Results 161 to 170 of about 38,625 (211)
Evidence for Photoinduced Polaron Generation in a High Persistence Length Low Bandgap Conjugated Polymer in Solution. [PDF]
Azzouzi M +16 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Journal of Analytical Psychology, 2000
This paper examines the possible psychological implications of two adaptations of the myth of Orpheus and Eurydice, both of which were completed in 1997. The first is by a man: ‘Deconstructing Harry’, a film by Woody Allen. The second is by a woman: ‘Eurydice in the Underworld’, a short story written by Kathy Acker in the last year of her life.The ...
exaly +3 more sources
This paper examines the possible psychological implications of two adaptations of the myth of Orpheus and Eurydice, both of which were completed in 1997. The first is by a man: ‘Deconstructing Harry’, a film by Woody Allen. The second is by a woman: ‘Eurydice in the Underworld’, a short story written by Kathy Acker in the last year of her life.The ...
exaly +3 more sources
Onthophagus orpheus subsp. orpheus orpheus (Panzer 1794
2020Published as part of Freese, Edwin L., Veal, Doug A. & Lago, Paul K., 2020, The Scarabaeoidea (Coleoptera) of Iowa: An annotated checklist, pp.
Freese, Edwin L. +2 more
openaire +1 more source
Theretra orpheus subsp. orpheus
2020Published as part of Bąkowski, Marek, László, Gyula M. & Takano, Hitoshi, 2020, A contribution to the knowledge of the Sphingidae fauna of Mozambique, pp.
Bąkowski, Marek +2 more
openaire +1 more source
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
Recent studies have revealed that control programs running on embedded devices suffer from both control-oriented attacks (e.g., code-injection or code-reuse attacks) and data-oriented attacks (e.g., non-control data attacks). Unfortunately, existing detection mechanisms are insufficient to detect runtime data-oriented exploits, due to the lack of ...
Long Cheng +2 more
+4 more sources
Recent studies have revealed that control programs running on embedded devices suffer from both control-oriented attacks (e.g., code-injection or code-reuse attacks) and data-oriented attacks (e.g., non-control data attacks). Unfortunately, existing detection mechanisms are insufficient to detect runtime data-oriented exploits, due to the lack of ...
Long Cheng +2 more
+4 more sources
Bulletins et Mémoires de la Société d'anthropologie de Paris, 1910
Lejeune Charles. Orpheus. In: Bulletins et Mémoires de la Société d'anthropologie de Paris, VI° Série. Tome 1, 1910. pp. 324-332.
openaire +2 more sources
Lejeune Charles. Orpheus. In: Bulletins et Mémoires de la Société d'anthropologie de Paris, VI° Série. Tome 1, 1910. pp. 324-332.
openaire +2 more sources
1998
Abstract The songs that Orpheus sang brought creatures round him, All beasts, all birds, all stones held in their spell. But look! There on a hill that overlooked the plain, A crowd of raging women stood, their naked breasts Scarce covered by strips of fur. They gazed at Orpheus Still singing, his frail lyre in one hand.
openaire +1 more source
Abstract The songs that Orpheus sang brought creatures round him, All beasts, all birds, all stones held in their spell. But look! There on a hill that overlooked the plain, A crowd of raging women stood, their naked breasts Scarce covered by strips of fur. They gazed at Orpheus Still singing, his frail lyre in one hand.
openaire +1 more source

