Showing 61 - 80 results of 245 for search '"spy"', query time: 0.06s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64

    Evaluation of Drought Using Meteorological Drought Indices, a Case Study: Alanya (Türkiye) by Redvan Ghasemlounia, Mustafa Utlu

    Published 2024-01-01
    Subjects: “…standardized precipitation index (spi)…”
    Get full text
    Article
  5. 65

    بررسی پایداری سطح آب زیرزمینی در دشت اسلام‌آباد غرب (استان کرمانشاه) و ارزیابی وضعیت آینده با مدل‌های گردش عمومی جو... by شکوفه اسمعیلی, فیروز مجرد

    Published 2025-01-01
    Subjects: “…شاخص gri؛ شاخص spi؛ دشت اسلام‌آباد غرب؛ سطح آب زیرزمینی؛ مدل‌های گردش عمومی جو…”
    Get full text
    Article
  6. 66

    Foul heart huntsman : book two in the foul lady fortune duet / by Gong, Chloe

    Published 2023
    Subjects: “…Spies Fiction. 14246…”
    View in OPAC
    Book
  7. 67

    A Versatile Method to Create Antibody/Split‐Enzyme Complexes and Its Application to a Rapid, Homogeneous, and Universal Electrochemical Immunosensing System by Yuka Tobita, Kensuke Hirano, Daimei Miura, Yuma Hatano, Wakako Tsugawa, Kazunori Ikebukuro, Koji Sode, Ryutaro Asano

    Published 2025-01-01
    “…SpyTag‐fused single‐chain variable fragments (scFvs) are employed, which leads to the simple preparation of antibody‐split enzyme complexes (split AECs). …”
    Get full text
    Article
  8. 68

    SOME DATABASE MANAGEMENT TOOLS FOR DATA MODELING AND REVERSE ENGINEERING by Adrian RUNCEANU, Marian Ion POPESCU

    Published 2023-05-01
    “…The implementation was done in PostgresSQL 15, and for the database schema we used Altova's DatabaseSPY utility. …”
    Get full text
    Article
  9. 69

    Film music and construction of tourist imaginaries in Hollywood blockbusters by Marie-Hélène Chevrier, Chloé Huvet

    Published 2023-07-01
    “…The various films of the two successful spy franchises, James Bond and Mission: Impossible, are distinguished not only by their lead actors (heroes and antagonists), but also by their geographical settings. …”
    Get full text
    Article
  10. 70

    Victorian and Edwardian Virtual Reality: from Stoker to Forster by Catherine Lanone

    Published 2018-06-01
    “…Dracula engages with transmission in a dual way, turning Mina’s mind into a radio-system which the Count may switch on and off, whereas Van Helsing may reverse the signal and spy on the vampire; technology embodying modernity, from the phonograph to the typewriter or telegraph, may vanquish the Count’s archaic powers of transmission. …”
    Get full text
    Article
  11. 71

    Lightweight integrity verification scheme for cloud based group data by Yun-fei LIU, Yong-jun WANG, UShao-jing F

    Published 2016-10-01
    “…In order to protect the security of the data stored in the cloud by group users,a data integrity verification scheme was designed which can protect the privacy of the group users.The scheme can efficiently detect the shared data in the cloud and support the dynamic updating of the data,and use the characteristic of the ring signature to hide the iden-tity of the signer corresponding to the data block.That is,the third-party verifier can not spy on the users identity and other private information when validating.The aggregated approach is used to generate data labels,which reduces the storage cost of labels and supports the dynamic operation of group data,so that the users in the group can easily modify the cloud group data.…”
    Get full text
    Article
  12. 72

    Cold War in Space: Reconnaissance Satellites and US-Soviet Security Competition by Wawrzyniec Muszyński-Sulima

    Published 2023-07-01
    “…This in turn allowed for a more peaceful coexistence between these two ideologically opposed superpowers. Spy satellites allowed for a better assessment of the other side’s military strength, created a system of early warning for nuclear attacks, and offered a non-invasive way of verifying arms control treaties. …”
    Get full text
    Article
  13. 73

    Reputation computation based on new metric in P2P network by BAO Yu1, ZENG Guo-sun1, ZENG Lian-sun3, CHEN Bo1, WANG Wei1

