Gotowa bibliografia na temat „Consent search”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Consent search”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Consent search"
McMullan, Sam. "Third Party Consent Searches Following the Search and Surveillance Act". Victoria University of Wellington Law Review 43, nr 3 (1.09.2012): 447. http://dx.doi.org/10.26686/vuwlr.v43i3.5030.
Pełny tekst źródłaAn, Seong-Su. "Consent search and seizure". Korean Journal of Comparative Criminal Law 10, nr 1 (lipiec 2008): 301–36. http://dx.doi.org/10.23894/kjccl.2008.10.1.013.
Pełny tekst źródłaKim, Gi Ho. "A study on consent search". Wonkwang University Legal Research Institute 40, nr 2 (30.06.2024): 41–59. http://dx.doi.org/10.22397/wlri.2024.40.2.41.
Pełny tekst źródłaZuk, Peter, i Gabriel Lázaro-Muñoz. "Treatment Search Fatigue and Informed Consent". AJOB Neuroscience 12, nr 1 (2.01.2021): 77–79. http://dx.doi.org/10.1080/21507740.2020.1866115.
Pełny tekst źródłaKappeler, Victor E., i Joseph B. Vaughn. "The evolution of consent search law". American Journal of Criminal Justice 10, nr 2 (marzec 1986): 163–77. http://dx.doi.org/10.1007/bf02887468.
Pełny tekst źródłaWulach, James S. "Psychological Evaluation of the Consent to Search". Journal of Psychiatry & Law 18, nr 3-4 (wrzesień 1990): 319–28. http://dx.doi.org/10.1177/0093185390018003-404.
Pełny tekst źródłaLokshin, G. "Vietnam-China Relations: a Difficult Search for Consent". Problemy Dalnego Vostoka, nr 2 (kwiecień 2019): 126–35. http://dx.doi.org/10.31857/s013128120005187-6.
Pełny tekst źródłaSchellings, Ron, Alfons G. Kessels, Gerben ter Riet, J. André Knottnerus i Ferd Sturmans. "Randomized consent designs in randomized controlled trials: Systematic literature search". Contemporary Clinical Trials 27, nr 4 (sierpień 2006): 320–32. http://dx.doi.org/10.1016/j.cct.2005.11.009.
Pełny tekst źródłaJafarbeiki, Sara, Amin Sakzad, Ron Steinfeld, Shabnam Kasra Kermanshahi, Chandra Thapa i Yuki Kume. "ACE: A Consent-Embedded privacy-preserving search on genomic database". Heliyon 10, nr 8 (kwiecień 2024): e29399. http://dx.doi.org/10.1016/j.heliyon.2024.e29399.
Pełny tekst źródłaLepola, Pirkko, Allison Needham, Jo Mendum, Peter Sallabank, David Neubauer i Saskia de Wildt. "Informed consent for paediatric clinical trials in Europe". Archives of Disease in Childhood 101, nr 11 (25.05.2016): 1017–25. http://dx.doi.org/10.1136/archdischild-2015-310001.
Pełny tekst źródłaRozprawy doktorskie na temat "Consent search"
Gold, Rebecca M. "Perceptions of Search Consent Voluntariness as a Function of Race". Scholarship @ Claremont, 2015. http://scholarship.claremont.edu/scripps_theses/652.
Pełny tekst źródłaHowe, Julie E. "Voluntary Consent to Police Searches: A Result of the Foot-In-The-Door Technique". W&M ScholarWorks, 1993. https://scholarworks.wm.edu/etd/1539625845.
Pełny tekst źródłaGuénolé, Nicolas. "Conseil adaptatif et accompagnement des demandeurs d'emploi". Phd thesis, Conservatoire national des arts et metiers - CNAM, 2013. http://tel.archives-ouvertes.fr/tel-01062786.
Pełny tekst źródłaPanjwani, Hasnain. "Development of a torsion balance facility and a search for temporal variations in the Newtonian gravitational constant". Thesis, University of Birmingham, 2012. http://etheses.bham.ac.uk//id/eprint/3758/.
