Results 71 to 80 of about 81,045 (237)
Progetto e sviluppo di un verificatore efficiente del bytecode java [PDF]
La tecnologia Java Card costituisce il punto di contatto tra il linguaggio di programmazione Java e l’ambiente operativo di sistemi con un numero limitato di risorse.
Masci, Paolo
core
Becoming monstrous: Beauty norms, body image, and discursive limits on compassion in The Substance
Abstract Aim This study analyses the Hollywood body horror film The Substance to explore how Western beauty culture regulates emotions and bodies. It aims to explore compassion within dominant body image discourses and considers how this impacts dietetic care. Methods Using Foucauldian discourse analysis informed by affect theory, the film was analysed
Phillip Joy
wiley +1 more source
ABSTRACT Guided by the Actor‐Network Theory (ANT) perspective, this study explores user experiences with the perceived agency of algorithmic technology in the context of talent management (TM) decisions. Through a qualitative analysis of 11 client companies utilizing algorithmic TM decision‐making technology provided by an HR tech service firm, we ...
Violetta Khoreva +2 more
wiley +1 more source
The simplicity project: easing the burden of using complex and heterogeneous ICT devices and services [PDF]
As of today, to exploit the variety of different "services", users need to configure each of their devices by using different procedures and need to explicitly select among heterogeneous access technologies and protocols.
, EU FP5 (Funder) +15 more
core
An Empirical Study on Android for Saving Non-shared Data on Public Storage [PDF]
With millions of apps that can be downloaded from official or third-party market, Android has become one of the most popular mobile platforms today. These apps help people in all kinds of ways and thus have access to lots of user's data that in general ...
Diao, Wenrui +4 more
core +4 more sources
An Operational Semantics of the Java Card Firewall [PDF]
This paper presents an operational semantics for a subset of Java Card bytecode, focussing on aspects of the Java Card firewall, method invocation, field access, variable access, shareable objects and contexts. The goal is to provide a precise description of the Java Card firewall using standard tools from operational semantics.
Marc Éluard +2 more
openaire +1 more source
Pseudonyms, Propaganda, and Prints: The Life and Political Caricatures of William Dent, 1782–931
Abstract ‘Dent was probably an amateur and nothing is known of his life’, state Bryant and Heneage. Despite contributing to caricature's ‘golden age’, William Dent remains overlooked compared to contemporaries like James Gillray. Dent's extensive portfolio (1782–93) and rumoured role as a Pittite propagandist have not secured his place in the canon of ...
Callum D. Smith
wiley +1 more source
Memory Forensics of a Java Card Dump [PDF]
Nowadays several papers have shown the ability to dump the EEPROM area of several Java Cards leading to the disclosure of already loaded applet and data structure of the card. Such a reverse engineering process is costly and prone to errors. Currently there are no tools available to help the process.
Lanet, Jean-Louis +6 more
openaire +2 more sources
Demand Estimation with Text and Image Data
ABSTRACT We propose a demand estimation approach that leverages unstructured data to infer substitution patterns. Using pre‐trained deep learning models, we extract embeddings from product images and textual descriptions and incorporate them into a mixed logit demand model.
Giovanni Compiani +2 more
wiley +1 more source
The Outsiders: Principled Withdrawal, Whiteness, and Power in the Los Angeles Food Justice Movement
ABSTRACT This article draws on understandings of whiteness and the misconstrual of South Central Los Angeles to analyze the power dynamics between “outsider” activists and residents of South Central as they worked toward a more equitable food system.
Hanna Garth
wiley +1 more source

