Showing 581 - 600 results of 753 for search '"broadcasting"', query time: 0.04s Refine Results
  1. 581

    Un arrière-plan essentiel, la question de la sécurité dans la série Maria Vandamme by Isabelle Veyrat-Masson

    Published 2024-12-01
    “…The television series, Maria Vandamme, was broadcast in 1989 and was a hit with audiences. It received numerous awards for its portrayal of the four-part adaptation of Jacques Duquesne's book, set during the Second Empire and concluding with La Commune de Paris. …”
    Get full text
    Article
  2. 582

    Multi-Agent Maritime Traffic Simulator by Luka Grgicevic

    Published 2024-10-01
    “…Vessels are engaged in repeated competitive polymatrix games, whose equilibria solutions are a series of waypoints, meant to be broadcast as navigational decision support by the Vessel Traffic Services. …”
    Get full text
    Article
  3. 583

    Preparing to Evacuate your Home in Case of an Emergency by Elizabeth B. Bolton

    Published 2003-07-01
    “…Most of the time these requests and related information will come through radio broadcasts or the local TV station. Different warning methods may be used such as a siren or telephone calls. …”
    Get full text
    Article
  4. 584

    Discours direct : syntaxe et prosodie by Sylvie HANOTE

    Published 2015-06-01
    “…It is based on the acoustic analysis of an oral corpus drawn from the radio (BBC Radio for British English and National Public Radio for American English) which has been compiled at Poitiers University and contains about 8 hours of audio files (= ca 80,000 words) from various types of documents (political speeches, interviews, news broadcasts, scientific programmes…), most of them recorded from 2004 to 2013. …”
    Get full text
    Article
  5. 585

    Preparing to Evacuate your Home in Case of an Emergency by Elizabeth B. Bolton

    Published 2003-07-01
    “…Most of the time these requests and related information will come through radio broadcasts or the local TV station. Different warning methods may be used such as a siren or telephone calls. …”
    Get full text
    Article
  6. 586

    Ce que le livestream fait au live by Romain Bigay

    Published 2022-12-01
    “…With livestream, whose development has accelerated sharply with the Covid19 pandemic, live music is created and broadcast online, via ad hoc technical solutions, but above all via social content sharing platforms. …”
    Get full text
    Article
  7. 587

    Les Souverains Anonymes : des archives carcérales du « dedans » by Simon-Olivier Gagnon, Anne Klein

    Published 2024-01-01
    “…In Quebec since 1989, Souverains Anonymes, a radio programme, has been produced with the inmates of the Montreal detention centre and broadcast on dozens of community radio stations in Quebec, Canada and France. …”
    Get full text
    Article
  8. 588

    Hurricane Preparation: Evacuating Your Home by Elizabeth B. Bolton

    Published 2005-06-01
    “…Most of the time these requests and related information will come through radio broadcasts or the local TV station. Different warning methods may be used such as a siren or telephone calls. …”
    Get full text
    Article
  9. 589

    An efficient cooperative message authentication based on reputation mechanism in vehicular ad hoc networks by Yong Xie, Songsong Zhang, Xiang Li, Yanggui Li

    Published 2019-06-01
    “…Vehicles periodically broadcast traffic-related status messages. Message authentication is a common way for ensuring information reliability, but it is an unaffordable computational cost for single vehicle. …”
    Get full text
    Article
  10. 590

    Samuel Beckett's Breath on Screen: Damien Hirst’s Adaptation by Filiz Kutlu

    Published 2021-04-01
    “…As a collaborative work of RTÉ (Raidiό Teilifis Éireann), Channel 4 (the British broadcaster), the Irish Film Board, and Tyrone Productions, the project includes films, ranging from approximately forty-five seconds to two hours. …”
    Get full text
    Article
  11. 591

    Enduring elites in quoted sources: Institutional alignment in Finnish media, 1999–2018 by Seuri Olli, Koivunen Anu, Levola Henna, Mäkelä Eetu

    Published 2024-03-01
    “…Focusing on four Finnish news outlets from 1999 to 2018 (a daily newspaper, a news agency, a tabloid, and a public broadcaster), we analyse the essential gatekeeping practice of giving voice to actors by quoting them directly or indirectly. …”
    Get full text
    Article
  12. 592

    How to use live streaming platforms to elicit impulse purchases of tourism and hospitality products from consumers? by Dan Wang, Ching-Cheng Shen, Jennifer Pasion Loverio

    Published 2025-03-01
    “…Additionally, factors influencing the buying decisions of live broadcast shoppers for tourism and hospitality products are explored. …”
    Get full text
    Article
  13. 593

    Performance analysis of secrecy rate for SWIPT in massive antenna by Hui BAO, Minmin ZHANG, Yaqing YAO, Hui WANG

