Suggested Topics within your search.
Suggested Topics within your search.
- Classroom environment 2
- Communication in education 2
- Information technology 2
- Inquiry-based learning 2
- Interaction analysis in education 2
- Internet in public administration 2
- Public administration 2
- African literature 1
- Balanced Scorecard 1
- City and town life 1
- Climate Change 1
- Electronic Health Records 1
- Emotions 1
- Emotions (Philosophy) 1
- English language 1
- Environmental Health 1
- Ethics 1
- Evaluation 1
- Evaluation research (Social action programs) 1
- Fiction 1
- Handlungsorientierung 1
- History 1
- History and criticism 1
- Igbo (African people) 1
- Law 1
- Medical Informatics Applications 1
- Medical informatics 1
- Medical technology 1
- Medical telematics 1
- Methodology 1
-
1121
Contornos de la tolerancia medieval
Published 2013-01-01“…Algunos textos de Abelardo, Tomás de Aquino, Llull y el Cusano, no solo muestran una forma específicamente medieval de encarar la diversidad interreligiosa, sino aun algo más, a saber, que las apreciables diferencias políticas y epistémicas que separan al medioevo de la modernidad no implican que la tolerancia sea una noción propiamente moderna, ni que su versión medieval resulte ajena a cierta admisión de la libertad religiosa y de la pluralidad en la verdad.…”
Get full text
Article -
1122
¿Una “definición” de leyes? Montesquieu y las leyes-sin-ley
Published 2016-01-01“…Más concretamente, se intentará mostrar cómo Montesquieu no dé ninguna definición de las leyes, puesto que éstas –en cuanto relaciones– no son “cosas”, no son algo que pueda definirse. Para poder son lo que son, las leyes deben siempre permanecer sin significado, sin finalidad, sin definición.…”
Get full text
Article -
1123
-
1124
Drivers and challenges for wood-based construction in urban areas
Published 2025-01-01Get full text
Article -
1125
Stable improvement in hand muscle strength in incomplete spinal cord injury patients by long-term paired associative stimulation—a case series study
Published 2025-02-01“…The achieved strength level was maintained for a minimum of 6 months after completing the stimulations. Patients were also evaluated with motor point (MP) integrity testing to estimate the extent of lower motor neuron damage. …”
Get full text
Article -
1126
Robustness design of templates for logic OR operation CNN in gray-scale images
Published 2014-05-01“…A kind of gray-scale logic OR operation (GLOGOR) CNN was proposed by formulating the logic OR algo-rithms for gray-scale images. It could perform a pixel-wise logic OR operation on corresponding elements of two gray-scale images. …”
Get full text
Article -
1127
Scalable overlay multicast algorithm with high stability
Published 2016-05-01“…A new scalable overlay multicast algorithm with high stability(SOM-HS)was proposed.In SOM-HS algo-rithm,the node stability and the link weight factor were defined to ensure that the high stability nodes were located in the backbone network of multicast tree.In the hierarchica clustering configuration process,SOM-HS algorithm limits the degree of the nodes to ensure load balancing.The experimental results show that,the maximum delay with SOM-HS al-gorithm is minimum compared to the other existing algorithms in different multicast scales.…”
Get full text
Article -
1128
Content-based effective event matching algorithm
Published 2011-01-01“…Based on the study of characteristics of the distributed virtual environment and current event matching algo-rithms,a content-based effective event matching(CEEM) algorithm was proposed.By considering the efficiency of both subscription processing and event matching,this algorithm can solve the symmetric event matching efficiently,so as to make the content-based publish/subscribe model fit the virtual environment better.Finally,experiments and performance analysis show that CEEM is both practical and effective.…”
Get full text
Article -
1129
Network anomaly detection based on TCM-KNN and genetic algorithm
Published 2007-01-01“…A network anomaly detection scheme based on TCM-KNN algorithm was proposed.Moreover,genetic algo-rithm(GA) based instance selection was introduced to boost the detection performance,meanwhile reduce the computa-tional cost for TCM-KNN.A series of experimental results demonstrate the proposed method is effective,the instance se-lection mechanism also improves TCM-KNN and makes it be a good candidate for anomaly detection in practice.…”
