Showing 1 - 20 results of 55 for search '"Impersonator"', query time: 0.03s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Eliot’s Modernist Manifesto by Viorica Patea

    Published 2017-01-01
    Subjects:
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    Parodies de dandies : travestissement et transgression des genres au music-hall by Catherine Rovera

    Published 2011-03-01
    “…Male impersonators (Nellie Power, Vesta Tilley, Ella Shields...) portray dandy characters in a more subtle and ambivalent manner. …”
    Get full text
    Article
  12. 12

    Madame Bovary et ses trente-quatre « vous », ou le retour du refoulé by Alain Vaillant

    Published 2017-06-01
    “…Flaubert, as we all know, is the artist of impersonality, of the elocutionary disappearance of the novelist. …”
    Get full text
    Article
  13. 13

    Réversibilité du mépris dans Bouvard et Pécuchet ou comment « saper les bases » de la société by Isabelle Pitteloud

    Published 2023-06-01
    “…The impossibility of stabilising the points of view expressed in this way leads us to observe an “equality of everything” that is a joyfully denigrating impersonality.…”
    Get full text
    Article
  14. 14

    Reconstructing a lightweight security protocol in the radio‐frequency identification systems by Alireza Abdellahi Khorasgani, Mahdi Sajadieh, Mohammad Rouhollah Yazdani

    Published 2023-07-01
    “…The authors reveal its vulnerability to various attacks, such as tag impersonation, reader impersonation and de−synchronisation attacks. …”
    Get full text
    Article
  15. 15

    ALEXEY LOSEV: LIFE AND DESTINY OF A PHILOSOPHER by Lyudmila B. Logunova, Yuriy Yu. Petrunin

    Published 2022-05-01
    “…In this aspect, the fate of the philosopher appears as a personification of a contemporary historical era that allows us to understand history not as an objective impersonal process, but as a drama of lives and ideas. …”
    Get full text
    Article
  16. 16

    Security-enhanced three-factor remote user authentication scheme based on Chebyshev chaotic maps by Yan Zhao, Shiming Li, Liehui Jiang, Tieming Liu

    Published 2019-04-01
    “…Recently, Park et al. pointed that Cao and Ge’s three-factor authentication scheme suffers from offline identity guessing attack and server impersonation attack. They also proposed a new scheme after presenting the corresponding cryptanalysis. …”
    Get full text
    Article
  17. 17

    News Writing for Print by Ricky W. Telg

    Published 2015-02-01
    “… A good print news story will contain the following components: inverted pyramid structure, five Ws and H, leads, impersonal reporting, news writing techniques, quotations and attributions, Associated Press Style, and proper grammar and punctuation. …”
    Get full text
    Article
  18. 18

    News Writing for Print by Ricky W. Telg

    Published 2015-02-01
    “… A good print news story will contain the following components: inverted pyramid structure, five Ws and H, leads, impersonal reporting, news writing techniques, quotations and attributions, Associated Press Style, and proper grammar and punctuation. …”
    Get full text
    Article
  19. 19

    Power and authority in Matthew's gospel by F. P. Viljoen

    Published 2011-12-01
    “…Herod, Antipas and Pilate specifically impersonate this foreign domination. Apparently these figures have unlimited power which leaves Jesus and his followers as exposed victims. …”
    Get full text
    Article
  20. 20

    Cesty evropské historiografie k diplomacii raného novověku by Jiří Hrbek

    Published 2013-12-01
    “… While positivist science of the 19th century perceived the history of diplomacy as the history of impersonal state formations, the 20th century began, behind international treaties and complicated negotiations, to see persons of individual diplomats and their closest surroundings. …”
    Get full text
    Article