Showing 15,001 - 15,020 results of 16,989 for search 'Defekt~', query time: 2.25s Refine Results
  1. 15001

    Challenges in sharing information effectively: examples from command and control by Diane H. Sonnenwald

    Published 2006-01-01
    “…Observation notes and interview transcripts were analysed to identify incidents when group members erroneously believed they had shared information effectively and were collaborating successfully, i.e., a deceptively false shared understanding had emerged. …”
    Get full text
    Article
  2. 15002

    A inserção do artigo 227 na Constituição Federal de 1988: os movimentos sociais, os atores políticos e a causa do menor by Maria Nilvane Fernandes, Angela Mara de Barros Lara

    Published 2020-01-01
    “…This process consolidated social movements that became organizations that defended children’s rights and contributed to the drafting of the Statute of the Child and Adolescent, in 1990. …”
    Get full text
    Article
  3. 15003

    “MUTAÇÃO À BRASILEIRA”: UMA ANÁLISE EMPÍRICA DO ART. 52, X, DA CONSTITUIÇÃO by Carlos Victor Nascimento dos Santos

    “…Para analisar a consistência dessa tese, realizou-se uma análise empírica do papel do Senado Federal diante do art. 52, X, da Constituição. Como resultado, defende-se não ser possível dar plausibilidade a esse tipo de argumentação apenas tendo por base jurisprudência, doutrina e argumentação tipicamente constitucional, necessitando de base empírica que o permita atribuir mais solidez e consistência a qualquer argumento de mutação constitucional na ordem jurídica brasileira.…”
    Get full text
    Article
  4. 15004

    STRATEGIC LAWSUITS AGAINST JOURNALISTS - AN UNCONVENTIONAL WAY TO ENACT CIVIL LIABILITY by Sorin-Alexandru VERNEA

    Published 2024-05-01
    “…This paper analyses the essential elements necessary to qualify a trial filed against a journalist as a slaptrial, starting from two relevant European acts: the Proposal for a directive of the European Parliament and of the Council on protecting persons who engage in public participation from manifestly unfounded or abusive court proceedings („strategic lawsuits against public participation”) and the Commission Recommendation (EU) 2022/758 on protecting journalists and human rights defenders who engage in public participation from manifestly unfounded or abusive court proceedings ('strategic lawsuits against public participation'). …”
    Get full text
    Article
  5. 15005

    Farming and ranching through wildfire: Producers' critical role in fire risk management and emergency response by Natalia Pinzón, Ryan E. Galt, Leslie M. Roche, Tracy Schohr, Brian Shobe, Vikram Koundinya, Katie Brimm, Jacob Powell

    Published 2025-02-01
    “…Producers play a central role in community emergency wildfire risk response and management by reducing fuel loads, creating defensible space, and leveraging their fire management expertise for themselves and their neighbors. …”
    Get full text
    Article
  6. 15006

    Distributed trust management scheme based on blockchain in Internet of vehicles by Haibo ZHANG, Yukun CAO, Kaijian LIU, Ruyan WANG

    Published 2023-05-01
    “…Aiming at the security problems caused by the low efficiency and accuracy of malicious vehicle identification in Internet of vehicles, a distributed trust management scheme based on blockchain in Internet of vehicles was proposed.A false information identification strategy was designed by aggregating the scoring information of vehicles, combined with Bayesian inference model.A reputation value updating algorithm was designed by combining the historical interaction information of vehicles and traffic information, malicious vehicles were identified by the reputation threshold.A blockchain was constructed roadside units to realize the distributed storage of traffic data and vehicle reputation values.The traditional proof of work consensus mechanism was improved to dynamically change the difficulty of miner node generating a block through the event level and the number of vehicles involved in scoring, and the waiting mechanism was used to temporarily stop the nodes that had recently blocked from participating in the election process of miner nodes, thus reducing the resource consumption caused by repeated calculations.The simulation results show that the proposed scheme can effectively identify false information, resist the deceptive behavior of malicious vehicles, improve the identification efficiency of malicious vehicles, reduce resource consumption, and is effective and feasible in distributed trust management for Internet of vehicles.…”
    Get full text
    Article
  7. 15007

    Kosova’s Goddess on the Throne: Critical Fabulation as an Anthropological Method by Drita Bruqi Kabashi

    Published 2023-12-01
    “…This approach aims to decenter fixed notions of cultural identity, femininity, and time, and recenter the valuable contradictions that live within the elevated status of certain cultural icons.…”
    Get full text
    Article
  8. 15008

    Analysis of Russian Federation Foreign Policy in the Field of International Information Security by E. S. Zinovieva

