Showing 19,041 - 19,060 results of 22,124 for search 'stOrk~', query time: 1.78s Refine Results
  1. 19041

    La traversée médiatique du simple soldat. À partir de l’œuvre de Bertrand Carrière by Johanne Villeneuve

    Published 2012-03-01
    “…Our reading of Carrière’s work leads to some considerations aboutThe Wartime Memories Project,a website collecting memories (stories and photos) of the Great War and the Second World War. …”
    Get full text
    Article
  2. 19042
  3. 19043

    L’Histoire culbutée : Shakespeare et ses jeux de mots by Jean-Pierre Richard

    Published 2022-01-01
    “…Out of ancient history and the history of England, Shakespeare created a parallel world of obscene tableaux, shows, and stories, through a selective and meticulous orchestration of the signifying at play in any language. …”
    Get full text
    Article
  4. 19044

    A PLEA FOR LEADERSHIP THEORIES by V. Kessler

    Published 2021-06-01
    “…In this article, I critically analyse the trivialisation of leadership, often based on success stories, and offer seven methods to include theory in leadership classes, namely electing students; reversing the order: practice-theory instead of theory-practice; creating aha experiences with theory; selecting “good” theory; pointing out the benefit of a special theory; viewing theories as eye-glasses, and suggesting eye-glasses from different disciplines. …”
    Get full text
    Article
  5. 19045

    A Fine-Grained Mobile Data Security Model by Yubin Yang, Liming Cheng

    Published 2014-01-01
    “…The creating, modifying, storing and transmitting of the data label and application label were controlled and managed by the label control management module. …”
    Get full text
    Article
  6. 19046

    Leaving the chasm behind: Autoethnography, creativity and the search for identity in academia by Pete Frederick Atherton

    Published 2022-08-01
    “…The findings support Bochner’s (1994) idea that social science research can benefit from deliberately value-laden stories alongside empirical data and theories. The findings also developed the author’s previous autoethnographic paper, which drew on his own social media posts as qualitative and quantitative data Atherton (2020b). …”
    Get full text
    Article
  7. 19047

    Formal Description of Trusted Bebavior Oriented Security System for Big Data by Zhi Yan, Jing Zhan

    Published 2014-07-01
    “…Usually the process of storing and analyzing with big data is under the framework of Hadoop within the environment of cloud computing while the risks of big data application on cloud derive from cloud service providers and remote users who access data without authorization. …”
    Get full text
    Article
  8. 19048

    Unpublished calendars of 1853-1854 by Laurynas Ivinskis by Danutė Labanauskienė

    Published 2024-08-01
    “…Ivinskis' biography are disclosed. All didactic stories and other articles that were banned in 1853-1854 survived in Ivinskis' manuscripts and were published in later editions of the calendars. …”
    Get full text
    Article
  9. 19049

    The Local Impact of Migratory Legends: The Process and Function of Localisation by Ambrož Kvartič

    Published 2013-01-01
    “…Thus, the contemporary legends about foreigners in Velenje, which at their core are stories about the Other, are also characterised by their experiential backdrop.…”
    Get full text
    Article
  10. 19050

    Are Cows Comfortable in Modern Dairy Facilities? by Izabella Toledo

    Published 2018-12-01
    “…Some factors that may decrease or limit the ability of cows to express natural behaviors include but are not limited to resting area and resting behavior, time spent away from pen (i.e. for milking and other management procedures), feed and water access and availability, stocking density, and environmental factors such as heat stress. …”
    Get full text
    Article
  11. 19051

    Sculpture as Literature and History: Captive and Captivating Venus Figures from the Greek Revolutionary Era by Gonda Van Steen

    Published 2022-04-01
    “…The Venus de Milo has become an iconic figure, heavily overwritten by aesthetic judgments, adventure stories of movement and migration, and the accounts of personal and political trajectories, all playing out in the upper and Western echelons of imperialist Europe and its classist (and racist) underpinnings.…”
    Get full text
    Article
  12. 19052

    (Des)memória e catástrofe: considerações sobre a literatura pós-golpe de 1964 by Ettore Finazzi-Agrò

    Published 2014-01-01
    “…In this context, the stories – told by many authors and some of the survivors of repression – seem to play an important role in supplying the deficiencies of the History, in order to show, effectively even if through fiction, the nefas that characterized in particular torture and murder of opponents. …”
    Get full text
    Article
  13. 19053