    Published 2017-09-01
    “…In the multi-drop broadcast system,the existing research is to optimize the single-user security rate in the complete channel state information.In fact,it’s impossible that there exists only one user in the system.The base station often receives incomplete channel state information.Aiming at this problem,a robust beamforming scheme was proposed.In the multi-user case,considering the influence of channel estimation error on the system security rate,the particle swarm optimization algorithm was used to optimize the emission beamforming vector,artificial noise covariance and power split ratio to ensure that the user collects a certain energy while maximizing the safe transmission rate.The simulation results show that the proposed scheme is slightly lower than the security rate in the ideal case,but it is meaningful to the actual system,taking into account the existence of eavesdropping users and the estimation error.…”
    Get full text
    Article
  14. 594

    Distributed nearneighbor search algorithm based on real-time traffic information in dynamic road network by Chen YE, Zhen-yu YANG, Jian YU, Qi LONG

    Published 2014-12-01
    “…A novel distributed near neighbor search algorithm that makes use of real-time traffic information is presented.The geographic information are stored in the nearest smart camera using Voronoi partition,and cameras are located in the intersection.The intersection unimpeded degree is modeled and the time which vehicle travel between adjacent intersec-tions is estimated.When a vehicle search for some near neighbors,smart cameras set a delay to broadcast the near neighbor search packet based on the traffic parameters collected by smart camera networks.In this way,the near neighbor search packet can be transmitted according to current road conditions.Thus get the path to near targets quickly and effec-tively.Extensive experiments are londucted on real data sets,and the results show that proposed algorithm is efficient and scalable to large number of concurrent query,significantly outperforming state-of-the-art methods.…”
    Get full text
    Article
  15. 595

    The Audiovisual Archive in an Era of Disinformation and Misinformation by Jacqueline Pietsch, in collaboration with the MediaNumeric Team

    Published 2024-09-01
    “…Rather than focus on the specific missions of either national or broadcaster’s archives, they focus on how the archive has an important role when it comes to the politics of representation in public debate and civil life. …”
    Get full text
    Article
  16. 596

    Magic and Collage: Language in Ginsberg’s "Wichita Vortex Sutra" by Elisa Sabbadin

    Published 2021-10-01
    “…These include a Whitmanian, prophetic tone which becomes increasingly prevalent and the mediatic chaos of the news, featuring advertising, newspaper extracts, and radio broadcasts. In "Wichita Vortex Sutra," Ginsberg’s use of language is especially noteworthy: on the one hand, the poet charges language with a spiritual, magical power, and on the other hand, he destroys it, fragments it, and recreates it through the collage. …”
    Get full text
    Article
  17. 597

    A New Solution of Privacy-Preserving Public Auditing Scheme for Cloud Storage Security by Shaohui Wang, Danwei Chen, Zhiwei Wang, Suqin Chang

    Published 2012-09-01
    “…In this paper, after giving a new construction of a recently proposed primitive named aggregatable signature based broadcast encryption scheme, we present an efficient public auditing scheme with privacy property. …”
    Get full text
    Article
  18. 598

    Deadwood : la naissance d’une ville by Nathalie Massip

    Published 2009-12-01
    “…Broadcast on H.Β.Ο. from 2004 to 2006, Deadwood is an American western television series that depicts the construction and transformation of a miners’ camp into a booming town in South Dakota in the 1870s. …”
    Get full text
    Article
  19. 599

    National Team of Greece: Gender, Sports, and the Recession by Georgia Aitaki

    Published 2025-01-01
    “…National Team of Greece (2015) was a dramedy broadcast on Greek television revolving around a group of women’s efforts to establish the first Greek women’s curling team, amidst a number of personal challenges and societal obstacles, as much as against the backdrop of a country in deep political and economic crisis. …”
    Get full text
    Article
  20. 600

    RTRS algorithm in low-power Internet of things by Yuchen CHEN, Yuan CAO, Laipeng ZHANG, Lianghui DING, Feng YANG

    Published 2019-12-01
    “…Considering the feature of periodical uplink data transmission in IEEE 802.11ah low-power wide area network (LWPAN),a real-time RAW setting (RTRS) algorithm was proposed.Multiple node send data to an access point (AP),and the uplink channel resources were divided into Beacon periods in time.During a Beacon period,AP firstly predicted the next data uploading time and the total amount of devices that will upload data in the next Beacon period.The AP calculated the optimal RAW parameters for minimum energy cost and broadcasted the information to all node.Then all devices upload data according to the RAW scheduling.The simulation results show that the current network state can be predicted accurately according to the upload time of the terminal in the last period.According to the predicted state,raw configuration parameters can be dynamically adjusted and the energy efficiency can be significantly improved.…”
    Get full text
    Article