Auswahl der wissenschaftlichen Literatur zum Thema „Truant (Boat)“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Truant (Boat)" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Truant (Boat)"

1

Szurlej*, Christina. „Free to Learn? Education in Australia’s Offshore Immigration Detention Centres“. Articles, 02.03.2018, 37–81. http://dx.doi.org/10.7202/1043658ar.

Der volle Inhalt der Quelle
Annotation:
Children seeking asylum are among the most vulnerable groups in the world. Arriving in a country of refuge should be synonymous with safety; this is not so in Australia. Unaccompanied children arriving by boat are automatically transferred to and detained in the Regional Processing Centre on the Republic of Nauru with no one to advocate on their behalf of their rights and best interests, including their right to an adequate education. Trapped on the small island and uncertain of their futures, children overwhelmingly expressed despair and helplessness, many turning to self-harm. In 2015, the Australian government awarded the contract for education to Broadspectrum, formerly known as Transfield Services Ltd. – a company implicated in the abuse and neglect of children. Since then, truancy rates have increased due to fears for safety, poor structural conditions in schools, and lack of qualified teachers. Failing to provide access to education thwarts the life chances of youth who are already severely disadvantaged and contravenes Australia’s international human rights obligations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Reale, Michelle. „"We Never Thought It Would Be Like This": Refugees' Experiences in Sicily“. Qualitative Report, 20.01.2015. http://dx.doi.org/10.46743/2160-3715/2015.1823.

Der volle Inhalt der Quelle
Annotation:
The arrival of refugees by boat to Sicily is not, perhaps, significant in numbers, but from a humanitarian point of view it is a crisis in the truest sense of the word. Refugees that arrive in port cities are more susceptible to trafficking due to their extra vulnerability and impaired emotional and physical states. The three main preoccupations refugees are: the arduous and often deadly journey, their treatment upon arrival, and rebuilding their lives in a society that does not want them. They often wonder if what they encounter in Sicily is in some ways worse than the place they left. These refugees are both from refugee camps and refugee centers where I spent time and engaged the, predominantly men, in small conversation(s) that led to in-depth interviewing. These poems represent the journey not as a choice, but a destiny of sorts. Poetic inquiry allows me to represent my data in a variety of ways, and to avoid trying to say everything all at once in any one particular piece. These poems show the refugees’ social, mental and physical battles upon arrival. My intention is to pluck them from the masses and let their humanity and their particular experiences shine forth.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Truant (Boat)"

1

Stephens, Scott McDonald. „An Urban Camp for Boat Building“. Thesis, Virginia Tech, 2004. http://hdl.handle.net/10919/9886.

Der volle Inhalt der Quelle
Annotation:
At the age of eighteen, when I was approaching the end of my apprenticeship as a cabinetmaker, I made my first self designed piece of furniture. The master cabinetmaker or the client determined the form of most of the furniture made in our shop, and I seldom liked it. I did not even like the wood we used for the best pieces: walnut. I chose light colored ash for my bed and cupboard, and I made them so they looked good on all sides, with the same wood and the same careful work back and front. I disregarded the usual practice of expanding less time and care on the back because no one ever sees it anyway. At long last I was able to round off the edges only slightly without being corrected, running the sandpaper swiftly and lightly over the edges to soften their sharpness without losing the elegance and fineness of the lines. I barely touched the corners where the three edges met. I fitted the door of the cupboard into the frame at the front with a maximum of precision so that it closed almost hermetically, with a gentle frictional resistance and a barely audible sound of escaping air. It felt good working on this cupboard. Making the precisely fitting joints and exact shapes to form a whole, a complete object that corresponds to my inner vision, triggering in me a sense of intense concentration, and the finished piece of furniture added freshness to my environment. Peter Zumthor Thinking Architecture
Master of Architecture
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Nouri, Divina. „Boat insurance from the customer’s perspective : - A study on what aspects private policyholders value most in Swedish insurance companies“. Thesis, Linnéuniversitetet, Institutionen för marknadsföring (MF), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45500.