Get full text
Article -
1130
Hay que romper los paradigmas que hemos construido: discurso de Fernando Enrique Cardoso en la recepción del doctorado Honoris causa otorgado por Flacso
Published 2001-11-01“… Si yo pude hacer algo fue porque tuve buenos profesores, buena convivencia intelectual y una cierta formación. …”
Get full text
Article -
1131
-
1132
Ionic thermoelectric performance of cement and its modificationsFairdata (etsin)
Published 2025-07-01Get full text
Article -
1133
Selected social impact indicators influenced by materials for green energy technologies
Published 2024-10-01Get full text
Article -
1134
La intimidad y la experiencia en lo público
Published 2007-01-01“…La unidad de lectura de la información fue el relato entendido como una historia con un principio, un desarrollo y un finaly el criterio de selección de relatos significativos fue el acontecimiento biográfico, entendido como un evento que produce un quiebre en la propia biografía, sea porque rompe algo o inaugura algo. Los acontecimientos seleccionados fueron aquellos que aportaban información pertinente para comprender la progresiva configuración de la experiencia íntima y su encadenamiento con una cierta forma de experienciar la actuación en lo público. …”
Get full text
Article -
1135
El tratamiento de lo corporal en la formación inicial del profesorado
Published 2013-01-01“…El que seamos seres corpóreos no es algo anecdótico o marginal, sino que nos constituye como personas. …”
Get full text
Article -
1136
Research on the generalized utility max-min fair algorithm based on piecewise linear function
Published 2006-01-01“…A generalized utility max-min(UMM) fair algorithm of resource allocation based on piecewise linear function was provided,which supported the upper/lower bounds of resource allocation as well as strictly increasing and continu-ous utility functions.Because of the avoidance of iterative procedure,this algorithm was less complex than water-filling,another UMM fair algorithm.And its simplified version had the same complexity as the narrow-sense UMM fair algo-rithm based on piecewise linear function.This algorithm can be applied in various problems of resource allocation in the field of computer and communication.…”
Get full text
Article -
1137
El Objeto de (ha)ser Ciencia en Psicología(sic). Fábulas y desafíos frente a una responsabilidad más profunda que la sola búsqueda de validación.
Published 2008-01-01“…Es ta vieja pregunta debería alejar a más de un lector en este momento p or suponer este cuestionamiento algo fuera de lugar frente al avanc e y solidez de la disciplina; pido sin embargo indulgencia, pues el o bjetivo de esta editorial es dejar en evidencia que sólo de manera parcial ha sido abordada y por tanto pobremente superada.…”
Get full text
Article -
1138
New efficient network architecture BSN-MOT for parallel processing
Published 2014-04-01“…Topological property and many communication and application algorithms are investigated. The communication algo-rithms include row-tree and column-tree broadcast, one to all broadcast, data sum, matrix multiplication, shortest path rooting and polynomial root finding. …”
Get full text
Article -
1139
La Comunidad Mapuche en las Investigaciones Sociales: Niveles de Realidad y Conceptualizaciones del Cambio Social en la Sociedad Mapuche
Published 2024-06-01“…A fin de cuentas, todos queremos vivir en comunidad, y cualquier comunidad que se disuelve produce sentimientos de temor, y es algo de lamentar. …”
Get full text
Article -
1140
EDSM:secure and efficient scalar multiplication algorithm on Edwards curves
Published 2008-01-01“…Investigate the secure and efficient algorithm for scalar multiplication on Edwards curves.First,several new addition and doubling formulas were proposed.Analysis shows that our new formulas are more efficient than existed formulas.Then a new scalar multiplication algorithm was forwarded,called EDSM algorithm.Finally,our EDSM algo-rithm with the improved Montgomery method and other existed secure and efficient algorithms were compared.Experi-mental results show that our EDSM(scalar multiplication on Edwards curve) algorithm make great improvements in as-pects of efficiency and security.…”
Get full text
Article