Filters








548 Hits in 9.1 sec

"Making the Past Part of the Present:" The Recovery of Names in William Morris's Late Romances

Isolde Karen Herbert
2003 Names  
For Morris (1834-96), the degradation of architecture and language in his era was reducing the past and its history to "a book from which the pictures have been torn" (Kelvin 2:52); accordingly, his late  ...  Donnellan points out, "(t]he history behind the use of a name may not be known to the individual using it .... Even a whole culture could lose this history" (1972,373).  ...  Linguistic, cultural, and territorial appropriation finds its sanction in the Romans' password, their decadent version of totemic naming: "No limit" (60-1).  ... 
doi:10.1179/nam.2003.51.2.83 fatcat:pld6fl5dpjdfdecim7tlme6kzy

Privacy Management of Multi User Environment in Online Social Networks (OSNs)

P. Amrutha
2013 IOSR Journal of Computer Engineering  
We formulate an access control model to capture the essence of multiparty authorization requirements, along with a multiparty policy specification scheme and a policy enforcement mechanism.  ...  To this end, we propose an approach to enable the protection of shared data associated with multiple users in OSNs.  ...  Leena Ragha, Head of the Department of Computer Engineering, Ramrao Adik Institute of Technology and Prof.  ... 
doi:10.9790/0661-1320107 fatcat:rdpsdcqelbbzvkg5rm4og4tzba

E-Mail Security and Privacy [chapter]

Stewart Miller
1998 Handbook of Enterprise Operations Management  
Note The RSA cryptography algorithm is was designed by MIT professors Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman (the R, the S, and the A) in 1977.  ...  Learn more about RSA cryptography at the RSA Security Web site (www .rsasecurity.com).  ...  Instant Messaging and Viruses The incidence of viruses distributed via instant messaging has significantly increased over the past few years.  ... 
doi:10.1201/9781420052169.ch48 fatcat:dr2f2bn4tfhkzkinku62hkn74e

Consumer perceptions of privacy, security and trust in ubiquitous commerce

George Roussos, Theano Moussouri
2004 Personal and Ubiquitous Computing  
We then proceed to report on a study on consumer perceptions of MyGrocer, a recently developed ubiquitous commerce system.  ...  The emphasis of the discussion is on aspects of security, privacy protection and the development of trust; we report on the findings of this study.  ...  Introduction Over the past decade, the rapid proliferation of electronic commerce technologies has fundamentally transformed the way we conduct business.  ... 
doi:10.1007/s00779-004-0307-6 fatcat:dyfcxdyzgbgitpruv6pqjoaenq

Foreword re C. S. Wallace

D. L. Dowe
2008 Computer journal  
is 0 at the true estimate, † between any value in parameter space and the true estimate, there is a path in parameter space along which the penalty changes monotonically, † the penalty function must be  ...  Faculty of Science to the Faculty of Computing and I.T. and then later) became part of the School of Computer Science and Software Engineering and subsequently (since Chris's death) now part of the Clayton  ...  MORE FROM CHRIS "For me the whole business I suppose started to present itself to me as a bit of a problem when I was an honours student studying physics.  ... 
doi:10.1093/comjnl/bxm117 fatcat:quybnrbiunennggqbjwrg3a7gu

The Ethnicity of the New York Intellectuals

Stephen J. Whitfield
2003 Revue LISA  
In a common room at Cambridge University, the cosmopolitan biographer of the cosmopolitan Leon Trotsky once disparaged the study of his own “roots”. “ Trees have roots ”, according to Isaac Deutscher,  ...  But he told me he belonged to the National Association of Hermits ”1. 2The alienation that was long the password into membership of New York’s mostly Jewish intellectuals did not prevent them being considered  ... 
doi:10.4000/lisa.3134 fatcat:e2ph7oq6nfag5m7dut77oe54hy

Foreword [chapter]

William Debuys
2018 Desierto  
product of cool detachment by a scholar sitting in his study before the fire and musing over a glass of fine sherry.  ...  He tells me that Arizona will be the new coast of the Pacific Rim, that the Japanese are coming, the economy is now global, the future is now-the past? Well, who cares about the past, it is over.  ...  "We gave him, " he says almost wistfully, "a faraway. " THIS PAGE INTENTIONALLY LEFT BLANK I have never heard a mountain lion bawling over the fate of his soul.  ... 
doi:10.7560/316580-001 fatcat:ojt6xwlcxfgxtbqahw5jntblui

An evaluation framework for cross-platform mobile application development tools

Sunny Dhillon, Qusay H. Mahmoud
2014 Software, Practice & Experience  
There are many staff, faculty and others who have contributed to bringing me to the point of completing this degree.  ...  Acknowledgements I would like to thank all those individuals that assisted me in the process of completing this thesis.  ...  In [17] the author uses the Linpack benchmark suite as a guideline for the algorithms due to their long study over decades.  ... 
doi:10.1002/spe.2286 fatcat:xvpvz6w2drgxjejuk6ltdc6w7e