    Récits écoféministes de voyages interstellaires : observer et créer de nouveaux mondes. by Clémence Mathieu

    Published 2019-06-01
    “…The Ekumen cycle is a set of science-fiction books written between 1966 and 2002 by the american author Ursula le Guin. By telling stories of new worlds discoveries which reconsiders the mankind/nature, man/woman dualisms and dominations, the writer is involved in the creation of eco-feminist demands and ideas ; thus the Ekumen tales may qualify as eco-feminist fiction. …”
    Get full text
    Article
  14. 19054

    Facts about Carbohydrate by Nancy J. Gal, Amanda L. Ford, Wendy J. Dahl

    Published 2014-03-01
    “…Carbohydrate in the form of glucose provides energy to cells, tissues, and organs to carry out daily activities. Some glucose is stored in the liver and muscle cells for later use when required. …”
    Get full text
    Article
  15. 19055

    High-performance and high-concurrency encryption scheme for Hadoop platform by Wei JIN, Mingjie YU, Fenghua LI, Zhengkun YANG, Kui GENG

    Published 2019-12-01
    “…,single encryption algorithm,complicated key management,low encryption performance) and they cannot protect data stored in Hadoop effectively,a high-performance encryption and key management scheme for Hadoop was proposed.Firstly,a three-level key management system was extended with the domestic commercial cipher algorithm.Then,a new data structure for encryption zone key to reduce time consumption was designed.Finally,the computing process of data stream in parallel was scheduled.The experimental results show that compared with the existing Hadoop schemes,the proposed scheme can improve the efficiency of key management,and can speed up file encryption.…”
    Get full text
    Article
  16. 19056

    Le post-humanisme chinois et la science-fiction politique de Chen Qiufan by Ron S. Judy

    Published 2024-06-01
    “…This essay examines the “posthumanist” dimensions of three sf stories by Chen Qiufan (a.k.a. Stanley Chan) : “Smog Society” (2010), “Year of the Rat” (2009), and “The Flower of Shazui” (2012), with the aim of establishing whether there are any substantial differences between posthumanism in the Chinese and Euro-American cases. …”
    Get full text
    Article
  17. 19057

    History, hagiography, romance… by Lisa M. Ruch

    Published 2023-07-01
    “…However, the abbreviated Middle English prose Brut preserved in Edinburgh University Library MS 184 and two other manuscripts is unusual in its blending of narrative elements from historical accounts, hagiography, and romance to portray Athelstan as an English hero, and in its telling its 15-century audience where they could still see physical relics of Athelstan’s reign in their own day, giving them the opportunity to be vicariously connected to the storied history of their nation. This article traces sources and traditions this Brut’s compiler most likely drew from and considers what implications this may have for our understanding of this particular manuscript and of the evolution and adaptation of Brut chronicles in the late Middle Ages.…”
    Get full text
    Article
  18. 19058

    Medicalisation of Birth in Transylvania in the Second Half of the 19th Century. A Subject to be Investigated by Luminiţa Dumănescu, Ioan Bolovan

    Published 2021-03-01
    “…Ethnic and confessional minorities often displayed starkly different patterns in the selection of these instrumental figures. …”
    Get full text
    Article
  19. 19059

    Overview of searchable encryption research by Ying LI, Chunguang MA

    Published 2018-07-01
    “…With the development of cloud computing,there is an increasing number of companies and individuals outsourcing their data to cloud server in the encrypted form to protect data security and user privacy.As a result,efficient retrieval of encrypted data stored on cloud server has become the issue that users may pay attention to.Searchable encryption (SE) is a cryptographic primitive that supports keyword search over encrypted data,and migrates the cumbersome search operation to the cloud server to utilize its vast computational resources.Reviews previous research according to the different cryptosystems used,and divides SE into two groups,that is symmetric searchable encryption and asymmetric searchable encryption.Based on this classification,first introduces a typical program,and then introduces from the two aspects of the expression of searchable encryption and security.Finally,the need-to-be-solved problems and main research directions are discussed.…”
    Get full text
    Article
  20. 19060

    New technology in libraries work and the problems of education in the field of librarianship and bibliography by Marija Prokopčik

    Published 2024-08-01
    “… The article deals with the problem of the changing demands of education for librarianship and information work in developed capitalist countries as a result of the application of computers and changing technology of library work. …”
    Get full text
    Article