Showing 1,801 - 1,820 results of 2,028 for search 'Liyuu~', query time: 1.47s Refine Results
  1. 1801

    « Souvenirs » de Vukovar : Tourisme et mémoire dans l’espace post-yougoslave by Patrick Naef

    Published 2013-01-01
    “…Cette contribution vise à explorer la mise en tourisme de certains lieux de mémoire dans l’espace post-yougoslave, plus précisément à Vukovar, une localité située en Slavonie à l’est de la Croatie, qui acquiert après la guerre un statut de ville martyre.…”
    Get full text
    Article
  2. 1802

    Urbane Erinnerungsorte als „villes-mirages“ in schwedischen Reiseberichten der 1990er Jahre by Thomas Mohnike

    Published 2010-03-01
    “…Depuis les années 1990, de nombreux écrivains suédois cherchent à trouver des lieux de mémoire comme Königsberg, Dantzig ou Riga dans l’espace géographique, bien que la possibilité d’une identification à ces lieux ne soit pas aussi évidente que pour des écrivains d’après-guerre de langue allemande, polonaise ou lettone. …”
    Get full text
    Article
  3. 1803

    HERITAGE LANGUAGE EDUCATION IN ITALY: FIRST SURVEY AS PART OF A EUROPEAN PROJECT by Giuseppe Sergio

    Published 2025-01-01
    “…Viene infine proposta una panoramica sulle possibilità di proseguire l’apprendimento di lingue ereditarie in Italia, accennando in particolare ai casi del rumeno, del cinese, dello spagnolo, dell’arabo e dell’albanese. …”
    Get full text
    Article
  4. 1804

    TPCM-based trusted PXE boot method for servers by Guojie LIU, Jianbiao ZHANG

    Published 2020-12-01
    “…The PXE startup mechanism downloads operating system files through the network and starts the operating system,which is widely used in server network startup.It is widely used in server network startup.The PXE boot process is secured and trusted through trusted computing technology to prevent the PXE boot file from being tampered with maliciously,ensuring the safe and reliable operation of the server.The cyber security classified protection standard requires that the system boot program and system program of the server device be trusted and verified based on the trusted root.A TPCM-based server trusted PXE boot method based on the requirements of classified protection standard was proposed to ensure the security and trust of the server's BIOS firmware,PXE bootfiles,and Linux system files.When the server performs PXE boot,TPCM measured BIOS firmware,BIOS boot environment measured PXE boot files,and PXE boot environment measured Linux system files.Taking TPCM as the root of trust,one level of measurement,one level of trust,and a chain of trust were established to achieve a trusted server operating environment.The proposed method was tested on a domestically-controlled,self-controllable Shenwei server.The experimental results show that the proposed method is feasible.…”
    Get full text
    Article
  5. 1805

    Training of scientific generation of mathematicians by Feliksas Ivanauskas

    Published 2001-12-01
    “…It is inseparable from general trends of training of scientific generation in Lithu­ania. This paper reviews the general dynamics of the number of scientists in all scientific fields. …”
    Get full text
    Article
  6. 1806

    Tourisme religieux en Amazonie brésilienne by Maria Adriana S. B. Teixeira, Lúcia Cláudia Barbosa Santos, Maria Jacqueline Ramos Iwata, Anny Gabrielly Peixoto de Oliveira

    Published 2021-12-01
    “…Le tourisme religieux est motivé par les particularités religieuses de chaque touriste, qui recherche des lieux considérés comme sacrés et reconnus par des actes de foi, ainsi que par les grâces obtenues. …”
    Get full text
    Article
  7. 1807

    Urbanisation touristique au Brésil : l’exemple de Florianópolis – Santa Catarina by Marcos A.T. da Silveira, Adyr B. Rodrigues

    Published 2015-07-01
    “…Au Brésil, le développement touristique est un processus observé surtout dans les trois dernières décennies, principalement due à la croissance des pratiques du tourisme de soleil et de plage dans plusieurs lieux situés dans la zone côtière du pays, générant des restructurations socio-spatiale. …”
    Get full text
    Article
  8. 1808

    Musique de film et construction des imaginaires touristiques dans les blockbusters hollywoodiens by Marie-Hélène Chevrier, Chloé Huvet

    Published 2023-07-01
    “…Ce dépaysement, loin de dépendre uniquement des lieux de tournage, est en réalité savamment orchestré, au sens propre du terme. …”
    Get full text
    Article
  9. 1809

    Tunnel transition mechanism support all types of NAT users by Nian-feng LU, Zhen-xing WANG, Hui-sheng LIU

    Published 2012-11-01
    “…Through the analied of current tunneling mechanism,a more efficient and applicable tunneling mechanism called TrNAT based on TSP to face different scenarios was proposed.Optimization of the communications between NAT users was achieved with ideology of MIPv6.Then,Shim6 was utilized to realize route redundancy and also improved the route aggregation of 6 to 4 tunnel.Finally,TrNAT tunneling mechanism was implemented on Linux kernel and validated by experiments.…”
    Get full text
    Article
  10. 1810

