Showing 2,981 - 3,000 results of 12,255 for search '"Greats"', query time: 0.10s Refine Results
  1. 2981

    History and trajectory of Rossetti's works ‘after Dante’: between private collections and museums by Yannick Le Pape

    Published 2025-01-01
    “…Dante was definitely popular in Great-Britain, so that it was quite easy for Rossetti to negotiate his works, and no doubt that the emerging speculative collecting for businessmen did limit sales to a short panel of wealthy rivals who took advantage of museums' hesitations about Pre-Raphaelitism — as well as foreign critics focused on Rossetti a bit too late, when his works were already in the English acquisitions field. …”
    Get full text
    Article
  2. 2982

    TURKEY’S SEARCH FOR SECURITY AND THE SOVIET FACTOR DURİNG THE SECOND WORLD W AR by Şaban Çalış

    Published 2014-05-01
    “…In this essay, an attempt has been inade to analyse Turkey’s search for security during the Second World War within the context of the Soviet factor and Turkish diplomatic relations with the great powers. It has taken the establishment of the Tripartite Agreement of 1939 as a starting point and tried to provide an analysis of events leading to Ankara’s decision of declaring war on the Axis in 1945. …”
    Get full text
    Article
  3. 2983

    A Primer on Exporting to Haiti by Christina D. Storz, Timothy G. Taylor, Gary F. Fairchild

    Published 2005-04-01
    “…These guides provide a great deal of information useful to individuals interested in developing export markets either through direct exports or through direct foreign investment. …”
    Get full text
    Article
  4. 2984

    Research on OSU based M-OTN technology innovation and application by Yadong GONG, Ruiquan JING, Heng ZHOU, Junjie LI, Xiaoli HUO

    Published 2022-11-01
    “…With SDH and MSTP networks facing withdrawal from the network, OTN will replace SDH/MSTP networks and sink to the edge of the network.At the same time, the requirements of customers’ services are also changing rapidly, but the packet enhanced OTN has various problems and challenges in carrying these services.Therefore, the M-OTN technology system based on OSU was proposed, and the technical advantages of M-OTN/OSU were comprehensively analyzed by combining its technical essence and experimental data.The results show that M-OTN/OSU has obvious advantages over packet enhanced OTN technology in many aspects.The application and deployment of M-OTN/OSU in the field network and network evolution are of great concern.Combined with the technical characteristics of M-OTN/OSU and the deployed devices in the field network, the research of M-OTN/OSU in networking scheme and network evolution strategy was shared.…”
    Get full text
    Article
  5. 2985

    Adalékok a határ mentiség újraértelmezéséhez Magyarországon (Additives for the Reinterpretation of Cross-Border Character in Hungary) by Béla Baranyi

    Published 2014-09-01
    “…As a result of the bargaining of great powers, the newly de¬veloped national states became the main barrier to the extension of interregional relations in Central Europe and mainly in Hungary. …”
    Get full text
    Article
  6. 2986

    La guerre et le canon by Michel Matly

    Published 2019-07-01
    “…A systematic analysis of a great corpus of various hundred comics dealing with the Spanish Civil War brings informations both about the war itself and about societies which remember it. …”
    Get full text
    Article
  7. 2987

    A Primer on Exporting to The Bahamas by Christina D. Storz, Timothy G. Taylor, Gary F. Fairchild

    Published 2005-04-01
    “…These guides provide a great deal of information useful to individuals interested in developing exports markets either through direct exports or direct foreign investment. …”
    Get full text
    Article
  8. 2988

    Exponential information’s extraction from power traces of modulo exponentiation implemented on FPGA by WU Zhen, CHEN Yun, CHEN Jun, WANG Min

    Published 2010-01-01
    “…A power analysis model on modulo exponentiation’s computation suitable for real environment was presented in the basis of analysis to the great amount of power traces in the rough.And a method of signal processing for extracting exponential information from the initial power traces was inferred too.Hereby,a power analysis platform was designed and implemented.The exponential information submerged in power traces of 32bit modulo exponentiation algorithms applied in a FPGA chip was successfully extracted where after.Meanwhile,a conclusion about SPA attack on RSA made by Messerges et al,such as the problem with an SPA attack was that the information about the secret key was difficult to directly observe,was proved to be incorrect.Finally,the static masking algorithm for modulo exponentiation of anti-SPA attack was also validated in this testing platform.…”
    Get full text
    Article
  9. 2989

    Signaling collection and monitoring technology based on FKS by Baoyou WANG, Jian YAO, Zhengqing ZHANG

    Published 2018-03-01
    “…The signaling data of telecom operators,which have a wide range of applications and great of values,is big data in real sense.In order to serve the real-time marketing scenarios better,the real-time processing and analysis ability of signaling data must be improved effectively.Firstly,the scheme of signaling collection and processing based on FKS was introduced,which combined the advantages of components such as Flume,Kafka and Spark Streaming,and played an important supporting role for operators to build real-time decision center.Furthermore,the Kafka monitoring program for topic consumption of consumer groups was proposed,which provided effective means for warning faults of real-time flow collection.The monitoring solution could effectively reduce the message queue congestion,avoid the risk of data loss,and also could obtain good application effects in practice.…”
    Get full text
    Article
  10. 2990

