Showing 1,121 - 1,140 results of 2,177 for search 'Talgo~', query time: 1.95s Refine Results
  1. 1121

    Contornos de la tolerancia medieval by Enzo Solari

    Published 2013-01-01
    “…Algunos textos de Abelardo, Tomás de Aquino, Llull y el Cusano, no solo muestran una forma específicamente medieval de encarar la diversidad interreligiosa, sino aun algo más, a saber, que las apreciables diferencias políticas y epistémicas que separan al medioevo de la modernidad no implican que la tolerancia sea una noción propiamente moderna, ni que su versión medieval resulte ajena a cierta admisión de la libertad religiosa y de la pluralidad en la verdad.…”
    Get full text
    Article
  2. 1122

    ¿Una “definición” de leyes? Montesquieu y las leyes-sin-ley by Tommaso Gazzolo

    Published 2016-01-01
    “…Más concretamente, se intentará mostrar cómo Montesquieu no dé ninguna definición de las leyes, puesto que éstas –en cuanto relaciones– no son “cosas”, no son algo que pueda definirse. Para poder son lo que son, las leyes deben siempre permanecer sin significado, sin finalidad, sin definición.…”
    Get full text
    Article
  3. 1123
  4. 1124
  5. 1125

    Stable improvement in hand muscle strength in incomplete spinal cord injury patients by long-term paired associative stimulation—a case series study by Kirsi Holopainen, Aleksandra Tolmacheva, Ines Bersch, Piia Haakana, Piia Haakana, Markus Pohjonen, Erika Kirveskari, Erika Kirveskari, Jari Arokoski, Anastasia Shulga, Anastasia Shulga

    Published 2025-02-01
    “…The achieved strength level was maintained for a minimum of 6 months after completing the stimulations. Patients were also evaluated with motor point (MP) integrity testing to estimate the extent of lower motor neuron damage. …”
    Get full text
    Article
  6. 1126

    Robustness design of templates for logic OR operation CNN in gray-scale images by Qun ZHANG, Le-quan MIN

    Published 2014-05-01
    “…A kind of gray-scale logic OR operation (GLOGOR) CNN was proposed by formulating the logic OR algo-rithms for gray-scale images. It could perform a pixel-wise logic OR operation on corresponding elements of two gray-scale images. …”
    Get full text
    Article
  7. 1127

    Scalable overlay multicast algorithm with high stability by Ye SHEN, Jing FENG, Zhan-feng WANG

    Published 2016-05-01
    “…A new scalable overlay multicast algorithm with high stability(SOM-HS)was proposed.In SOM-HS algo-rithm,the node stability and the link weight factor were defined to ensure that the high stability nodes were located in the backbone network of multicast tree.In the hierarchica clustering configuration process,SOM-HS algorithm limits the degree of the nodes to ensure load balancing.The experimental results show that,the maximum delay with SOM-HS al-gorithm is minimum compared to the other existing algorithms in different multicast scales.…”
    Get full text
    Article
  8. 1128

    Content-based effective event matching algorithm by CHEN Ji-ming1, JU Shi-guang1, PAN Jin-gui2, ZOU Zhi-wen1, GONG Zhen-yu2

    Published 2011-01-01
    “…Based on the study of characteristics of the distributed virtual environment and current event matching algo-rithms,a content-based effective event matching(CEEM) algorithm was proposed.By considering the efficiency of both subscription processing and event matching,this algorithm can solve the symmetric event matching efficiently,so as to make the content-based publish/subscribe model fit the virtual environment better.Finally,experiments and performance analysis show that CEEM is both practical and effective.…”
    Get full text
    Article
  9. 1129

    Network anomaly detection based on TCM-KNN and genetic algorithm by LI Yang1, FANG Bin-xing1, GUO Li1, TIAN Zhi-hong1, ZHANG Yong-zheng1, JIANG Wei1

    Published 2007-01-01
    “…A network anomaly detection scheme based on TCM-KNN algorithm was proposed.Moreover,genetic algo-rithm(GA) based instance selection was introduced to boost the detection performance,meanwhile reduce the computa-tional cost for TCM-KNN.A series of experimental results demonstrate the proposed method is effective,the instance se-lection mechanism also improves TCM-KNN and makes it be a good candidate for anomaly detection in practice.…”
    Get full text
    Article
  10. 1130

    Hay que romper los paradigmas que hemos construido: discurso de Fernando Enrique Cardoso en la recepción del doctorado Honoris causa otorgado por Flacso by Fernando Henrique Cardoso

    Published 2001-11-01
    “… Si yo pude hacer algo fue porque tuve buenos profesores, buena convivencia intelectual y una cierta formación. …”
    Get full text
    Article
  11. 1131
  12. 1132
  13. 1133
  14. 1134

    La intimidad y la experiencia en lo público by María Teresa Luna C.