Der volle Inhalt der Quelle
Annotation:
People play a major role in the marketing of services, due to the fact services are intangible, and customers look for ways to determine the quality of services. Since services differ from physical goods, service providers need to understand how they affect their organizations. Furthermore, the criterion for satisfaction is different and the customer participates in the process, hence the interest to study this more thoroughly.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Al-Galby, Mohamed, und Madani Arezou. „Hardware Root of Trust for Linux Based Edge Gateway“. Thesis, Högskolan Kristianstad, Fakulteten för naturvetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-18846.

Der volle Inhalt der Quelle
Annotation:
Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to various threats and cyber-attacks from the internet. These attacks form a considerable risk targeting the privacy and confidentiality of IoT devices throughout their gateways. Many researches and studies have been conducted to alleviate such a problem. One of the solutions can be achieved by building a root of trust based on a hardware module such as Trusted Platform Module (TPM) or software like Trusted Execution Environment (TEE). In this work, we provide a solution to the problem by enabling Hardware Root of Trust (HRoT) using TPM on a product from HMS Industrial Network AB known as GWen board, a Linux-based embedded system, used as gateway to connect IoT devices. We describe a method that uses the processor of the GWen (i.e. Zynq-7020 FPGA SoC) to enable secure boot. Besides, we provide a method to enable the TPM chip mounted on the GWen (i.e. SLB 9670 TPM 2.0) using TPM Software Stack TSS 2.0. We demonstrated, in detail, various use-cases using the TPM on GWen including cryptographic keys generation, secure key storage and key usage for different cryptographic operations. Furthermore, we conducted an analysis to the adopted solution by inspecting the latency of TPM commands on the GWen gateway. According to the high restrictions of TPM 2.0 specifications and based on our results, adding the TPM 2.0 to the IoT gateway GWen will enhance the security of its Linux distribution and will makes it possible to securely identify and authenticate the gateway on the network based on its secret keys that are stored securely inside its TPM.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Helgsten, Möller Mira, und Jessica Samuelsson. „'Långt bort, men ändå så nära' : En kvalitativ studie om det virtuella ledarskapet“. Thesis, Linnéuniversitetet, Institutionen för organisation och entreprenörskap (OE), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-105589.

Der volle Inhalt der Quelle
Annotation:
Purpose: The purpose of the study is to make a survey of virtual leadership. Theresults are expected to serve as a tool for leaders that switch into virtualleadership.Method: A qualitative study with a deductive method approach. The primarysources of data collection are produced through semi-structuredinterviews.Conclusion: The study has resulted in that in order to achieve successful virtualleadership, the virtual distance must be reduced, that is, the feeling that weare separated from each other. To reduce a perceived virtual distance,functional tools such as communication and division of responsibilities arerequired. Through these tools, an increased trust and belonging will beachieved, which reduces the virtual distance. Based on the situation andthe individual, the collaboration between the various tools has not alwaysbeen important, but instead finding a balance where the leader becomesaware of what is most applicable.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Markanovic, Michel, und Simeon Persson. „Trusted memory acquisition using UEFI“. Thesis, Blekinge Tekniska Högskola, Institutionen för kreativa teknologier, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3582.

Der volle Inhalt der Quelle
Annotation:
Context. For computer forensic investigations, the necessity of unmodified data content is of vital essence. The solution presented in this paper is based on a trusted chain of execution, that ensures that only authorized software can run. In the study, the proposed application operates in an UEFI environment where it has a direct access to physical memory, which can be extracted and stored on a secondary storage medium for further analysis. Objectives. The aim is to perform this task while being sheltered from influence from a potentially contaminated operating system. Methods. By identifying key components and establishing the foundation for a trusted environment where the memory imaging tool can, unhindered, operate and produce a reliable result Results. Three distinct states where trust can be determined has been identified and a method for entering and traversing them is presented. Conclusions. Tools that does not follow the trusted model might be subjected to subversion, thus they might be considered inadequate when performing memory extraction for forensic purposes.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Filho, Joaquim José de Barros Dias. „Princípio e cláusula geral da boa-fé objetiva e suas aplicações no sistema processual civil brasileiro“. Universidade Católica de Pernambuco, 2011. http://www.unicap.br/tede//tde_busca/arquivo.php?codArquivo=591.

