court proceedings. The main thesis of the paper is based on the statement that a person who, as a party to administrative proceedings, was notified, pursuant to Art. 49a of the Administrative Procedure Code, of the activities of an authority by public announcement, may become a participant in administrative court proceedings after fulfilling the condition specified in Art. 33 § 1a of the Law on Administrative Courts Proceedings. The subsidiary thesis is that reasons of procedural efficiency require the adoption of such a limitation of the rights of the designated entities that will not infringe the essence of their right to a court and will not impede the exercise of that right by the parties and other participants to the proceedings. The purpose of this paper is to provide that Art. 49a of the Code of Administrative Procedure is one of the “special provisions” referred to in Art. 33 § 1a of the Law on Administrative Courts Proceedings. The reasoning adopted is based on the assumption that the interpretation of the above provisions should take into account both the requirements arising from the right of access to court and the right to be heard without unreasonable delay and the need to minimise the costs of proceedings. The described issue, based on national research, is of significant importance for practice and have not yet been discussed in more detail in the doctrine.


2021 ◽  
Vol 20 (2) ◽  
Author(s):  
Qidong Jia ◽  
Kaiping Xue ◽  
Zhonghui Li ◽  
Mengce Zheng ◽  
David S. L. Wei ◽  
...  
Keyword(s):  

Author(s):  
Dmitry Vasilyev

Introduction. The article is devoted to the review of the situation in Kuldja in the first half of the Russian domination there (1871–1876). Modern Russian historiography does not know the works that would describe the real measures of the Russian administration in this part of Russian possessions in Central Asia. Methods and materials. The article analyzes the main source – a note by N.N. Pantusov with information about Kuldja District. Regulatory acts on Russian governance in the area are used as additional sources. The comparative and critical analysis of sources is of interest. Analysis and Results. The Russian administration immediately outlined its main tasks: ensuring safety of the population, maintaining a civilian traditional way of life and governance, and equal rights for all local peoples. Destroying everything unprofitable for both states (Russia and China), the Russian administration refrained from fundamental innovations. The analysis of the sources carried out in the article allows to conclude that the Russian presence in the Ili region was temporary and even nominal indeed. The dispensing of the most fundamental articles of the Statute on the Governing of the Semirechenskaya and Syrdarya Provinces of 1867 to this district indicates the intention to facilitate the management of the new territory. And all the innovations indicate the presence of two trends. One of them was to form an attractive image of the Russian government. Another trend was aimed at spreading of all-Russian institutions to the district. Both of these trends demonstrate the intention of the representatives of the local Russian administration to keep Kuldja within the Russian Empire. The main source was published during the period of discussing the need to return the Ili region to China. However, there is no reason to argue that it was created for public announcement.


2020 ◽  
Vol 10 (21) ◽  
pp. 7926
Author(s):  
Michał Walkowski ◽  
Maciej Krakowiak ◽  
Jacek Oko ◽  
Sławomir Sujecki

The time gap between public announcement of a vulnerability—its detection and reporting to stakeholders—is an important factor for cybersecurity of corporate networks. A large delay preceding an elimination of a critical vulnerability presents a significant risk to the network security and increases the probability of a sustained damage. Thus, accelerating the process of vulnerability identification and prioritization helps to red the probability of a successful cyberattack. This work introduces a flexible system that collects information about all known vulnerabilities present in the system, gathers data from organizational inventory database, and finally integrates and processes all collected information. Thanks to application of parallel processing and non relational databases, the results of this process are available subject to a negligible delay. The subsequent vulnerability prioritization is performed automatically on the basis of the calculated CVSS 2.0 and 3.1 scores for all scanned assets. The environmental CVSS vector component is evaluated accurately thanks to the fact that the environmental data is imported directly from the organizational inventory database.


Sign in / Sign up

Export Citation Format

Share Document