-
21
Flaubert lecteur : une histoire des écritures
Published 2009-12-01“…We find on the one hand the admired figures of the past, whether they be the great naïve geniuses who inspire Flaubert’s dogma of impersonality, or the masters of the classical age, who remind the inspired writer to be patient. …”
Get full text
Article -
22
It girl, it bag et le pronom it : le sens du pronom neutre non anaphorique
Published 2012-11-01“…‘Neutral’ has to be understood as ‘inclusive’ and ‘impersonal’ as making the speaker ‘implicit’.…”
Get full text
Article -
23
Personal reboot and survival
Published 2020-10-01“…It is concluded that the main goals of critical attacks of these arguments are the temporal mismatch of psychological connectedness and continuity as well as the reductionist claim that all the facts what matters for survival can be described in an impersonal way…”
Get full text
Article -
24
THE TRANSLATION OF INFORMATION PATTERN FOR I CARE A LOT MOVIE SUBTITLE FROM ENGLISH TO INDONESIAN
Published 2021-10-01“…The results of the study indicate that (i) there are parallels in information pattern urgency, namely foreground position tends to be in the beginning of the speech; (ii) the misalignment of information status occurs in sentences translation with it subject and that impersonal and in interrogative and imperative sentences translation, as well as in sentences translation with the non-doer subject. …”
Get full text
Article -
25
An Eye for an Eye: Brian Evenson’s Merciless Art of Exposure
Published 2014-01-01“…Aiming at transparency or blankness, Evenson’s impersonal writing, though controlled and measured, introduces minimal distance between the reader and the acts of violence it depicts, as if trying to disappear behind them. …”
Get full text
Article -
26
A Madame Bovary’s Daughter: David Lean’s Visual Transliteration of Flaubert
Published 2014-11-01“…This article deems a different cinematic approach with a film that has not received full attention: Ryan’s Daughter by David Lean. The impersonal narration and sensual expression of the novel are reassessed in light of this loose adaptation. …”
Get full text
Article -
27
Secure and Efficient User Authentication Scheme in Ubiquitous Wireless Sensor Networks
Published 2014-04-01“…However, many user authentication schemes are vulnerable to impersonation attacks, parallel session attacks, password guessing attacks, stolen smart card attacks, and so forth. …”
Get full text
Article -
28
A case for two voices in Old Church Slavonic – reflexively marked OCS verbs
Published 2015-12-01“…Consequently, the expressions headed by anticausatives, reflexives, subject experiencer verbs, statives, and reciprocals (as well as dative impersonal structures) encroach on the area of semantics belonging in Modern Slavic to be the realm expressed in terms of passive morpho-syntax. …”
Get full text
Article -
29
Hedging functions of extraposed that-clauses in English and declarative subject da-clauses in Croatian academic writing
Published 2020-12-01“…In academic writing stance is often conveyed by means of extraposed that-clauses (It is possible that the results were misinterpreted.). The impersonal form of a matrix predicate allows writers to express attitudes without assuming responsibility for the claim, which renders extraposition particularly convenient for hedging (Biber et al., 1999). …”
Get full text
Article -
30
« Parlez-vous franglais ? » La galimafrée des langues dans Henry V
Published 2022-01-01“…It is in part up to the actor to individualize speech and find idiosyncrasies that will enable him to impersonate a particular character. Similarly, gestures and stagecraft can contribute to make up for the losses and deficiencies in the translation of the ‘French’ scenes in Henry V, whereas neither conserving Shakespeare’s dated and faulty French nor its translation into modern French is true to the original bilingualism of the play. …”
Get full text
Article -
31
Stapled peptides: targeting protein-protein interactions in drug development
Published 2024-04-01“…Protein-protein interactions (PPIs) impersonate a significant role in many biological processes and are potential therapeutic targets in numerous human diseases. …”
Get full text
Article -
32
La moral y la ambivalencia de los bienes. Un análisis básico para la teoría de la justicia social
Published 2017-01-01“…Contra el esencialismo de las concepciones de la justicia social como desarrollo, se sostiene que los bienes se configuran siempre en relaciones recíprocas, nunca de manera objetiva e impersonal. El núcleo deontológico de la moral reside en la crítica de las formas de actuary reposa en una ontología natural, mientras que el amplio conjunto de creencias normativas que llamamos ética se basa en la crítica de los bienes y presupone una ontología dialéctica. …”
Get full text
Article -
33
A critical assessment of John Milbank's Christology
Published 2012-12-01“…In order to maintain his non-violent and poetic ontological position, Milbank needs to revert to a general, “high” and impersonal Christology, and disregard “low” Christology. …”
Get full text
Article -
34
L’Orient-souvenir. Le surgissement du passé autobiographique dans le périple méditerranéen de Flaubert
Published 2019-12-01“…Before he espoused the principle of literary impersonality, Flaubert considered travel writing as a form in which the ‘I’ could reveal itself freely; it re-emerged in more indirect ways in the works that followed.…”
Get full text
Article -
35
Enactivism as an epistemology for science of complexity
Published 2023-02-01“…This strategy covers not only the ‘ecology’ of impersonal self-organising systems, but also the human mind, including the principles of complex thinking. …”
Get full text
Article -
36
Provably secure biometric and PUF-based authentication for roaming service in global mobility network
Published 2025-02-01“…To ensure secure mutual authentication and prevent attacks such as impersonation, physical attacks, and DoS attacks, GLOMONET must provide strong anonymity, address loss of synchronization issues, and incorporate unclonable devices as an essential security feature. …”
Get full text
Article -
37
Environmental Ethics and the Need for Theory
Published 2023-03-01“…Its findings include the conclusions that our moral obligations (or responsibilities) extend to people and non-human creatures of the foreseeable future, as far as the impacts of present actions and policies can themselves be foreseen, that, that moral standing attaches to the possible people and other living creatures of the future, and (with Derek Parfit) that ethics is to some degree impersonal, being concerned with future quality of life for whoever lives in future centuries, whether they are currently identifiable or not. …”
Get full text
Article -
38
A Novel k-out-of-n Oblivious Transfer Protocol from Bilinear Pairing
Published 2012-01-01“…In most cases, they are treated as cryptographic primitives and are usually executed without consideration of possible attacks that might frequently occur in an open network, such as an impersonation, replaying, or man-in-the-middle attack. …”
Get full text
Article -
39
DS-ARP: A New Detection Scheme for ARP Spoofing Attacks Based on Routing Trace for Ubiquitous Environments
Published 2014-01-01“…However, since it does not include security measures against malicious attacks, in its design, an attacker can impersonate another host using ARP spoofing or access important information. …”
Get full text
Article -
40
Les services de Santé Sexuelle et Reproductive en Tunisie. Résultats d’une recherche qualitative auprès des jeunes usagers
Published 2017-11-01“…This attitude seems to be sought by all the young people who, throughout the interviews and regardless the place of residence, have obviously often evoked their own experience by projecting their comments on young people in general and in an impersonal way. The results of this study provide relevant information for the future development of SRH services and structures so that they can become their effective users through adapting the national plan and strengthening its implementation. …”
Get full text
Article