Results 21 to 30 of about 6,416 (199)
IoT devices are widely used in the smart home, automobile, and aerospace areas. Note, however, that recent information on thefts and hacking have given rise to many problems.
Seong-Kyu Kim, Ung-Mo Kim, Jun-Ho Huh
doaj +1 more source
L’improvisation comme forme d’expérience. Généalogie d’une catégorie d’appréciation du jazz
Improvisation is considered here as a category of aesthetic appreciation rather than as a category of musical activity. It is seen as determining different forms of experience which regulate listeners’ as well as musicians’ activities, because it implies
Olivier Roueff
doaj +1 more source
Various analytical techniques markedly contribute to the authentification of metal antiquities when visual judgments no more suffice to detect fakes, forgeries or extensive restorations. A careful analysis of the property of the materials from which the
Lucien Martinot
doaj +1 more source
Celebrification, Authenticity, Gossip: The Celebrity Humanitarian
The article discusses the celebrity humanitarian as media construction. Departing from a discussion of celebrification, the article argues that celebrities in public roles outside the field of entertainment are inevitably framed by and structured in ...
Jerslev Anne
doaj +1 more source
A Formal TLS Handshake Model in LNT [PDF]
Testing of network services represents one of the biggest challenges in cyber security. Because new vulnerabilities are detected on a regular basis, more research is needed.
Bozic, Josip +3 more
core +3 more sources
Huiles essentielles et chiralité moléculaire
Molecular chirality is a property of the nature and life, it is present everywhere and at all scales of magnitude. A fundamental aspect of molecules that is generally overlooked in scientific aromatherapy yet based on the use of the chemistry of ...
Aribi-Zouioueche, Louisa +1 more
doaj +1 more source
Data behind mobile behavioural biometrics – a survey
Behavioural biometrics is becoming more and more popular. It is hard to find a sensor that is embedded in a mobile/wearable device, which cannot be exploited to extract behavioural biometric data. In this study, the authors give the reader an overview of mobile device behavioural biometric data and how this data is used in experiments, especially ...
Teodors Eglitis +2 more
wiley +1 more source
Abstract Objective A genome‐wide high‐throughput single nucleotide polymorphism (SNP) typing method was tested with respect of the applicability to ancient and degraded DNA. The results were compared to mini‐sequencing data achieved through single base extension (SBE) typing.
Nicole Schmidt +5 more
wiley +1 more source
La scène traumatique de Sarah Kane
Kane’s dramatic work reads like the paragon of the late 20th century traumatic stage. As early as in her first plays in which she opts for frontality and In-Yer-Face aesthetics, Kane constructs the stage as performative and even ontological : the very ...
Élisabeth Angel-Perez
doaj +1 more source
Task-Driven Dictionary Learning [PDF]
Modeling data with linear combinations of a few elements from a learned dictionary has been the focus of much recent research in machine learning, neuroscience and signal processing.
Bach, Francis +2 more
core +7 more sources