Pełny tekst źródłaPoulet, Sarah. "Contextual Cueing : apprentissage des régularités spatiales de l’environnement au cours de la recherche visuelle et accès conscient aux connaissances". Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCC027.
Pełny tekst źródłaWhile deeply complex, the visual world is highly structured and redundant. Through experience, human beings can thus learn regularities present in the visual world, and exploit them to deal with information overload and facilitate behaviors. For the past twenty years, the Contextual Cueing (CC) paradigm has provided an experimental tool to study, in the laboratory, how spatial regularities can be learned to expedite visual search. The first part of this dissertation reviews the existing literature related to this paradigm. It mainly discusses the implicit nature of CC, the characterization of the acquired knowledge and its facilitating effect, as well as the generalization of spatial CC to other regularities and environments. In a second part, three experimental studies using the CC paradigm are presented. The first one shows that, in natural scenes, the acquisition of implicit knowledge tends to precede the conscious exploitation of regularities that classically accompanies CC in this type of environment. In artificial scenes (i.e., letter configurations), even if CC does not seem to primarily depend on the proper implementation of explicit and conscious processes, our second study reports that its integrity is threatened during normal ageing. Finally, our third study investigates whether CC can emerge from very brief exposures of regularities (i.e., 50ms), and suggests that regularities can actually be extracted and exploited even though search displays are not (physically) available long enough to complete the search
Marzioni, Maria Francesca. "Axion dark matter and two-neutrino double electron capture searches in the Large Underground Xenon experiment". Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31054.
Pełny tekst źródłaKhalil, Sadia. "Measurement of the branching fraction of D+ meson going to muon+ neutrino and the pseudoscalar decay constant fD+ using the full psi'' sample and search for neutral D meson going to proton-electron and neutral D meson going to antiproton-positron". Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2009. http://wwwlib.umi.com/cr/syr/main.
Pełny tekst źródłaJin, Shendan. "Online computation beyond standard models". Electronic Thesis or Diss., Sorbonne université, 2020. http://www.theses.fr/2020SORUS152.
Pełny tekst źródłaIn the standard setting of online computation, the input is not entirely available from the beginning, but is revealed incrementally, piece by piece, as a sequence of requests. Whenever a request arrives, the online algorithm has to make immediately irrevocable decisions to serve the request, without knowledge on the future requests. Usually, the standard framework to evaluate the performance of online algorithms is competitive analysis, which compares the worst-case performance of an online algorithm to an offline optimal solution. In this thesis, we will study some new ways of looking at online problems. First, we study the online computation in the recourse model, in which the irrevocability on online decisions is relaxed. In other words, the online algorithm is allowed to go back and change previously made decisions. More precisely, we show how to identify the trade-off between the number of re-optimization and the performance of online algorithms for the online maximum matching problem. Moreover, we study measures other than competitive analysis for evaluating the performance of online algorithms. We observe that sometimes, competitive analysis cannot distinguish the performance of different algorithms due to the worst-case nature of the competitive ratio. We demonstrate that a similar situation arises in the linear search problem. More precisely, we revisit the linear search problem and introduce a measure, which can be applied as a refinement of the competitive ratio. Last, we study the online computation in the advice model, in which the algorithm receives as input not only a sequence of requests, but also some advice on the request sequence. Specifically, we study a recent model with untrusted advice, in which the advice can be either trusted or untrusted. Assume that in the latter case, the advice can be generated from a malicious source. We show how to identify a Pareto optimal strategy for the online bidding problem in the untrusted advice model
Gervier, Pauline. "La limitation des droits fondamentaux constitutionnels par l’ordre public". Thesis, Bordeaux 4, 2013. http://www.theses.fr/2013BOR40058/document.
Pełny tekst źródłaThe dialectics of public order and freedoms has been traveling throughout legal thought since the 18th century. Sparked by new forms of delinquency and criminality, the strengthening of public order requirements leads to questioning the limitation of fundamental constitutional rights. Despite its crucible place between public order and freedoms, the limitation process remains undetermined in French law. This research, which aims at determining the limitations to protected rights, identifying the limitations to those limitations themselves, and then redefining fundamental rights through those limitations, not only helps to specify this mechanism, but also to identify the restrictions brought to the enjoyment of rights and freedoms. The Conseil constitutionnel self-restraint reveals a gradual shift in the protection of fundamental rights. Acknowledging the former leads to considering a supra legislative framework to the limitations to protected rights, and advocating in favor of the constitutional entrenchment of such a clause
李巧雯. "Consent search". Thesis, 2016. http://ndltd.ncl.edu.tw/handle/jx7abq.
