Showing 1,741 - 1,760 results of 4,865 for search '"privateering"', query time: 0.08s Refine Results
  1. 1741

    Entre utopie et action collective, comment accompagner la transition des territoires vers l’économie circulaire ? by Joël Ntsondé

    Published 2021-07-01
    “…This model starts from the processes that lead entrepreneurs to design innovations, and then conceptualizes the mechanisms that lead public and private organizations to cooperate with these entrepreneurs, before explaining the mechanisms from which this dynamic of collective action can materialize the transition of a territory.…”
    Get full text
    Article
  2. 1742

    Daumier : émigrants ou fugitifs ? by Jean-Philippe Chimot

    Published 2007-09-01
    “…If the artist, who was sensitive to the aesthetic dimension of thecentury's dramas and conflicts, did not financially benefit from his public or private commands, he also avoided the optimistic lies of official viewings and the self-satisfaction of “elites”. …”
    Get full text
    Article
  3. 1743

    Approche ethnographique et effets de l’enquête scientifique sur l’activité d’étudiants se préparant au concours d’enseignant : le cas des étudiants en éducation physique et sportiv... by Youssef Maamria, Catherine Archieri, Jérôme Guérin

    Published 2025-01-01
    “…The presentation of the stages of the investigation highlights the evolution of the students' commitment throughout the scientific investigation and thus the access to the private dimension of the preparation, and finally the way in which the researcher's activity and its methodological tools are gradually inscribed in the strategy of preparation for the competition. …”
    Get full text
    Article
  4. 1744

    Equilibrium and Welfare Analysis in Second-Price Auctions with Resale and Costly Entry by Xiaoyong Cao, Yunxia Yang, Yuntao Yang, Siru Li

    Published 2022-01-01
    “…This study investigates the effects of resale allowance on entry strategies, seller’s expected revenue, and social welfare in a second-price auction with two-dimensional private information on values and participation costs. …”
    Get full text
    Article
  5. 1745

    Under the Watch of the State? Refugee Parents’ Experiences with Surveillance in Norwegian Early Childhood Education Centers by Eric Kimathi

    Published 2025-01-01
    “…This suspicion can lead to increased surveillance, causing parents to fear extensive state intervention in their private family lives. The study shows that parents resort to impression management strategies, including projecting conformity and engaging in open dialogue, to mitigate concerns about their parenting abilities. …”
    Get full text
    Article
  6. 1746

    Considerations for Developing Effective Herbicide Prescriptions for Forest Vegetation Management by Anna Osiecka, Patrick Minogue

    Published 2011-06-01
    “…It is intended for use by private forest landowners, foresters, and other land managers. …”
    Get full text
    Article
  7. 1747

    EFFECT OF WORKPLACE STRESS ON JOB PERFORMANCE by Azman Ismail, Noorshafine Saudin, Yusof Ismail, Ainon Jauhariah Abu Samah, Norish Norsiah Aminudin

    Published 2015-05-01
    “…A survey method was employed to gather self-administered questionnaires from executive and non-executive employees of a leading private investment bank in Peninsular Malaysia. Theoutcomes of SmartPLS path model analysis of the data showed two important findings: firstly, physiological stress was positively and significantly correlated with job performance. …”
    Get full text
    Article
  8. 1748

    Vers la construction d’un capital environnemental par la lutte contre un projet d’aménagement ? Le barrage de Loyettes (Rhône-Alpes) by Silvia Flaminio, Yves-François Le Lay

    Published 2017-11-01
    “…The study of the Loyettes controversy is based on interviews carried out 30 years later (n =17) and on archive documents (from local, regional, national public archives and from private archives). The paper aims to show the growing complexity of a specific value system. …”
    Get full text
    Article
  9. 1749

    Pest Identification Guide: Two-spotted Spider Mite, Tetranychus urticae Koch by Nicole Casuso, Hugh Smith

    Published 2014-12-01
    “… This publication is part of the Pest Identification Guide series, created to help growers and crop consultants, private homeowners, Master Gardeners, and the general public identify common arthropod pests and the damage they inflict. …”
    Get full text
    Article
  10. 1750

    La mise en culture des « jardins de luxe » parisiens pendant la Terreur (1793-1795) by Clara Delannoy

    Published 2022-06-01
    “…One of them concerns the typological change and sometimes disappearance of the vast groups of private gardens in the seventh arrondissement of Paris during the French Revolution. …”
    Get full text
    Article
  11. 1751

    Considerations for Developing Effective Herbicide Prescriptions for Forest Vegetation Management by Anna Osiecka, Patrick Minogue

    Published 2011-06-01
    “…It is intended for use by private forest landowners, foresters, and other land managers. …”
    Get full text
    Article
  12. 1752

    PROBLEMS AND FINANCIAL INSTRUMENTS FOR INNOVATION ACTIVITIES IN SMALL AND MEDIUM-SIZED ENTERPRISES OF THE EUROPEAN UNION by J. Stabinskayte

