Results 61 to 70 of about 120,748 (231)

Adolescentes, exclusión y vulnerabilidades [PDF]

open access: yes, 2012
publishedVersio
Carreteiro, Teresa Cristina
core  

fastbioclim: An R package for creating custom‐time bioclimatic and derived environmental summary variables

open access: yesMethods in Ecology and Evolution, Volume 17, Issue 5, Page 1585-1594, May 2026.
Abstract Bioclimatic variables, widely used in ecological and biogeographical studies, are typically derived from 30‐year averages of monthly data (e.g. 1971–2000). Unfortunately, the use of these long‐term averaged variables often creates a temporal mismatch with the observational data collected, which potentially undermines how environmental ...
Gonzalo E. Pinilla‐Buitrago   +1 more
wiley   +1 more source

Desarrollo de un modelo para calcular el nivel de seguridad en sitios Web, basado en el top 10 de vulnerabilidades más explotadas en 2017 según el marco de referencia OWASP [PDF]

open access: yes, 2018
Trabajo de InvestigaciónEn la actualidad la seguridad de la información es una prioridad para las grandes, medianas y pequeñas empresas, por este motivo se han desarrollado técnicas, marcos de referencia y metodologías para hacer un análisis de ...
Rodríguez-Rodríguez, Rafael Enrique   +1 more
core  

Online Risk Behaviours Among Adolescents: Identifying Areas of Digital Vulnerability

open access: yesChildren &Society, Volume 40, Issue 3, Page 474-488, May 2026.
ABSTRACT As a period during which they undergo important physical, emotional and social changes, adolescence is of great importance for minors. In addition, adolescence is an initial stage in terms of children's use of their own mobile devices and their first access to the internet and social networks, an activity that becomes a generalised habit in ...
Sonia Carcelén‐García   +2 more
wiley   +1 more source

Violência, sofrimento e (re)existências: narrativas de travestis e mulheres trans

open access: yesRevista Estudos Feministas
Pessoas trans são expostas a diferentes formas de violência que geram sofrimento. Trata-se de um fenômeno coletivo e dialético de subjugação/resistência. Entrevistamos 15 mulheres trans residentes na área metropolitana de Salvador-BA.
Macelo Machado de Almeida   +3 more
doaj   +1 more source

Intervención psicosocial en crisis comunitarias: el sostenimiento de las vulnerabilidades [PDF]

open access: yes, 2010
Es fácilmente comprensible la necesidad de abarcar la mayor cantidad de elementos que enriquezcan nuestro marco teórico y ...
Navarrete, Larry
core   +3 more sources

A multi‐network approach to assess how physical templates shape stream fish ecological strategies

open access: yesEcological Solutions and Evidence, Volume 7, Issue 2, April/June 2026.
This multi‐network framework identifies a continuous topological gradient of fish ecological strategies—comprising Dispersal Gateways, Integrated Connectors, and Mass Effect Dominated species—within the dendritic river template. The functional role of stream reaches is scale‐sensitive, particularly at headwater extremes where sites operate as critical ...
Mauricio Cetra, Rodrigo da Silva Almeida
wiley   +1 more source

Security analysis of JXME-Proxyless version [PDF]

open access: yes, 2010
JXME es la especificación de JXTA para dispositivos móviles con J2ME. Hay dos versiones diferentes de la aplicación JXME disponibles, cada una específica para un determinado conjunto de dispositivos, de acuerdo con sus capacidades.
Arnedo Moreno, Joan   +2 more
core  

estar: An R package to measure ecological stability

open access: yesMethods in Ecology and Evolution, Volume 17, Issue 4, Page 1090-1100, April 2026.
Abstract Assessing ecological stability is a key task in biodiversity monitoring and conservation. Quantifying stability is not trivial because its different aspects can be measured with various properties. However, to date, no software enables measuring different stability properties on ecological time‐series data.
Ludmilla Figueiredo   +6 more
wiley   +1 more source

EL ANÁLISIS DE RIESGO EN LA SEGURIDAD DE LA INFORMACIÓN // RISK ANALYSIS ON THE INFORMATION SECURITY

open access: yesPublicaciones en Ciencias y Tecnología, 2010
El propósito de este artículo consiste en ofrecer un conjunto de reflexiones conceptuales sobre la seguridad de la información y específicamente sobre el análisis de riesgos y su importancia en las organizaciones.
Manuel Mújica , Yanney Alvarez
doaj  

Home - About - Disclaimer - Privacy