Pełny tekst źródła輔仁大學
法律學系碩士在職專班
104
This paper explores the practice of “consent searches”, searching without warrants when necessary for an investigation as an exception to the principle of legal reservation. While it violates the people’s constitutional right by nature, it is widely used in practice. For this reason, it is necessary to study the possible approaches to control the legality of searching without warrants, such as a threshold to initiate, and the limits for, such searches. Since “consent search” is a form of search, this paper discusses the threshold to initiate, and the scope of, searches with and without warrants in Chapter 2. Chapter 3 explores the theoretical bases for consent searches (consent given by those affected or by third persons), and discusses whether “consent” may be the basis for a search, which is a compulsory measure that interferes and violates the people’s constitutional right. Chapter 4 analyzes the elements of consent searches: subject, party, capacity, obligation of disclosure upon refusal to searches, voluntariness, rescinding, display of credentials and display of consent on record. This Chapter also provides, on the basis of Chapter 3, solutions to problems in determining whether a party has the capacity to give consent, or resolving conflicts between parties. Further, this Chapter reviews the practices of Taiwan and the U.S. on the voluntariness of consent, which is difficult to determine for searches. Finally, this paper studies Taiwan’s current legal framework and practices, and concludes that because of Taiwan’s unique practical approach, consent searches have become a shortcoming in Taiwan’s human rights protection regime. Therefore, this paper deems that the necessity of consent searches, which only serve the convenience of investigations while violating the people’s constitutional right, should be subject to skepticism.
Książki na temat "Consent search"
Decker, Scott H. Reducing gun violence: The St. Louis consent-to-search program. Washington, DC (810 Seventh St., N.W., Washington 20531): U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2004.
Znajdź pełny tekst źródłaDecker, Scott H. Reducing gun violence: The St. Louis Consent-to-Search Program. [Washington, D.C.]: U.S. Dept. of Justice, Office of Justice Programs, National Institute of Justice, 2004.
Znajdź pełny tekst źródłaDecker, Scott H. Reducing gun violence: The St. Louis Consent-to-Search Program. [Washington, D.C.]: U.S. Department of Justice, Office of Justice Programs, National Institute of Justice, 2004.
Znajdź pełny tekst źródłaOlson, Theodore B. The senate confirmation process: Advise and consent, or search and destroy? Washington, D.C: National Legal Center for the Public Interest, 2006.
Znajdź pełny tekst źródłaEurope, Council of, red. Council of Europe Convention on Laundering, Search, Seizure and Confiscation of the Proceeds from Crime and on the Financing of Terrorism =: Convention du Conseil de l'Europe relative au blanchiment, au dépistage, `a la saisie et `a la confiscation des produits du crime et au financement du terrorisme. Strasbourg: Council of Europe Publishing, 2005.
Znajdź pełny tekst źródłaSearch & Research, Lectures and Papers Vol 22 : The Murder of the Jews and Popular Consent: German Society during the Nazi Dictatorship. Yad Vashem Publications, 2015.
Znajdź pełny tekst źródłaCrépon, Marc. Murderous Consent. Tłumaczy Michael Loriaux i Jacob Levi. Fordham University Press, 2019. http://dx.doi.org/10.5422/fordham/9780823283750.001.0001.
Pełny tekst źródłaEileen, Denza. Inviolability of the Mission Premises. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198703969.003.0020.
Pełny tekst źródłaCutter, Mary Ann G. Thinking Through Breast Cancer. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190637033.001.0001.
Pełny tekst źródłaMøller, Ann Merete. Evidence-based medicine in anaesthesia. Redaktor Jonathan G. Hardman. Oxford University Press, 2017. http://dx.doi.org/10.1093/med/9780199642045.003.0029.
