Showing 1,961 - 1,980 results of 4,865 for search '"privateering"', query time: 0.06s Refine Results
  1. 1961

    Timber Production in a Working Forest Context by Sonia Delphin, Francisco Escobedo, Chris Demers, Alison E. Adams, Damian C. Adams

    Published 2017-05-01
    “… Working forests are private forests managed not just for timber production but also for a host of valuable ecosystem services like providing for recreation, maintaining habitat for wildlife, and maintaining a healthy watershed. …”
    Get full text
    Article
  2. 1962

    La Mesure de l’humain. Objets, pratiques et logiques numériques pour le réaménagement d’une place parisienne. by Ornella Zaza

    Published 2018-12-01
    “…Through the implementation of “demonstrators of the smart city”, the public space becomes the field of experimentation of new digital solutions to commercialize, for both public and private actors. The urban narrative which results from these urban demonstrators, often seems to flatten the phenomenological conception of public space: although these new practices for urban planning try to reach a qualitative approach, it will result that the use of digital objects and digital logics handle, in a controversy way, a new humanist functionalism, which often reduces the human being into generic, rigid and pre-conceived categories.…”
    Get full text
    Article
  3. 1963

    Les corridors industriels en Inde by Philippe Cadène, Yves-Marie Rault

    Published 2019-10-01
    “…Their logics are distinct from the State development strategies and are framed in a governance which strengthens the role of regional public authorities and private actors in the spatial structuration of India.…”
    Get full text
    Article
  4. 1964

    Research on technical scheme of SDN intelligent management and control orchestration system by Yanxia TAN, Guangquan WANG, Zelin WANG, Yanlei ZHENG, He ZHANG, Chenfang ZHANG, Sai HAN, Shikui SHEN

    Published 2023-03-01
    “…As users put forward more stringent quality of service requirements for the network, operators focus on the intelligent transformation and construction of various networks.Firstly, the current situation of software defined network (SDN) transformation and construction of various professional networks in the industry were briefly introduced, and then the problems existing in the transformation process were analyzed.Then, the scheme of SDN intelligent management and control orchestration system were proposed to meet users’ requirements for end-to-end service provisioning of cross professional services, and realize intelligent analysis of resource data at the network level to improve operation and maintenance efficiency.Finally, the service provisioning process of private line service and real-time alarming process and practice under the proposed architecture were introduced.…”
    Get full text
    Article
  5. 1965

    Key-exposure resilient integrity auditing scheme with encrypted data deduplication by Xiangsong ZHANG, Chen LI, Zhenhua LIU

    Published 2019-04-01
    “…For the problems of key-exposure,encrypted data duplication and integrity auditing in cloud data storage,a public auditing scheme was proposed to support key update and encrypted data deduplication.Utilizing Bloom filters,the proposed scheme could achieve client-side deduplication,and guaranteed that the key exposure in one time period didn’t effect the users’ private key in other time periods.The proposed scheme could solve the conflict between key-exposure resilient and encrypted data deduplication in public auditing scheme for the first time.Security analysis indicates that the proposed scheme is strong key-exposure resilient,confidentiality,detectability,and unforgeability of authentication tags and tokens under the computation Diffie-Hellman hardness assumption in the random oracle model.…”
    Get full text
    Article
  6. 1966

    Viralité et starisation : le procès Johnny Depp / Amber Heard by Laura Santone

    Published 2024-12-01
    “…This article revisits the trial of Johnny Depp against his ex-wife Amber Heard, a private affair that has been reignited on social networks at an exponential rate. …”
    Get full text
    Article
  7. 1967

    Secteur TIC et refonte de la gouvernance urbaine by Divya Leducq

    Published 2009-12-01
    “…So, the growing influence of those private and corporate lobbies fully revamps the urban area and allocates player’s new roles on the urban administration stage. …”
    Get full text
    Article
  8. 1968

    Projection of macroeconomic indicators in SME sector by 2025 by Stevanović Mirjana, Nikolić Branislav

    Published 2016-01-01
    “…The result of the research should show that the macroeconomic projections in the SME sector are on the path of recovery and growth, but they are conditional on the quality of fiscal policy, reforms implementation pace, financial incentives, and creating an environment whose ultimate goal would be strengthening of the private sector and creating even favorable business conditions.…”
    Get full text
    Article
  9. 1969

    From creating to managing resorts by Emmanuelle George-Marcelpoil, Hugues François

    Published 2013-03-01
    “…However, local actors, private as public ones, were not passive and they also brought their investments, ideas to develop mountain tourism. …”
    Get full text
    Article
  10. 1970

    Un-Dutching the Delta Approach: network management and policy translation for effective policy transfer by Ellen Minkman, Arwin van Buuren, Victor Bekkers