    Barbara Kingsolver’s. Homeland and Other Stories about Another America by Bénédicte Meillon

    Published 2006-06-01
    “…Les récits puisent de plus à la signification de lieux mythiques, tantôt pour les valeurs que ces lieux véhiculent, tantôt à l’inverse afin de les resémantiser. …”
    Get full text
    Article
  11. 1811

    O Brasil na Encyclopédie de Diderot et d'Alembert by René Somain

    Published 2018-12-01
    “…Les entrées principales sont "Brasil" et "brésiller", une entrée secondaire "Bois de Brésil" (pau brasil, jointe à l'entrée "Madeira") et trois entrées de lieux, "Olinde", "Sébastien, saint" (Rio de Janvier) et "Salvador, San"…”
    Get full text
    Article
  12. 1812
  13. 1813
  14. 1814

    3D-printed zinc oxide nanoparticles modified barium titanate/hydroxyapatite ultrasound-responsive piezoelectric ceramic composite scaffold for treating infected bone defects by Kai Chen, Fang Wang, Xiumei Sun, Wenwei Ge, Mingjun Zhang, Lin Wang, Haoyu Zheng, Shikang Zheng, Haoyu Tang, Zhengjie Zhou, Guomin Wu

    Published 2025-03-01
    “…Moreover, combining the synergistic effects of low-intensity pulsed ultrasound (LIPUS) and piezoelectricity, results demonstrated that the scaffold promoted notable osteogenic and angiogenic potential, enhancing bone growth and repair. …”
    Get full text
    Article
  15. 1815

    Tourisme, patrimoine et islam : Fès, pôle touristique et pôle tijane by Ouallet Anne

    Published 2021-12-01
    “…L’essor du tourisme religieux est remarquable sur les hauts-lieux de la Tijaniyya de l’Afrique subsaharienne au Maghreb. …”
    Get full text
    Article
  16. 1816

    Fracture Energy Estimation of DCB Specimens Made of Glass/Epoxy: An Experimental Study by V. Alfred Franklin, T. Christopher

    Published 2013-01-01
    “…This paper examines critical load and corresponding displacement of double cantilever beam (DCB) composite specimens made of glass/epoxy of three different layups. Experiments were conducted on these laminates, and the fracture energy, GIc, was evaluated considering the root rotation at the crack tip. …”
    Get full text
    Article
  17. 1817

    Application research on distributed Zabbix network monitoring system by Xiao-hui GUO, Run-zhi LI, Qian ZHANG, Zong-ming WANG

    Published 2013-09-01
    “…With the increasing number of server,to ensure the normal operation of the server and application services becomes more and more complex.The importance of server monitoring system in modern server management was explained.With Zabbix,a distributed monitoring and control system was deployed,realizing some important application services monitoring in Windows and Linux environment with distributed network monitor and control system.The principle and configuration of the monitoring of Web Server,Database and DNS Server were introduced.Finally,the use cases using in the network center were shown.…”
    Get full text
    Article
  18. 1818

    Tazatel(ka) z tábora nepřátel? K rozhovorům s vyhnanými a nuceně vysídlenými Němci vedeným tazatelkami narozenými v Československu by Monika Horáková

    Published 2014-11-01
    “…The author compares own experiences with the oral history interviews with the experience of the ethnologist Libuše Volbrachtová who made also interviews with Sudeten German expellees, but already in the 1980s. …”
    Get full text
    Article
  19. 1819

    Portal authentication HTTP redirection using netfilter NFQUEUE by Huan-jie ZHANG, Yu-liang XIA

    Published 2014-10-01
    “…When using portal for user authentication,unauthorized user's HTTP access should be redirected to portal login page to help user do authentication.Using netfilter NFQUEUE target send unauthorized user TCP port 80 packets to user-space program redir_http.Redir_http will send IP reply packets to user do HTTP redirection with the help of raw socket.Using NFQUEUE can ensures high performance redirection,avoid troublesome development in the Linux kernel,simplify application development and improve system stability.…”
    Get full text
    Article
  20. 1820

    User demanded policy routing for multi-homing campus network by Huan-jie ZHANG, Yu-liang XIA

    Published 2013-09-01
    “…Edge router must use policy routing for multi-homing campus network.The flexibility of source address based policy routing defined by network administrator is not sufficient to meet the changing needs of diverse users.One scheme using Linux system was proposed to do user demanded policy routing,which was more flexible and convince than the traditional administrator defined source address based policy routing.Through 10 years of actual use in campus network,It proves that this method can meet the various needs of users,operating stabely and reliablely.…”
    Get full text
    Article