Showing 14,521 - 14,540 results of 16,989 for search 'Defekt~', query time: 2.10s Refine Results
  1. 14521

    Wyjaśnienie dogmatu chalcedońskiego w VI wieku. Interpretacja osoby i natury przez teologów „neochalcedonizmu” według Aloisa Grillmeiera by Giacomo Calore

    Published 2022-03-01
    “…In this article, with the help of Alois Grillmeier’s analysis in his work Jesus der Christus, the author presents the efforts of the two most influential theologians who defended and deepened the teaching of the Council within the framework of the so called “Neochalcedonism” in the sixth century, Leontius of Byzantium and Leontius of Jerusalem. …”
    Get full text
    Article
  2. 14522

    Neutrophils in Tuberculosis: Heterogeneity Shapes the Way? by Irina V. Lyadova

    Published 2017-01-01
    “…This review analyzes data on neutrophil defensive and pathological functions during tuberculosis and considers hypotheses explaining the dualism of neutrophils during M. tuberculosis infection and tuberculosis disease.…”
    Get full text
    Article
  3. 14523

    Quand des parents interprètent les normes scolaires : le cas du travail scolaire hors la classe en début de primaire by Françoise Robin

    Published 2019-01-01
    “…Our study is in line with theories defending a "relational hypothesis" (Bautier and Goigoux, 2004) which considers that misunderstandings (Bautier & Rochex, 2007, Bautier & Rayou, 2013) play an important role in explaining educational inequalities. …”
    Get full text
    Article
  4. 14524

    I trovatori come fondamento dell'identità occitana: la linea Jaufré Rudèl-Jean de Nostredame-Frédéric Mistral by Gilda Caiti-Russo

    Published 2016-06-01
    “…Cette contribution souhaite enquêter sur la place occupée par les troubadours dans la défense et l’illustration d’une langue progressivement minorisée. …”
    Get full text
    Article
  5. 14525

    Del concepto de familia: visión social. by Ángela María Quintero Velásquez

    Published 2024-06-01
    “… El artículo reseña asuntos que inciden en la actual coyuntura (precarización laboral – trabajo decente, economía del cuidado e inequidad de género) y la noción de familia como sujeto político y colectivo, con el fi n de asumirla y comprenderla como una construcción social, a partir de desarrollos conceptuales y metodológicos propios que permiten su fundamentación disciplinaria y posicionamiento en la sociedad del conocimiento. …”
    Get full text
    Article
  6. 14526

    AVRUPA BİRLİĞİ ve IRAK KRİZİ : BÖLÜNMEDEN YENİDEN BİRLEŞMEYE UZUN, İNCE BİR YOL by Sevilay Kahraman

    Published 2003-01-01
    “…The aim of this article is to assess the implications of the recent Iraqi crisis for American-European relations, the European Union's evolving Common Foreign and Security Policy/ European Security and Defence Policy and the future prospects for global governance. …”
    Get full text
    Article
  7. 14527

    Twostriped Walkingstick, Anisomorpha buprestoides (Stoll) (Insecta: Phasmatodea: Pseudophasmatidae) by Michael C. Thomas

    Published 2005-04-01
    “…The last common name is particularly apt as this species is capable of squirting a strong-smelling defensive spray that is painfully irritating to the eyes and mucous membranes (Gray 1835, Meinwald et al. 1962, Eisner 1965, Stewart 1937, Hatch et al. 1993, Paysse et al. 2001, Dziezyc 1992). …”
    Get full text
    Article
  8. 14528

    Nonprofit Neighborhoods: An Urban History of Inequality and the American State, By Claire Dunning, The University of Chicago Press, 2022 by Emily I. Nwakpuda

    Published 2025-01-01
    “…Using the case of Boston, the author informs readers that the government-nonprofit partnerships fueled by grants, contracts, and loans within the framework of nonprofit neighborhoods maintains and advances racism and inequity in America. The author defends this proposition by leveraging a historical lens, archival data, and autobiographical descriptions to magnify readers' attention on the racially biased treatment of leaders, workers, and community members associated with nonprofit neighborhoods among diverse communities. …”
    Get full text
    Article
  9. 14529

    Entrepreneurial Competencies and Strategic Behavior: a Study of Micro Entrepreneurs in an Emerging Country by Gustavo Behling, Fernando César Lenzi

    Published 2019-01-01
    “…Moreover, entrepreneurs who were Reactors possessed a mean of 6 out of the ten entrepreneurial competencies, Defenders had 7.97, Analyzers had 8.38, and Prospectors had 8.56. …”
    Get full text
    Article
  10. 14530

