Results 251 to 260 of about 1,494,656 (306)
Some of the next articles are maybe not open access.

Deceived and Exploited:

2023
The trafficking trajectories taken by Eritreans to Libya are highly organised by a network of actors across the Horn of Africa. The practices described by the refugees and migrants who have taken these perilous journeys include recruitment by deception, fraud and force. Payments are extracted using torture while victims are detained in ‘warehouses’ and
Smits, Klara, van Reisen, Mirjam
openaire   +2 more sources

Entrapment exploited

Trends in Microbiology, 2014
In their recent paper in Science, Thammavongsa et al. demonstrate how Staphylococcus aureus degrades the DNA of neutrophil extracellular traps (NETs) into 2'-deoxy-adenosine, which causes incoming macrophages to go into apoptosis, thereby increasing the chance for the bacterium to survive in an abscess.
Jos A G, van Strijp   +1 more
openaire   +2 more sources

Exploiting Exploitation

2010
Exploitation film stands for cheaply produced, chauvinistic movies, where the simple plot is held together solely by sex and violence. The focus was on the visual extravaganza. The exploitation cinema had its heyday during the 60s and 70s. Thereafter, the market for these movies disappeared, and the gap they used to fill until then, was closed by the ...
openaire   +1 more source

The injustice of exploitation

Critical Review of International Social and Political Philosophy, 2002
Exploitation is perhaps the archetypal form of social injustice, reflecting the three dimensions of social injustice discussed in Chapter 1: maldistribution, exclusion, and disempowerment.1 The aim of this chapter is to explore the way exploitation captures all three dimensions of injustice.
openaire   +1 more source

Exploited: Exploitation As A Subjective Category

The Southern Journal of Philosophy, 2016
AbstractI focus on exploitation from the point of view of those who suffer from it, and so I take exploitation as a category of subjective experience. Adopting a subjective perspective on exploitation highlights important conceptual aspects about it and suggests important methodological rules on how to critically discuss social forms of exploitation. I
openaire   +1 more source

EXPLOITATION

2017
This chapter analyzes the concept of exploitation. It discusses the unstable correlation of exploitation, domination, and alienation. The Marxist problematic of exploitation has been oscillating between tendencies to essentially read it as domination, and tendencies to read it as alienation. It is inasmuch as we reopen the question of their overlapping
openaire   +1 more source

To exploit the exploitation of actin by HIV?

Drug Discovery Today, 2004
Abstract Because HIV relies on host cell machinery for infection, replication and transmission, future anti-HIV therapeutic agents that target the interactions between viral components and host cell proteins, such as actin, are likely to emerge.
Kap-Sun, Yeung, Gregory A, Yamanaka
openaire   +2 more sources

The facets of exploitation

Journal of Theoretical Politics, 2014
This paper proposes four concepts of exploitation that encapsulate common uses of the word in social interactions: unfair advantage, unequal exchange, using persons as means, and free-riding. It briefly discusses how these concepts appear in the literature (the first two are prominent in Roemer’s classical work), and then examines how these forms of ...
openaire   +2 more sources

The Exploiter Exploited

1988
Of all Loti’s novels, Les Desenchantees has provoked the least critical attention, although much has been written about it. While this book is very different in tone from his other Oriental works, no satisfactory explanation has ever been given for Loti’s new perspective on Oriental women. Whereas Rarahu, Fatou-gaye, and Aziyade were dependent, passive,
openaire   +1 more source

Exploiting exceptions

Software: Practice and Experience, 2001
AbstractA novel compiler optimization for loops is presented. The optimization uses exceptions to eliminate redundant tests that are performed when code is interpretively executed, as is the case with Java bytecode executed on the Java Virtual Machine.
Michael M. J. Zastre, R. Nigel Horspool
openaire   +2 more sources

Home - About - Disclaimer - Privacy