Results 81 to 90 of about 355,578 (204)

A synthetic measure of mortality using skeletal data from ancient cemeteries: the d index [PDF]

open access: yes, 2018
Background: Due to the scarcity of written sources in ancient historical periods, and thanks to the development of increasingly sophisticated methods of excavation, recognition, publication, and interpretation, archaeology has played an important role in
Barbiera, Irene   +2 more
core   +2 more sources

Nu vil jeg fortælle Jer mere – Fortællingen om Uglenspeil fra folkebog til roman

open access: yesSjuttonhundratal, 2016
Now I will tell you more – The story of Uglenspeil from the Volksbuch to the Novel. “Nu vil jeg fortælle Jer mere – Fortællingen om Uglenspeil fra folkebog til roman” [Now I will tell you more – The story of Uglenspeil from the Volksbuch to the Novel ...
Simona Zetterberg Gjerlevsen
doaj   +1 more source

How visas shape and make visible the geopolitical architecture of the planet

open access: yes, 2016
The aim of the present study is to provide a picture for geopolitical globalization: the role of all world countries together with their contribution towards globalization is highlighted.
Ausloos, Marcel   +4 more
core   +1 more source

6. John Wyclif\u27s Divine Dominion and the End of the Middle Ages

open access: yes, 1958
John Wyclif (c. 1320-1384) has been called both the last of the schoolmen and the morning star of the Reformation. A native Englishman and a Franciscan, he spent most of his life at the University of Oxford, first as scholar, later as teacher of theology,
Bloom, Robert L.   +6 more
core  

An Irresistible Attraction: Rethinking Romantic Jealousy as a Basis for Sex-Discrimination Claims [PDF]

open access: yes, 2015
Recently, the Iowa Supreme Court concluded that an employer who terminated an employee to allay the concerns of his jealous spouse did not unlawfully discriminate on the basis of sex.
Dahl Rogers, Kristy
core   +1 more source

ESTABLISHED WAYS TO ATTACK EVEN THE BEST ENCRYPTION ALGORITHM [PDF]

open access: yes
Which solution is the best – public key or private key encryption? This question cannot have a very rigorous, logical and definitive answer, so that the matter be forever settled :).
Alexandru Tabusca
core  

El viejo monarca y los nuevos favoritos: los discursos sobre la privanza en el reinado de Felipe II

open access: yesStudia Historica: Historia Moderna, 2009
RESUMEN: Durante el reinado de Felipe II, y especialmente desde comienzos de la década de 1580, se desarrollan una serie de iniciativas por parte del monarca que supondrían la aparición no sólo de nuevas prácticas políticas, sino también la introducción ...
Antonio FEROS
doaj  

Is There an Impact of Household Computer Ownership on Childrens Educational Attainment in Britain? [PDF]

open access: yes
If personal computers (PCs) are used to enhance learning and information gathering across avariety of subjects, then a home computer might reasonably be considered an input in aneducational production function.
John Schmitt, Jonathan Wadsworth
core  

Delincuencia y seguridad pública en Aragón (1766-1768)

open access: yesStudia Historica: Historia Moderna, 2009
Los graves acontecimientos ocurridos en Zaragoza en los primeros días del mes de Abril de 1766, motín del pan conocido con el nombre de sus represores —los Broqueleros— aceleraron la puesta en funcionamiento de las previsiones que el estado del orden ...
José A. ARMILLAS VICENTE
doaj  

Indultos concedidos por la Cámara de Castilla en tiempos de los Austrias

open access: yesStudia Historica: Historia Moderna, 2009
Maquiavelo aconsejaba a los príncipes que se reservaran para sí la disposición de las materias de gracia. Este principio nunca fue olvidado por los reyes castellanos que consideraron el derecho de perdonar como una regalía. A lo largo del Antiguo Régimen
José Luis de las HERAS SANTOS
doaj  

Home - About - Disclaimer - Privacy