    Research and practice of SASE cloud security by Chaoyang YE, Xin WANG, Shicong ZHANG, Zhiyong ZHAN, Yisha LIU

    Published 2022-01-01
    “…With the development of the Internet today, earth shaking changes have taken place compared with the traditional network.In today's network reform, "cloud" has become the mainstream direction of the evolution of enterprise IT architecture, so the requirements for cloud security are becoming higher and higher.The practical deployment scheme of SASE cloud security architecture was introduced to solve the problem of cloud security for customers.A unique and complete SASE solution was proposed, which combined security functions with SD-WAN functions, and realized real-time monitoring, intelligent analysis and automatic interception of malware or malicious activities by building a unified management and control platform and centralized deployment of core security resource pool.Practice has proved that the scheme achieves the expected results in unified management and control, intrusion detection and defense, fine access control and so on, and can fully ensure the cloud security of enterprises.…”
    Get full text
    Article
  11. 14531

    La place du paysagiste dans le paysage agricole by Laurence Renard

    Published 2017-12-01
    “…Whereas a similarity between landscape architects and farmers had been clearly established in the 1990s, the aesthetic approach to the landscape is sometimes criticised by the farming sector which defends its vocation of producing food. Giving lessons about the landscape therefore becomes counter-productive. …”
    Get full text
    Article
  12. 14532

    Agentivité ou autonomie ? Pour une théorie critique de la vulnérabilité by Marie Garrau

    Published 2021-07-01
    “…In this text, I try to answer this question by defending two arguments: I first argue that, for both theoretical and political reasons, we should neither oppose nor identify vulnerability and agency. …”
    Get full text
    Article
  13. 14533

    Research on knowledge graph construction technology for cyber threat intelligence based on large language models by LAI Qingnan, JIN Jiandong, ZHOU Changling

    Published 2024-11-01
    “…Through instruction prompts and context learning, AutoCTI2KG automatically generated cybersecurity and attack knowledge graphs from cyber threat intelligence and provided actionable defense recommendations. Experimental results show that the proposed framework performs excellently in constructing cybersecurity and attack knowledge graphs, with F1 scores around 0.90, demonstrating the potential of large language models in knowledge graph construction in the cybersecurity domain. …”
    Get full text
    Article
  14. 14534

    Las elecciones presidenciales de 1946 y el peronismo naciente vistos por el periódico La Vanguardia by Claudio Panella

    Published 2004-09-01
    “…It was thus that La Vanguardia, born in 1894 as a « scientific socialist newspaper. Defender of the working class », ended up in 1946 sympathizing with interests that were not exactly the same as the ones workers pursued.…”
    Get full text
    Article
  15. 14535
  16. 14536

    La frontière entre le bilād al-islām et le bilād al-Nūba : enjeux et ambiguïtés d’une frontière immobile (VIIe-XIIe siècle) by Robin Seignobos

    Published 2011-03-01
    “…When delimiting bilād al-islām, Arabic geographers unanimously agreed in designating Aswan as the last frontier-town of Islam, in charge of defending Egyptian territory from potential Nubian enemies.A closer examination of the sources brings to light the unexpected complexity of this frontier system. …”
    Get full text
    Article
  17. 14537

    SDN security prediction method based on bayesian attack graph by Yanshang YIN, Tongpeng SUO, Ligang DONG, Xian JIANG

    Published 2021-11-01
    “…Existing researchers use threat modeling and security analysis system to evaluate and predict SDN (software defined network) security threats, but this method does not consider the vulnerability utilization of SDN controller and the location of devices in the network, so the security evaluation is not accurate.In order to solve the above problems, according to the probability of device vulnerability utilization and device criticality, combined with PageRank algorithm, a algorithm to calculate the importance of each device in SDN was designed; according to SDN attack graph and Bayesian theory, a method to measure the success probability of device being attacked was designed.On this basis, a SDN security prediction method based on Bayesian attack graph was proposed to predict the attacker's attack path.Experimental results show that this method can accurately predict the attacker's attack path and provide more accurate basis for security defense.…”
    Get full text
    Article
  18. 14538
  19. 14539
  20. 14540

    Naked Censorship: Stripping the Censors’ Discourse by Anne Etienne

    Published 2013-11-01
    “…This inter-disciplinary paper aims to shed light on the principles that led to the establishment of theatre censorship legislation and the politics of inertia of the ensuing governments, hence offering an alternative perspective to the moral argument first utilised by Walpole and later forwarded as a final defence. In doing so, we will explore the gap between the censors’ procedures and their discourses, thereby gaining an insight into the means and hidden dynamics of this disciplinary control. …”
    Get full text
    Article