Cybersecurity: Past, Present and Future [article]

Shahid Alam
2022 arXiv   pre-print
., explainable AI is an emerging field of study and has a lot of potentials to improve the role of AI in cybersecurity.  ...  We must learn from the past, evolve our present and improve the future. Based on this objective, the book covers the past, present, and future of these main specializations of cybersecurity.  ...  After over 3 decades we would expect that buffer overflow would no longer pose a significant threat.  ... 
arXiv:2207.01227v1 fatcat:vfx54hq3ejc7dlfestj6dkstpa

Journal Of Management Science And Business Intelligence, Volume 2, Issue 1

IBII Publishing
2017 Zenodo  
The full issue of JMSBI v2, s1.  ...  For example, over the past several decades the development in the information technology and growt h of data have caused the businesses across US and overseas to redefine their business processes, and  ...  T he study concluded that such a role played by the pharmacists resulted in a cost savings of over one million dollars.  ... 
doi:10.5281/zenodo.806833 fatcat:n7qenfvvhrea7iqs6667ud2qym

Can Cyberspace potentially harm democracy and world stability? [chapter]

Basie von Solms, University of Johannesburg
2019 Moral Issues in the Natural Sciences and Technologies  
) and 'Exploring meaningful nature experience connectedness with nature and the revitalization of transformative education for sustainability' (Matthew van Zyl).  ...  Acknowledgement I am deeply indebted to Paulu Joubert (2018) and Matthew van Zyl (2014) for access to their unpublished theses 'The forgotten experience: Human alienation from nature' (Pierre Joubert  ...  Introduction The role of the media in society has been extensively studied over the past century.  ... 
doi:10.4102/aosis.2019.bk114.09 fatcat:gaub27xrsfaq7fsyya7lsne5gy

The rise of machine learning for detection and classification of malware: Research developments, trends and challenges

Daniel Gibert, Carles Mateu, Jordi Planes
2020 Journal of Network and Computer Applications  
Current state-of-the-art research focus on the development and application of machine learning techniques for malware detection due to its ability to keep pace with malware evolution.  ...  A B S T R A C T The struggle between security analysts and malware developers is a never-ending battle with the complexity of malware changing as quickly as innovation grows.  ...  This research article has received a grant (2019 call) from the University of Lleida Language Institute to review the English.  ... 
doi:10.1016/j.jnca.2019.102526 fatcat:3bf6afjqpnb53eoeghfxjeaus4

Seeking the Will of God: The Information Seeking Experiences of the Leaders of Nova Scotia Churches in Transition

David H. Michels
2014 Social Science Research Network  
This area has a high percentage of immigration (10%, n=1,570), and a high rate of mobility with 50% The larger region (pop. c. 34,000) has seen 32% growth over the past decade with 45% of residents  ...  Over a decade ago Haythornthwaite and Wellman (2002) Life study (Larsen, 2001) asked what these Internet users were doing online.  ...  XXXXXXXXXXXX has been identified as a potential study site because of the local building campaign and the ongoing vision of a multi-site church.  ... 
doi:10.2139/ssrn.2505083 fatcat:dnepiqqrkfggtkqrk3jyazqr4y

Technology Evolution, People, and Privacy [chapter]

Michelle Finneran Dennedy, Jonathan Fox, Thomas R. Finneran
2014 The Privacy Engineer's Manifesto  
-Gene Roddenberry This chapter takes a look at the history of information, technology, beneficiaries of that technology, and their relationship to data governance development over time.  ...  It isn't all over; everything has not been invented; the human adventure is just beginning.  ...  Pity the fool who insists on a definition of the internet of Things (ioT).  ... 
doi:10.1007/978-1-4302-6356-2_1 fatcat:pcba3l2ujngn7gm654g2ecmhje

Inside Greek U.: Fraternities, Sororities, and the Pursuit of Pleasure, Power, and Prestige

2009 Journal of Popular Culture  
They trusted me to write a fair and accurate book about their lives that would help move the Greek system toward the idealized goals of its creeds. I hope that I did not disappoint them.  ...  Acknowledgments First and foremost I am indebted to the hundreds of Greek students who invited me into their lives and shared their stories with me.  ...  Women are simply free to wait longer before the pressure to marry kicks in. 1 have talked to far too many unmarried alumnae over the past few decades who testify to the looks of horror and judgmental questions  ... 
doi:10.1111/j.1540-5931.2009.00684_12.x fatcat:crqvcux6yrexzhcdthg3psvjdu
« Previous Showing results 1 — 15 out of 548 results