Results 61 to 70 of about 233,719 (314)

Hacking in the university: contesting the valorisation of academic labour [PDF]

open access: yes, 2013
In this article I argue for a different way of understanding the emergence of hacker culture. In doing so, I outline an account of ‘the university’ as an institution that provided the material and subsequent intellectual conditions that early hackers ...
Winn, Joss
core   +2 more sources

Price Premiums for Single‐Name and Compound‐Name Geographical Indications in Swiss Cheese Trade

open access: yesAgribusiness, EarlyView.
ABSTRACT Geographical indications (GIs) have become increasingly important in agri‐food markets, especially in Europe. For Swiss cheese imports and exports, we analyze whether GIs are associated with higher trade prices. We find that price premiums can be obtained for both exports and imports. However, this is only the case for cheeses with single name
Judith Irek
wiley   +1 more source

Thinking with the Animal-Hacker

open access: yesA Peer-Reviewed Journal About, 2013
In the depths of the Cumbria hills a dairy cow changes its route to stare deep into the camera lens of the ‘Environmental Virtual Observatory’ (EVO) (www.evo-uk.org).
Helen Pritchard
doaj   +1 more source

A Novel Parameter Estimation Method for Pneumatic Soft Hand Control Applying Logarithmic Decrement for Pseudo‐Rigid Body Modeling

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
In this research, a paradigm of parameter estimation method for pneumatic soft hand control is proposed. The method includes the following: 1) sampling harmonic damping waves, 2) applying pseudo‐rigid body modeling and the logarithmic decrement method, and 3) deriving position and force control.
Haiyun Zhang   +4 more
wiley   +1 more source

Child’s Information Security in Digital Space of the Russian Federation

open access: yesРоссийский технологический журнал, 2019
Our time is the time of rapid technological development. The Internet is becoming available to everyone, and it is expanding its influence in various fields.
S. S. Dubov   +2 more
doaj   +1 more source

FORMATION OF CYBER SECURITY SKILLS THROUGH METHODS OF HACKING, BYPASSING AND PROTECTING THE PROCEDURE FOR GRANTING ACCESS IN MICROSOFT WINDOWS OPERATING SYSTEM

open access: yesІнформаційні технології і засоби навчання, 2022
The article looks into the problematic issue of forming/developing teaching staff’s cyber security skills (a case study of the teachers from the National University of Defence of Ukraine named after Ivan Cherniakhovskyi).
Владислав Юрійович Кива   +2 more
doaj   +1 more source

"Why does it happen like this?". Consulting with users and providers prior to an evaluation of services for children with life-limiting conditions and their families [PDF]

open access: yes, 2014
Background: Children with life-limiting conditions and their families have complex needs. Evaluations must consider their views and perspectives to ensure care is relevant, appropriate and acceptable.
Hacking, Suzanne, Hunt, Anne
core  

Degrees of Freedom in Planning, Running, Analyzing, and Reporting Psychological Studies: A Checklist to Avoid p-Hacking

open access: yesFrontiers in Psychology, 2016
The designing, collecting, analyzing, and reporting of psychological studies entail many choices that are often arbitrary. The opportunistic use of these so-called researcher degrees of freedom aimed at obtaining statistically significant results is ...
J. Wicherts   +5 more
semanticscholar   +1 more source

Smartphone security [PDF]

open access: yes, 2017
According to eMarketer researchers, the total number of smartphones in active use on the planet exceeded the 2 billion unit in 2016 and amounted up to 2.16 billion against 1.9 billion in 2015 and 1.6 billion devices in 2014.
Mamienko, Sergey   +2 more
core  

Non-defensible middle ground for experimental realism: Why we are justified to believe in colored quarks [PDF]

open access: yes, 2004
Experimental realism aims at striking a middle ground between scientific realism and anti-realism, between the success of experimental physics it would explain and the realism about scientific theories it would supplant. This middle ground reinstates the
Massimi, M
core   +1 more source

Home - About - Disclaimer - Privacy