Pełny tekst źródłaCzęści książek na temat "Consent search"
Waites, Matthew. "Sexual Liberationism and the Search for New Sexual Knowledge". W The Age of Consent, 119–57. London: Palgrave Macmillan UK, 2005. http://dx.doi.org/10.1057/9780230505933_6.
Pełny tekst źródłaBisht, Renuka. "The Search for a Happy Ending". W Desire and Consent in Representations of Adolescent Sexuality with Adults, 169–84. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003283768-12.
Pełny tekst źródłaMacLean, Charles E., i James A. Densley. "Court-Approved Police Deception in Obtaining Consent to Search". W Police, Prosecutors, Courts, and the Constitution, 41–49. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-39082-1_4.
Pełny tekst źródłaVito, Anthony G., i George E. Higgins. "Understanding the role of race, gender and age in request to consent search drivers". W Over-Policing Black Bodies, 43–63. London: Routledge, 2023. http://dx.doi.org/10.4324/9781003379652-4.
Pełny tekst źródłaSignorelli, Walter P. "Consent Searches". W Criminal Law, Procedure, and Evidence, 165–78. Wyd. 2. New York: Routledge, 2023. http://dx.doi.org/10.4324/9781003415091-16.
Pełny tekst źródładel Carmen, Rolando V., i Jeffery T. Walker. "Searches with Consent". W Briefs of Leading Cases in Law Enforcement, 117–30. Tenth edition. | Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge, 2019. http://dx.doi.org/10.4324/9780429053139-8.
Pełny tekst źródłaKagehiro, Dorothy K., i Ralph B. Taylor. "Exploring the Fourth Amendment: Searches Based on Consent". W Handbook of Psychology and Law, 21–36. New York, NY: Springer New York, 1992. http://dx.doi.org/10.1007/978-1-4757-4038-7_2.
Pełny tekst źródłaMurphy, Erin. "Conceptions of consent, family and jurisdiction in forensic genetic genealogical searches". W Law, Practice and Politics of Forensic DNA Profiling, 217–33. London: Routledge, 2022. http://dx.doi.org/10.4324/9780429322358-17.
Pełny tekst źródłaJackson Kimball, Derek F., Leanne D. Duffy i David J. E. Marsh. "Ultralight Bosonic Dark Matter Theory". W The Search for Ultralight Bosonic Dark Matter, 31–72. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-95852-7_2.
Pełny tekst źródłaGupte, Akshay, Melanie Siebenhofer i Angelika Wiegele. "Computing the Edge Expansion of a Graph Using Semidefinite Programming". W Lecture Notes in Computer Science, 111–24. Cham: Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-60924-4_9.
Pełny tekst źródłaStreszczenia konferencji na temat "Consent search"
Jung, Eun Sun, Luis Fernando Gomes Carreira, Vinicius Finisguerra Vianna, Taina Ribeiro Azevedo i Rubens José Gagliardi. "General knowledge of stroke in Aparecida city: reports from an academic expedition". W XIV Congresso Paulista de Neurologia. Zeppelini Editorial e Comunicação, 2023. http://dx.doi.org/10.5327/1516-3180.141s1.452.
Pełny tekst źródłaКиреева, Виктория, Viktoriya Kireeva, Ю. Усольцев, Yu Usolcev, Ж. Капустенская, Zh Kapustenskaya, Е. Кожевникова i in. "Intermediate results 2016 of a search study of translational diagnostic methods Mitochondrial dysfunction in patients with chronic myocardial ischemia and/or head Brain". W Topical issues of translational medicine: a collection of articles dedicated to the 5th anniversary of the day The creation of a department for biomedical research and technology of the Irkutsk Scientific Center Siberian Branch of RAS. Москва: INFRA-M Academic Publishing LLC., 2017. http://dx.doi.org/10.12737/conferencearticle_58be81ec94893.
Pełny tekst źródłaSavade, Latika C., i Suraj Chavan. "A technique to search log records using system of linear equations". W 2012 CSI Sixth International Conference on Software Engineering (CONSEG). IEEE, 2012. http://dx.doi.org/10.1109/conseg.2012.6349471.
