Results 121 to 130 of about 205,649 (344)

About Comunes: challenges of the social movements ecosystem About Comunes: desafíos del ecosistema de movimientos sociales

open access: yesRevista Teknokultura, 2013
The social movements suffer multiple difficulties in their organization, communication, collaboration and long-term planning. Comunes is a non-profit collective that aims to minimize these difficulties and to facilitate the work of social movements ...
Bastien Guerry   +3 more
doaj  

HACking the centromere chromatin code: insights from human artificial chromosomes [PDF]

open access: bronze, 2012
Jan H. Bergmann   +4 more
openalex   +1 more source

Advanced Hybrid Techniques for Cyberattack Detection and Defense in IoT Networks

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 2, March/April 2025.
ABSTRACT The Internet of Things (IoT) represents a vast network of devices connected to the Internet, making it easier for users to connect to modern technology. However, the complexity of these networks and the large volume of data pose significant challenges in protecting them from persistent cyberattacks, such as distributed denial‐of‐service (DDoS)
Zaed S. Mahdi   +2 more
wiley   +1 more source

Investigating the Iron‐Steam Process for Coupling With SOEC and SOFC: A Step Toward Integrated Hydrogen and Electricity Storage

open access: yessteel research international, EarlyView.
Fixed‐bed reactor experiments (10 L) validate the iron–steam redox process, bridging material‐scale research and industrial power‐to‐power applications. Coupled with SOEC/SOFC systems, this framework defines critical interfaces for heat and gas management. Results confirm reproducible hydrogen storage and release, demonstrating technical feasibility at
Julien Göthel   +2 more
wiley   +1 more source

Hacker Combat: A Competitive Sport from Programmatic Dueling & Cyberwarfare

open access: yes, 2017
The history of humanhood has included competitive activities of many different forms. Sports have offered many benefits beyond that of entertainment. At the time of this article, there exists not a competitive ecosystem for cyber security beyond that of ...
Pharr, Jovonni L.
core  

Rethinking Face‐to‐Face Interaction: Lessons from Studies of “Autistic Sociality”

open access: yesSymbolic Interaction, EarlyView.
Face‐to‐face interaction is a foundational concept in microsociology. This article surveys the social experiences of autistic people, who are commonly known for having a strained relationship with interactions face to face. By interpretively reviewing and synthesizing the broader literature on “autistic sociality,” the article provides a nuanced ...
Lars E. F. Johannessen
wiley   +1 more source

A Proposal to Center Relevance in Applied Linguistics Research: The Relevance‐to‐Practice (RTP) Framework

open access: yesTESOL Quarterly, EarlyView.
Abstract Considering applied linguistics as a problem‐centered discipline, we address an enduring challenge in the field: the need to ensure that research provides findings that can contribute to solving everyday challenges faced by language practitioners.
Hyun‐Bin Hwang, Matthew D. Coss
wiley   +1 more source

Doing Psycholinguistics in Applied Linguistics: Foundations, Methods, and Future Directions

open access: yesTESOL Quarterly, EarlyView.
Abstract Psycholinguistics seeks to explain how language is represented, processed, and acquired in the mind. In applied linguistics, this endeavor extends to understanding how diverse bilingual populations—including second language learners, heritage speakers, and individuals experiencing language attrition—acquire and use language across contexts ...
Aline Godfroid
wiley   +1 more source

Un manifeste hacker

open access: yesTerminal, 2009
Mc Kenzie Wark
doaj   +1 more source

Home - About - Disclaimer - Privacy