    Published 2016-11-01
    “…We present actual numbers in using traditional financial resources (bank loan, trade loan etc.) and new funds as private equity investments, venture capital, crowdfunding. …”
    Get full text
    Article
  13. 1753

    EFFECT OF WORKPLACE STRESS ON JOB PERFORMANCE by Azman Ismail, Noorshafine Saudin, Yusof Ismail, Ainon Jauhariah Abu Samah, Norish Norsiah Aminudin

    Published 2015-05-01
    “…A survey method was employed to gather self-administered questionnaires from executive and non-executive employees of a leading private investment bank in Peninsular Malaysia. Theoutcomes of SmartPLS path model analysis of the data showed two important findings: firstly, physiological stress was positively and significantly correlated with job performance. …”
    Get full text
    Article
  14. 1754

    ID-based signature without trusted PKG by ZHOU Liang1, LI Da-peng2, YANG Yi-xian1

    Published 2008-01-01
    “…PKG(private key generater) scheme was presented to overcome Chen-Zhang-Kim’s scheme drawback about a large amount of computation and Gorantla-Saxena’s scheme drawback about needing trusted PKG.More precisely,under the random oracle model,the scheme is proved to be secure against existential forgery on adaptively chosen message and ID attack,assuming CDHP is intractable.The scheme not only is traceable that the arbiter can use Trace algorithm to de-tect deceiver but also eliminates the inherent key escrow problem.As compared with the typical signatures schemes to date,the proposed scheme achieves the higher efficiency.…”
    Get full text
    Article
  15. 1755

    INVESTMENT IN POWER INDUSTRY: GLOBAL PERSPECTIVES AND OPPORTUNITIES by D. Voyko

    Published 2018-05-01
    “…The current state of the investment market in the power industry, the basic prerequisites for this and the prospects and challenges facing governments and private companies in the energy sector has been described.…”
    Get full text
    Article
  16. 1756

    Pest Information Guide: Six-Spotted Thrips Scolothrips sexmaculatus (Pergande) by Jeffrey D. Cluever, Hugh A. Smith

    Published 2016-08-01
    “… This publication is part of the Pest Identification Guides series, which was created to help growers and crop consultants, private homeowners, Master Gardeners, and the general public identify common arthropod pests and the damage they inflict. …”
    Get full text
    Article
  17. 1757

    Research on key management and authentication protocol of PDA in smart grid by Xiao YU, Li TIAN, Zhe LIU, Jie WANG

    Published 2018-03-01
    “…According to PDA in smart grid,which faced with security issues,key management and authentication protocol for PDA in smart grid based on scrambling PUF were presented.With the construction of mobile trusted platform by trusted hardware module and PDA,a key management mechanism was designed which presented for the indentify of hardware and controlled by user,to guarantee the security of key management and build a safe and effective mechanism of key backup and recovery.Based on trusted hardware module,security access for PDA in smart grid was realized,with the public and private key of key management strategy and improved access authentication protocol based on public key cryptography.…”
    Get full text
    Article
  18. 1758

    Research on Database Deployment Technology in Cloud Computing Environment by Yongshun Cai, Mingchuan Yang, Wei Si, Shaoyang Rao

    Published 2015-07-01
    “…Cloud computing virtualization technology has the characteristics of elastic scalability,automatic migration (high availability),automatic recovery (high stability).Because of the natural complexity of database systems,it makes a big challenge to deploy database systems in cloud computing virtualization environment.On the basis of research and analyzing models of deploying database systems in private cloud environment,the TPC-C benchmark test with database instances running in cloud computing virtual machines was applied.Compared with performance results of same test with database instances running in physical machines,the feasibility of deploying database systems in cloud computing virtualization environment was verified.…”
    Get full text
    Article
  19. 1759

    La matérialisation de la transition énergétique dans les milieux urbains denses. Le cas du projet urbain Nanterre Cœur Université by Meriam Bechir

    Published 2022-07-01
    “…Energy design thus involves various negotiations between public and private actors. These negotiations can, in some cases, question the energy objectives and technical choices even at advanced stages of the design. …”
    Get full text
    Article
  20. 1760

    5G MEC system security capability deployment scheme by Yunyi LIU, Jianmin ZHANG, Xiaoli FENG, Liwei ZHANG

    Published 2022-11-01
    “…Multi-access edge computing (MEC), as the core differentiated capability of 5G, is the key technology for telecom operators to build private 5G networks for enterprises.With the increase of 5G MEC nodes, security risks and protection schemes are increasingly concerned.Based on the description of 5G MEC system architecture, the potential security risks were analyzed.On this basis, the security capability deployment architecture and scheme of the 5G MEC system were proposed, and the deployment case was introduced.Finally, the current problems and challenges in the deployment of MEC security capabilities were discussed to provide references for subsequent research and development.…”
    Get full text
    Article