    Key Technologies of Wavelength Routing for Space-based Information Network by Xin LI, Yongjun LI, Cong PENG, Shanghong ZHAO

    Published 2022-03-01
    “…With the expansion of space exploration scope and the enrichment of exploration means, the number of users carried by space-based information networks has increased rapidly, and the types of services have been continuously updated.As a key technology of optical network, wavelength routing technology is of great signifi cance to improve wavelength utilization and ensure network service quality.Three typical wavelength routing methods of space-based information networks based on multi-service, dynamic characteristics and software defi nition were introduced.And the intelligent wavelength routing technology, hierarchical wavelength routing technology and multipath wavelength routing technology in space-based information networks were studied.The key technologies of wavelength routing in space-based Optical information networks were prospected.…”
    Get full text
    Article
  11. 2991

    La traversée médiatique du simple soldat. À partir de l’œuvre de Bertrand Carrière by Johanne Villeneuve

    Published 2012-03-01
    “…Our reading of Carrière’s work leads to some considerations aboutThe Wartime Memories Project,a website collecting memories (stories and photos) of the Great War and the Second World War. Our analysis relies on the relationship between mediation, testimony and cults of the dead. …”
    Get full text
    Article
  12. 2992

    A Primer on Exporting to El Salvador by Christina D. Storz, Timothy G. Taylor, Gary F. Fairchild

    Published 2005-04-01
    “…These guides provide a great deal of information useful to individuals interested in developing export markets either through direct exports or through direct foreign investment. …”
    Get full text
    Article
  13. 2993

    Survey of code-based digital signatures by Yongcheng SONG, Xinyi HUANG, Wei WU, Haixia CHEN

    Published 2021-08-01
    “…The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.Code-based hard problem is recognized as NP-complete problem, the complexity increases exponentially, and there is currently no threat of quantum computing to code-based cryptographic algorithm.Therefore, code-based algorithm can resist the quantum algorithm attack, which is one of the main directions of quantum-resistant cryptography.It is still an open problem to design secure and efficient code-based signatures.For many years, international researchers use classical and new methods to construct code-based signatures, but existing constructions are weak in security or poor in performance.Code-based signatures were comprehensively summarized and analyzed, and future research directions were indicated.…”
    Get full text
    Article
  14. 2994

    A Primer on Exporting to Honduras by Christina D. Storz, Timothy G. Taylor, Gary F. Fairchild

    Published 2005-04-01
    “…These guides provide a great deal of information useful to individuals interested in developing export markets either through direct exports or through direct foreign investment. …”
    Get full text
    Article
  15. 2995

    Qu’est-ce qu’une norme professionnelle by Eirick Prairat

    Published 2019-01-01
    “…Clarification first, welcome clarification because we recognize that there is great confusion about this concept of norm; the terms of requirement, order or prescription often "work" in rhetoric in the human and social sciences as semantic equivalents. …”
    Get full text
    Article
  16. 2996

    La migración latinoamericana actual en el cine mexicano y argentino   by Paola García, Perla Petrich

    Published 2012-09-01
    “…In others there is a change of kind:  "drama" is left behind and they are catalogued as " dramatic comedies " and even romantic comedies or simply movies of great comedy.The main purpose of this article is  to expose these changes and their motivations.…”
    Get full text
    Article
  17. 2997

    Singing complaintes criminelles across Europe by Una McIlvenna

    Published 2021-03-01
    “…The biggest difference is in the printing technologies: the size of the sheets or booklets varies a lot from region to region, and the use of images has seen great changes since the early modern era.…”
    Get full text
    Article
  18. 2998

    Du lecteur automate aux émotions universelles by Guillaume Pinson

    Published 2018-04-01
    “…From the reader immersed in his reading to the great "universal emotions" of the mass newspaper, we explore some of these bodily, emotional and social reactions. …”
    Get full text
    Article
  19. 2999

    A Primer on Exporting to Honduras by Christina D. Storz, Timothy G. Taylor, Gary F. Fairchild

    Published 2005-04-01
    “…These guides provide a great deal of information useful to individuals interested in developing export markets either through direct exports or through direct foreign investment. …”
    Get full text
    Article
  20. 3000

    The concept of ‘smart cities’. Towards community development? by Anastasia Stratigea

    Published 2012-10-01
    “…The value of ICTs in support of a variety of functions in urban environments, serving people, businesses and governmental institutions is nowadays greatly acknowledged. The concept of ‘smart’ cities has emerged, where local innovation systems, largely supported by digital networks and their applications, are contributing to the: diffusion of knowledge and information, knowledgeable decision making, network cooperation, efficient interaction among various actors and intelligence gathering. …”
    Get full text
    Article