Results 31 to 40 of about 306,585 (324)

Review of "History on the Run: Secrecy, Fugitivity, and Hmong Refugee Epistemologies" by Ma Vang (Duke University Press)

open access: yesLateral, 2022
In "History on the Run: Secrecy, Fugitivity, and Hmong Refugee Epistemologies," Ma Vang deftly answers the question of how one can “recount a history that has systematically been kept secret” by centering Hmong refugees as sources of knowledge and ...
Aline Lo
doaj   +1 more source

Optimal Power Allocation by Imperfect Hardware Analysis in Untrusted Relaying Networks [PDF]

open access: yes, 2017
By taking a variety of realistic hardware imperfections into consideration, we propose an optimal power allocation (OPA) strategy to maximize the instantaneous secrecy rate of a cooperative wireless network comprised of a source, a destination and an ...
Khandaker, Muhammad Ruhul Amin   +5 more
core   +3 more sources

The Bureau and the Realism of Spy Fiction

open access: yesOpen Philosophy, 2022
This article addresses the issue of realism in relationship to contemporary serial fiction. Drawing on The Bureau (Canal+, 2015–2020), it argues that spy TV series are “realistic” not because they correspond to reality but because of their impact on ...
Blistène Pauline
doaj   +1 more source

UAV-Enabled Cooperative Jamming for Improving Secrecy of Ground Wiretap Channel [PDF]

open access: yesIEEE Wireless Communications Letters, 2018
This letter proposes a novel unmanned aerial vehicle (UAV)-enabled mobile jamming scheme to improve the secrecy rate of ground wiretap channel. Specifically, a UAV is employed to transmit jamming signals to combat against eavesdropping.
An Li, Qingqing Wu, Rui Zhang
semanticscholar   +1 more source

Mode selection, caching and physical layer security for fog networks [PDF]

open access: yesBulletin of the Polish Academy of Sciences: Technical Sciences, 2022
Fog networks facilitate ultra-low latency through the use of data availability near the network edge in fog servers. Existing work in fog networks considers the objective of energy efficiency and low latency for internet-of-things (IoT) for resource ...
Rabeea Basir   +4 more
doaj   +1 more source

Secrecy vignettes [PDF]

open access: yes, 2019
Research objective: This chapter helps researchers who want their academic writing to include explicit accounts of the ways in which they navigated secrecy and its ethical dilemmas in their fieldwork. It proposes that one way of including such accounts is by way of ‘secrecy vignettes’.
openaire   +3 more sources

Liens sociaux, secrets et confidences. Le cas des femmes migrantes d’Afrique subsaharienne et séropositives

open access: yesRecherches Sociologiques et Anthropologiques, 2014
Hiv-positive women migrating from sub-Saharan Africa combine vulnerabilities. Based on qualitative research carried out among 30 hiv-positive women, this article proposes to analyse how they integrate themselves into various social spheres (familial ...
Francesca Poglia Mileti   +4 more
doaj   +1 more source

Indiens sur scènes, étrangers captivés ? Mise en spectacle de la culture et secret

open access: yesNuevo mundo - Mundos Nuevos, 2017
This session draws on patrimonialisation cases which depend upon the support of a visual spectacle, either live or on film, and which thus implicitly define culture as a set of visual practices susceptible to observation.
Philippe Erikson   +2 more
doaj   +1 more source

Secrecy in Practice: How Middle Managers Promote Strategic Initiatives behind the Scenes

open access: yesOrganization Studies, 2021
In this study, we focus on secrecy within organizations and examine why and how middle managers use secrecy to explore and promote strategic initiatives.
I. Toegel, O. Levy, Karsten Jonsen
semanticscholar   +1 more source

Knowledge Bases and Representation Learning Towards Bug Triaging

open access: yesMachine Learning and Knowledge Extraction
A large number of bug reports are submitted by users and developers in bug-tracking system every day. It is time-consuming for software maintainers to assign bug reports to appropriate developers for fixing manually.
Qi Wang   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy