Results 101 to 110 of about 233,719 (314)
ABSTRACT Sharp force trauma (SFT) is the main criterion used to identify chop mark butchery in zooarchaeology, yet its reliability as a diagnostic feature has not been systematically tested. Chop marks reflect both cutting and fracturing processes and exhibit characteristics of both sharp and blunt trauma.
Tiffany Okaluk +4 more
wiley +1 more source
Putnam's Theory of Natural Kinds and Their Names is not the Same as Kripke's
Philosophers have been referring to the “Kripke–Putnam” theory of naturalkind terms for over 30 years. Although there is one common starting point, the two philosophers began with different motivations and presuppositions, and developed in different ways.
Ian Hacking
doaj
Habitat‐modifying plants engineer landscapes through plant‐environment feedbacks. The strength of these feedbacks is determined by above‐ and below‐ground traits shaping landscape morphology. Besides interspecific differences, recent findings highlight that intraspecific trait variation, such as shoot density, can also influence landscape morphology ...
Solveig Höfer +9 more
wiley +1 more source
Hacking Digital Video Recorders: Potential Copyright Liability for DVR Hackers and Service Providers [PDF]
To what extent does Sony\u27s time-shifting fair use argument extend to recent innovations that make it easier for hackers use DVR technology to generate copies of protected material?
Johnson, Ashley A.
core +1 more source
Competition theory suggests that interspecific prey competition can result in changes to the dietary niche, but obtaining timeseries of data from sympatric species experiencing temporal variation in competition is challenging. Scotland is an important area for two species of seals, but over the past 20 years, populations of harbour seals Phoca vitulina
Izzy Langley +7 more
wiley +1 more source
U-Net-bin: hacking the document image binarization contest
Image binarization is still a challenging task in a variety of applications. In particular, Document Image Binarization Contest (DIBCO) is organized regularly to track the state-of-the-art techniques for the historical document binarization. In this work
P. Bezmaternykh +2 more
semanticscholar +1 more source
On the meridional asymmetry of the poleward‐displaced intertropical convergence zone
We analyze the complex, asymmetrical dynamical structure of the intertropical convergence zone (ITCZ) in the East Pacific and Atlantic basins, seen during boreal summer, using a global, coupled storm‐resolving simulation. The equatorial pressure gradients lead to the acceleration of southerlies, which decelerate when the zonal flow becomes westerly ...
Divya Sri Praturi, Bjorn Stevens
wiley +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
ABSTRACT Digital networks are virtual representations of freshwater systems that provide important inputs to, and mapping of, river classifications, simulation models, and quantitative data analyses for policy, planning, and management. Strahler order has often been used to characterize network configuration and as a proxy indicator of river channel ...
Doug Booker +3 more
wiley +1 more source
Malicious User Experience Design Research for Cybersecurity
This paper explores the factors and theory behind the user-centered research that is necessary to create a successful game-like prototype, and user experience, for malicious users in a cybersecurity context.
Sharevski, Filipo +2 more
core +1 more source