    Published 2014-12-01
    “…Today more than 130 countries develop cyber capabilities, both defensive and offensive, that pose serious threats to the international stability. …”
    Get full text
    Article
  9. 15009

    Entre o Butsudan e a missa: práticas religiosas de imigrantes japoneses no Rio Grande do Sul, Brasil by Tomoko Kimura Gaudioso, André Luis Ramos Soares

    Published 2010-11-01
    “…Despite the current Brazilian Constitution defends religious freedom, Catholicism is the religion of the majority of the population, according to the IBGE survey.  …”
    Get full text
    Article
  10. 15010

    …e fon sazos/Que per un gan/Er’hom bautz e ioios ! by Isabel de Riquer

    Published 2020-12-01
    “…The author of razós is defending the troubadour, severely criticizing the behaviour of the Lady. …”
    Get full text
    Article
  11. 15011

    La distinción aristotélica entre enérgeia y kínesis comprendida de modo intensional by Matías Alonso Von Dem

    Published 2019-12-01
    “… El siguiente artículo intenta defender la tesis de que la distinción aristotélica entre enérgeia y kínesis debe ser comprendida de modo intensional (en contraposición a una lectura extensional), tomando como punto de partida su célebre aparición en Met IX 6. …”
    Get full text
    Article
  12. 15012

    O papel dos desejos na ética aristotélica by Carla Barreto

    Published 2024-12-01
    “…Diferente da visão tradicional que coloca a razão como única fonte da moralidade, Aristóteles não mostra o mesmo desfavorecimento da participação do nãoracional na vida feliz. O Estagirita defende que o desejo desempenha um caráter crucial na construção da moralidade do indivíduo, uma vez que o desejo alinhado com os comandos da razão possibilita pavimentar o caminho para a felicidade. …”
    Get full text
    Article
  13. 15013

    Verifiably secure fast group authentication protocol with anonymous traceability for Internet of vehicles by Haibo ZHANG, Hongwu HUANG, Kaijian LIU, Xiaofan HE

    Published 2021-06-01
    “…Identity authentication is the first line of defense for vehicles to access IoV (Internet of vehicles).However, the existing schemes cannot meet the requirements of efficient authentication of IoV well, nor can they realize fast anonymous traceability.In view of this, a bidirectional anonymous traceability group authentication protocol was proposed in IoV.In this protocol, a number of RSU (road side unit) were grouped quickly and dynamically.And the vehicles entering the RSU group were authenticated with the one-way trap gating property and semi-group property of Chebyshev chaotic map.When the vehicle switched between the RSU within a group, the reverse hash chain was used for fast handover authentication.In addition, the RSU within a group can trace anonymously and revoke the identity of malicious vehicles quickly by using blockchain, and can also freely change the ID of users who reveal their real identity.At the same time, the semantic security of the proposed protocol is proved by using the random predictor model.Finally, simulation results show the proposed scheme has good security and effectiveness.…”
    Get full text
    Article
  14. 15014

    Metamorfoses da cidade medieval. A coexistência entre a comunidade judaica e a catedral de Viseu by Anísio Miguel de Sousa Saraiva

    Published 2012-01-01
    “…From certain issues analyzed in this extent, we will stand out the delocalization of the Jewish District mostly due to the consequences of the relations of power and of the defense of Jewish and Christian’s interests in the context of the reorganization of the 15th’s urban network of Viseu.…”
    Get full text
    Article
  15. 15015
  16. 15016
  17. 15017

    Russia vs America cyber war: space technology mastery competition by Fadra Fadra, Joseph Teguh Santoso

    Published 2024-10-01
    “…The results of this study show that national security priorities are number one, and especially defense priorities for the United States are no longer terrorism but great power competition. …”
    Get full text
    Article
  18. 15018
  19. 15019

    Impact of Toxic Leadership on Employee Performance by Christian Wiradendi Wolor, Ardiansyah Ardiansyah, Rofi Rofaida, Ahmad Nurkhin, Mahmoud Ali Rababah

    Published 2022-12-01
    “…The consequences of the study findings for organizations range from the process of screening and selection of leaders to creating stress management and self-resilience training to help employees deal with their emotions in healthy ways and strengthen their defenses.…”
    Get full text
    Article
  20. 15020

    Le droit à l’avortement : révélateur et activateur de pratiques parlementaires au Royaume-UniAbortion rights: revealing and activating parliamentary practices in the United Kingdom... by Alexandrine Guyard-Nedelec

    Published 2023-01-01
    “…The implementation of a strategy that could be described as “erosion”, but also the defence, liberalisation and decriminalisation of abortion rights all play out in the legislative field. …”
    Get full text
    Article