Pełny tekst źródła"Private Web Search with Constant Round Efficiency". W 1st International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005225602050212.
Pełny tekst źródłaBonte, Charlotte, i Ilia Iliashenko. "Homomorphic String Search with Constant Multiplicative Depth". W CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3411495.3421361.
Pełny tekst źródłaHu, Qi, i Yangqiu Song. "User Consented Federated Recommender System Against Personalized Attribute Inference Attack". W WSDM '24: The 17th ACM International Conference on Web Search and Data Mining. New York, NY, USA: ACM, 2024. http://dx.doi.org/10.1145/3616855.3635830.
Pełny tekst źródłaNagy, Allen L., i Robert R. Sanchez. "Color differences required for parallel visual search". W OSA Annual Meeting. Washington, D.C.: Optica Publishing Group, 1988. http://dx.doi.org/10.1364/oam.1988.mh5.
Pełny tekst źródłaNiu, Li, Xiong Liu, Youyi Wang, Amit K. Gupta i Jianyang Zhai. "Induction machine rotor time constant identification using bisection search method". W TENCON 2016 - 2016 IEEE Region 10 Conference. IEEE, 2016. http://dx.doi.org/10.1109/tencon.2016.7848738.
Pełny tekst źródłaLimin Xiang, Kai Cheng i K. Ushijiam. "Encoding a Binary Search Tree in Constant Time on BSR". W Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05). IEEE, 2005. http://dx.doi.org/10.1109/pdcat.2005.133.
Pełny tekst źródłaTisdale, John, i J. Karl Hedrick. "A UAV Trajectory Planning Algorithm for Simultaneous Search and Track". W ASME 2005 International Mechanical Engineering Congress and Exposition. ASMEDC, 2005. http://dx.doi.org/10.1115/imece2005-81100.
Pełny tekst źródłaRaporty organizacyjne na temat "Consent search"
Stephens, Jaime, Thomas McLaren, Caitlyn Gillespie i Claire Stuyck. Landbird monitoring: 2022 results from Crater Lake National Park, Lassen Volcanic National Park, Oregon Caves National Monument and Preserve, and Whiskeytown National Recreation Area. National Park Service, 2024. http://dx.doi.org/10.36967/2303313.
Pełny tekst źródłaSentcоv, Valentin, Andrei Reutov i Vyacheslav Kuzmin. Electronic training manual "Acute poisoning with psychotropic substances". SIB-Expertise, styczeń 2024. http://dx.doi.org/10.12731/er0777.29012024.
Pełny tekst źródłaKerber, Steve, i Robin Zevotek. Fire Service Summary Report: Study of Residential Attic Fire Mitigation Tactics and Exterior Fire Spread Hazards on Firefighter Safety. UL Firefighter Safety Research Institute, listopad 2014. http://dx.doi.org/10.54206/102376/pxtq2256.
Pełny tekst źródłaKerber, Steve, i Robin Zevotek. Study of Residential Attic Fire Mitigation Tactics and Exterior Fire Spread Hazards on Firefighter Safety Released. UL Firefighter Safety Research Institute, listopad 2014. http://dx.doi.org/10.54206/102376/lihb1439.
Pełny tekst źródłaCantor, Amy G., Rebecca M. Jungbauer, Andrea C. Skelly, Erica L. Hart, Katherine Jorda, Cynthia Davis-O'Reilly, Aaron B. Caughey i Ellen L. Tilden. Respectful Maternity Care: Dissemination and Implementation of Perinatal Safety Culture To Improve Equitable Maternal Healthcare Delivery and Outcomes. Agency for Healthcare Research and Quality (AHRQ), styczeń 2024. http://dx.doi.org/10.23970/ahrqepccer269.
Pełny tekst źródłaGalili, Naftali, Roger P. Rohrbach, Itzhak Shmulevich, Yoram Fuchs i Giora Zauberman. Non-Destructive Quality Sensing of High-Value Agricultural Commodities Through Response Analysis. United States Department of Agriculture, październik 1994. http://dx.doi.org/10.32747/1994.7570549.bard.
Pełny tekst źródła