    Published 2021-10-01
    “…We reconstruct the unconventional collaboration between Dutch private-sector experts and national governments of Vietnam and Bangladesh to develop multi-sectoral, long-term strategies (‘delta plans’). …”
    Get full text
    Article
  11. 1971

    FEATURES OF PROJECT FINANCING OF REAL ESTATE IN THE DIGITAL ECONOMY AND ITS STATE REGULATION by A. V. Zakharova, V. G. Makeeva, N. V. Kazantseva, O. A. Revzon

    Published 2020-06-01
    “…The Russian experience of taxation of investment entities in the Russian Federation, the experience of private-public partnership in the process of investing in real estate objects, have been studied, the problems of using project financing by real estate market entities in the conditions of digitalization have been identified. …”
    Get full text
    Article
  12. 1972

    Masques de Chine, visages du nuo : du patrimoine à l’art premier by Sylvie Beaud

    Published 2016-10-01
    “…The masks, collected by government officials after they were banned, made their way into Western private collections. The circulation of these artefacts led to changes in how they were handled, from their patrimonialisation to their “artification”, and also changed the usage of the term “nuo” itself. …”
    Get full text
    Article
  13. 1973

    Pathology of marketing program of the Export Development Bank of Iran using three-ramification model by Moahammadreza Rahimi, Ali Salmasnia

    Published 2022-03-01
    “…On one hand the presence of Iran as an observer in the WTO, and on the other hand the development of private banks, encounter the Iranian banks with a much more competitive environment. …”
    Get full text
    Article
  14. 1974

    Asymmetric watermarking based on Contourlet transform and subspace projection by HE Mi, CHENG Li-zhi

    Published 2009-01-01
    “…For the copyright protection of the digital image,a new asymmetric watermarking method of feature subspace projection based on Contourlet transform was presented.Embedding matrix(private key) and detecting matrix(public key) were constructed differently,where embedding matrix was kept secretly while detecting matrix was public.At the same time,the embedding matrix was independent on the host images.Robust subspace was obtained by Contourlet transformation.Using the embedding matrix,the arbitrary watermarking was embedded in the robust subspace.The de-tection function was constructed to detect whether an image had watermarking or not.The proposed method has good security,high detection probability and low false alarm probability.The stimulation shows that the proposed method is robust to many attacks.…”
    Get full text
    Article
  15. 1975

    Positionings and Tensions Among Discursive Acts in a Colombian EFL Classroom: Interpretations of Linguistic Identity by Katherin Silva-Alfonso

    Published 2025-01-01
    “…This article presents a qualitative study exploring how eleventh-grade EFL students in a Colombian private school construct their linguistic identities through discursive positioning practices. …”
    Get full text
    Article
  16. 1976

    Ce que peut la finance publique : la Caisse des dépôts actionnaire dans l’immobilier depuis la Seconde Guerre mondiale by Raphaël Frétigny

    Published 2021-07-01
    “…The shareholder strategies of this public financial institution are characterized by a gradual increase in profitability logics, modelled on those of private financial actors. However, these developments are proving to be more complex than outright submission to financial market standards. …”
    Get full text
    Article
  17. 1977

    The development of the printing industry in Lithuania in 1918-1940 by Audronė Glosienė

    Published 2024-12-01
    “…A significant number of printing houses were small private operations, many of which were not capable of printing books or periodicals. …”
    Get full text
    Article
  18. 1978

    Efficient ID-based certificateless signature scheme by LIU Jing-wei, SUN Rong, MA Wen-ping

    Published 2008-01-01
    “…In this scheme, PKG was prevented from forging a legal user’s signature because he only generated the partially private key. The security relied on the hardness of the computation diffie-hellman problem (CDHP). …”
    Get full text
    Article
  19. 1979

    Accompagner les pratiques masturbatoires des adolescent.e.s dans des institutions pour personnes dites autistes : gestion du collectif, crainte de l’intime by Adrien Primerano

    Published 2018-06-01
    “…A concerted and collective behaviour management can provide support for making masturbatory acts private. Nonetheless, even though masturbation might be seen as a practice requiring learning in order to achieve pleasure or to avoid frustration, there is no consensus among professionals on how to get these skills or if it is necessary.…”
    Get full text
    Article
  20. 1980

    Quand la liberté de lire est menacée : la lutte de la Campaign for Reader Privacy contre l’article 215 de la loi USA PATRIOT. by Cécile Cottenet

    Published 2008-05-01
    “…One of these movements, led by actors of the book industry—booksellers, librarians, publishers, writers—rapidly saw the danger of an act that authorizes the government to intrude into private lives. Under the banner “Campaign for Reader Privacy”, this coalition has chosen to target section 215 of the USA PATRIOT Act. …”
    Get full text
    Article