    Published 2007-01-01
    “…La unidad de lectura de la información fue el relato entendido como una historia con un principio, un desarrollo y un finaly el criterio de selección de relatos significativos fue el acontecimiento biográfico, entendido como un evento que produce un quiebre en la propia biografía, sea porque rompe algo o inaugura algo. Los acontecimientos seleccionados fueron aquellos que aportaban información pertinente para comprender la progresiva configuración de la experiencia íntima y su encadenamiento con una cierta forma de experienciar la actuación en lo público. …”
    Get full text
    Article
  15. 1135

    El tratamiento de lo corporal en la formación inicial del profesorado by Lucio Martínez Álvarez

    Published 2013-01-01
    “…El que seamos seres corpóreos no es algo anecdótico o marginal, sino que nos constituye como personas. …”
    Get full text
    Article
  16. 1136

    Research on the generalized utility max-min fair algorithm based on piecewise linear function by XU Tong, LIAO Jian-xin

    Published 2006-01-01
    “…A generalized utility max-min(UMM) fair algorithm of resource allocation based on piecewise linear function was provided,which supported the upper/lower bounds of resource allocation as well as strictly increasing and continu-ous utility functions.Because of the avoidance of iterative procedure,this algorithm was less complex than water-filling,another UMM fair algorithm.And its simplified version had the same complexity as the narrow-sense UMM fair algo-rithm based on piecewise linear function.This algorithm can be applied in various problems of resource allocation in the field of computer and communication.…”
    Get full text
    Article
  17. 1137

    El Objeto de (ha)ser Ciencia en Psicología(sic). Fábulas y desafíos frente a una responsabilidad más profunda que la sola búsqueda de validación. by Roberto Polanco C.

    Published 2008-01-01
    “…Es ta vieja pregunta debería alejar a más de un lector en este momento p or suponer este cuestionamiento algo fuera de lugar frente al avanc e y solidez de la disciplina; pido sin embargo indulgencia, pues el o bjetivo de esta editorial es dejar en evidencia que sólo de manera parcial ha sido abordada y por tanto pobremente superada.…”
    Get full text
    Article
  18. 1138

    New efficient network architecture BSN-MOT for parallel processing by Jiang-yun LI, Li-ting SUN

    Published 2014-04-01
    “…Topological property and many communication and application algorithms are investigated. The communication algo-rithms include row-tree and column-tree broadcast, one to all broadcast, data sum, matrix multiplication, shortest path rooting and polynomial root finding. …”
    Get full text
    Article
  19. 1139

    La Comunidad Mapuche en las Investigaciones Sociales: Niveles de Realidad y Conceptualizaciones del Cambio Social en la Sociedad Mapuche by René Ríos

    Published 2024-06-01
    “…A fin de cuentas, todos queremos vivir en comunidad, y cualquier comunidad que se disuelve produce sentimientos de temor, y es algo de lamentar. …”
    Get full text
    Article
  20. 1140

    EDSM:secure and efficient scalar multiplication algorithm on Edwards curves by ZHANG Bao-hua1, YIN Xin-chun2, ZHANG Hai-ling2

    Published 2008-01-01
    “…Investigate the secure and efficient algorithm for scalar multiplication on Edwards curves.First,several new addition and doubling formulas were proposed.Analysis shows that our new formulas are more efficient than existed formulas.Then a new scalar multiplication algorithm was forwarded,called EDSM algorithm.Finally,our EDSM algo-rithm with the improved Montgomery method and other existed secure and efficient algorithms were compared.Experi-mental results show that our EDSM(scalar multiplication on Edwards curve) algorithm make great improvements in as-pects of efficiency and security.…”
    Get full text
    Article