    Published 2008-01-01
    “…For most of P2P file sharing trusted download,the current researches of the evaluation of the trusted peers based on reputation simply rely on the history of interaction and are not paid enough attention on the time factor.The other behaviors like recommendation are also ignored.The attack actions in reputation evaluation were discussed,and the recommender behavior in P2P network was considered separately,which made up for computation based on the interac-tion behavior in computation of reputation.Secondly,for the positive and negative evaluation,different time-decline co-efficient was added in the method to distinguish the malicious node named smart node which acts as a malicious node at times.Simulation experiments show that this proposed method not only increase the good files ratio in P2P download files,but also restrain the collusion in malicious nodes,especially the spy action.…”
    Get full text
    Article
  14. 74

    Wild Wild West : une série au carrefour des affirmations dans les États-Unis du milieu des années 1960 by Jean Ruhlman

    Published 2020-02-01
    “…While it cleverly brings together the aesthetics of the western and spy fiction, its success also has to do with the historical and social relevance of the themes it addresses. …”
    Get full text
    Article
  15. 75

    Cache timing attack on SMS4 by ZHAO Xin-jie, WANG Tao, ZHENG Yuan-yuan

    Published 2010-01-01
    “…Two access driven Cache timing analysis methods on both first four rounds and last four rounds of SMS4 encryption were proposed and discussed.On the precondition of not interfering SMS4 encryption,a spy process was designed to gather the un-accessed lookup table related Cache sets during first four rounds and last four rounds of SMS4 encryption,then transferred them into impossible lookup table indices,combing plaintext or cipher text to analyze the impossible key byte candidates,finally the initial SMS4 key was recovered.Experiment results demonstrate that multi-process sharing Cache space feature and SMS4 lookup table structure decide that SMS4 is vulnerable to Cache timing attack,for about 80 samples are enough to recover full 128bit SMS4 key during both first four rounds attack and last four rounds attack,so it’s necessary to take certain countermeasures to prevent this kind of attack.…”
    Get full text
    Article
  16. 76

    “I shall not concern the Union in this Discourse” : Prétérition et engagement dans l’écriture pro-unioniste de Daniel Defoe, voyageur en Écosse by Emmanuelle PERALDO

    Published 2016-12-01
    “…Defoe’s position as a secret spy for the government cannot but give a particular color to his literary output, and despite his strong commitment to the cause of the Union, he had to use a “cautious rhetoric” and to play a sort of hide-and-seek game with his readers. …”
    Get full text
    Article
  17. 77

    RBD-displaying OMV nanovaccine boosts immunity against SARS-CoV-2 by Rang Feng, Ruo-Yi Xue, Chang Liu, Guo-Cheng Li, Yan Deng, Zhe Jin, Jing-Yi Liu, Shan-Shan Zhang, Hao Cheng, Man-Ying Guo, Quan-Ming Zou, Hai-Bo Li

    Published 2025-02-01
    “…Results In this study, we utilized the SpyTag (ST)/SpyCatcher (SC) bioconjugation system to couple OMV and SARS-CoV-2 RBD in vitro. …”
    Get full text
    Article
  18. 78

    From Villainess to Gilead’s Nemesis: The (Un)easy Rehabilitation of Aunt Lydia by Ewelina Feldman-Kołodziejuk

    Published 2025-01-01
    “…Taking The Testaments as a point of departure, the article rereads the original tale, which, astonishingly, discloses a number of equivocal passages that in fact might provide credibility to Atwood’s audacious refashioning of Aunt Lydia as a Mayday spy. The article offers a reevaluation of Aunt Lydia’s villainy in The Handmaid’s Tale through the lens of her undercover identity, revealed in The Testaments. …”
    Get full text
    Article
  19. 79

    L’Affaire Charles Lainé (1818), ou comment la police fabriquait un faux-monnayeur by Étienne Hofmann

    Published 2011-12-01
    “…This item of news would have remained unknown if a magistrate had not spontaneously denounced the scandalous behaviour of a police spy who had encouraged Lainé to commit the crime. …”
    Get full text
    Article
  20. 80

    Analysis of geometric structure of woven fabrics surface. by Gabriela Kosiuk, Małgorzata Matusiak

    Published 2022-09-01
    “…Surface topography measurements were performed using the MicroSpy® Profile profilometer by FRT the art of metrology™. …”
    Get full text
    Article