Search results
Jump to navigation
Jump to search
- == Kleinrock's Conservation Law == ...92">{{cite journal | last=Kleinrock | first=Leonard | title=A conservation law for a wide class of queueing disciplines | journal=Naval Research Logistics ...5 KB (838 words) - 06:24, 31 July 2024
- | long_title = To define and amend certain parts of the law relating to contracts. {{Contract law}} ...23 KB (3,772 words) - 15:16, 12 November 2024
- ...t traditionally regulated encryption for reasons of national security, law enforcement and foreign policy. Encryption was regulated from 1976 by the [[Arms Expor ...4 KB (567 words) - 13:46, 10 February 2023
- ...de|url=https://www.forbes.com/sites/andygreenberg/2012/03/27/heres-how-law-enforcement-cracks-your-iphones-security-code-video/|website=Forbes.com|date=27 Mar 201 ...ve-date=2013-11-03 }}</ref> This "roving bug" feature has been used by law enforcement agencies and intelligence services to listen in on nearby conversations.<re ...16 KB (2,208 words) - 21:04, 3 August 2024
- ...aw]] was rarely enforced until 1943, when a compulsory identification book law was enacted. Thai nationals who were 16 and older and lived within designat ...พ.ศ. ๒๔๗๙ (Citizen registration within built-up areas act, 1936)</ref> The law was then expanded nationwide in 1956.<ref>ราชกิจจานุเบกษา, [https://web.arc ...17 KB (1,854 words) - 03:27, 5 December 2024
- ...ast1=Carruthers |first1=Bruce |title=The Passage of the Uniform Small Loan Law |url=http://www.cgdev.org/doc/blog/Roodman%20open%20book/Carruthers,%20Guin ...against a payday lender |url=http://www.consumerfinance.gov/blog/our-first-enforcement-action-against-a-payday-lender/ |access-date=August 27, 2014 |year=2013}}</ ...46 KB (6,473 words) - 03:01, 11 November 2024
- ...cryption standards and obtain master keys—either by agreement, by force of law, or by computer network exploitation ([[hacker (computer security)|hacking] ...NSA deliberately inserts or keeps secret vulnerabilities which affect both law-abiding US citizens as well as NSA's targets, under its [[NOBUS]] policy.<r ...37 KB (5,170 words) - 07:12, 18 February 2025
- ...ina|State Council]].<ref name="law">{{cite web|title=Surveying and Mapping Law of the People's Republic of China|url=http://en.nasg.gov.cn/article/Lawsand ...ame="Reuters-2017">{{Cite news|date=2017-04-27|title=China revises mapping law to bolster territorial claims|language=en|work=Reuters|url=https://www.reut ...29 KB (3,870 words) - 19:33, 31 July 2024
- ...|title=Protecting Privacy when Disclosing Information: k-Anonymity and its Enforcement through Generalization and Suppression |url=http://www.csl.sri.com/papers/s ...|archive-url=https://web.archive.org/web/20190404185837/https://repository.law.miami.edu/umlr/vol64/iss3/7/|url-status=live}}</ref> ...55 KB (7,739 words) - 07:36, 21 December 2024
- ...r winning lottery tickets, lottery investigators later found.}}</ref> that law violations were involved.<ref name = "implausilucky">{{Cite journal| doi = ...15 KB (2,177 words) - 21:46, 20 February 2025
- {{Short description|Application of quantitative metrics to law}} {{Law sidebar}} ...36 KB (4,940 words) - 10:47, 9 February 2025
- ...</ref> Title 3 of the Fiscal Compact was subsequently incorporated into EU law as part of the economic governance framework reforms (Regulation (EU) 2024/ ...k]] (which entered into force December 2011) and [[twopack (European Union law)|twopack]] (planned entry into force in summer 2013), and the European Fisc ...207 KB (28,462 words) - 00:30, 21 November 2024
- ...mation is typically combined with other sources of information such as law enforcement and [[Intelligence assessment|intelligence information]].<ref name="Erdmann ...24 KB (3,445 words) - 00:31, 20 April 2023
- ...ref> In the [[United States of America|US]], the [[FinCEN|Financial Crimes Enforcement Network (FinCEN)]] established regulatory guidelines for "decentralized vir ...9 February 2014| url-status=live}}</ref> In April 2013, [[Eric Posner]], a law professor at the [[University of Chicago]], stated that "a real Ponzi schem ...156 KB (19,847 words) - 00:02, 24 February 2025
- ...ant strain rate). The most puzzling observation is that the critical power-law rate acceleration is decorated by log-periodic oscillations, suggesting a u ...es (which are assumed to be distributed according to the Gutenberg-Richter law, and to be independent of each other). Some other seismic or non-seismic pr ...60 KB (8,410 words) - 14:57, 4 January 2025
- ...-free networks]] the degree distribution approximately follows a [[power law]]: <math> ...tion of the BA Model, which follows a power law. In loglog scale the power law function is a straight line.<ref name=Barabasi1999>{{Cite journal ...70 KB (10,495 words) - 13:05, 15 January 2025
- ...tocurrency/|url-status=live}}</ref> In January 2019, the UK and German law enforcement agencies arrested a 36-year-old man from Oxford, England believed to be beh ...48 KB (6,045 words) - 01:34, 19 February 2025
- ...travel for a substantial period of time, he has been held, as a matter of law, to have been negligent. Under such circumstances, the courts have indicate ...spontaneously appear. The rule is the specific spatial case of the common law [[Speed limit#Reasonable speed|basic speed rule]],<ref name="189 Cal. 335"/ ...224 KB (33,127 words) - 16:16, 15 January 2025
- ...ion under the [[Age Discrimination in Employment Act]] of 1967 (ADEA). The law provides certain employment protections to workers who are over the age of ...s of 1970 because of the ''[[Ingravescentem aetatem]]''. The Code of Canon Law specifies in Canon 401 that ordinary bishops, nuncios, and bishops with Cur ...202 KB (28,186 words) - 13:43, 1 March 2025
- ...100 times less expensive than the reduction in cost predicted by [[Moore's law]].<ref>{{cite web|url=http://www.oecd.org/sti/ieconomy/Session_3_Delort.pdf ...ns | url-status=live }}</ref> either because of non-causal coincidences ([[law of truly large numbers]]), solely nature of big randomness<ref>{{Cite web | ...160 KB (20,974 words) - 20:46, 18 February 2025