Der volle Inhalt der Quelle
Annotation:
A presente pesquisa aborda as alterações ocorridas no modo sobre o qual se desenvolve o processo civil brasileiro, na perspectiva de superar os estigmas de uma jurisdição omissa e recheada de concepções privatistas e enveredar pelo caminho que se orienta por uma concepção de ser o processo um mecanismo apto a dar mais efetividade ao direito e à promoção da justiça, quando realizado em sintonia com os valores constitucionais. Trabalha-se sob o paradigma da superação da visão individualista do direito processual e da elevação de sua expressão social, atento às disposições do Estado Constitucional, a partir do marco teórico do formalismovalorativo, a ser realizado por meio de uma legislação menos casuística e atrelada aos princípios fundamentais, que permitem a construção de um processo cooperativo, desenvolvido a partir do princípio do contraditório e da observância a padrões de boa-fé estabelecidos objetivamente
Sem Abstract
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Dias, Filho Joaquim José de Barros. „Princípio e cláusula geral da boa-fé objetiva e suas aplicações no sistema processual civil brasileiro“. Universidade Católica de Pernambuco, 2011. http://tede2.unicap.br:8080/handle/tede/469.

Der volle Inhalt der Quelle
Annotation:
Made available in DSpace on 2017-06-01T18:18:09Z (GMT). No. of bitstreams: 1 dicertacao_joaquim_jose.pdf: 970043 bytes, checksum: e40a5131fe40e22d4611350b80746f88 (MD5) Previous issue date: 2011-05-18
Sem Abstract
A presente pesquisa aborda as alterações ocorridas no modo sobre o qual se desenvolve o processo civil brasileiro, na perspectiva de superar os estigmas de uma jurisdição omissa e recheada de concepções privatistas e enveredar pelo caminho que se orienta por uma concepção de ser o processo um mecanismo apto a dar mais efetividade ao direito e à promoção da justiça, quando realizado em sintonia com os valores constitucionais. Trabalha-se sob o paradigma da superação da visão individualista do direito processual e da elevação de sua expressão social, atento às disposições do Estado Constitucional, a partir do marco teórico do formalismovalorativo, a ser realizado por meio de uma legislação menos casuística e atrelada aos princípios fundamentais, que permitem a construção de um processo cooperativo, desenvolvido a partir do princípio do contraditório e da observância a padrões de boa-fé estabelecidos objetivamente
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Paula, Luiza Checchia Stuart Cunha de. „Suppressio e surrectio: natureza, efeitos, aplicabilidade e análise comparativa com figuras jurídicas correlatas“. Pontifícia Universidade Católica de São Paulo, 2015. https://tede2.pucsp.br/handle/handle/6693.

Der volle Inhalt der Quelle
Annotation:
Made available in DSpace on 2016-04-26T20:23:28Z (GMT). No. of bitstreams: 1 Luiza Checchia Stuart Cunha de Paula.pdf: 1173260 bytes, checksum: cd16a38a9525ac6e116854c97c357b49 (MD5) Previous issue date: 2015-02-11
The paper analyzes the institutes of surrectio and suppressio, differentiating them from related figures, demonstrating its practical applicability and discussing questions on the topic. First of all, it analyzes the principles of good faith and trust, whose understanding it is deemed essential to the understanding of the topic. Examines the objective good faith focused on sealing the contradictory behavior, and in the famous theory of proper actions. Traces a historical context of the suppression of contradictory behavior, showing the evolution of the need to protect trust as the foundation of existence of a legal relationship. Studies the origin of the concepts of suppressio and surrectio, conceptualizes institutes and characterized their assumptions of existence and of the appropriateness of its assumptions. Discusses the concept and the applicability of other figures arising from the principle that prohibits the contradictory behavior and their chances of appropriateness, bringing its implementation in doctrine and jurisprudence. Studies the effects of suppressio and surrectio and the distinction of the practical application in relation to prescription, estoppel, novation and similar institutes. Shows the current scenario of the use of these figures by the operators of Brazilian law, as well as other institutes, based on analysis of relevant judgments by Brazilian Courts
O trabalho analisa os institutos da surrectio e suppressio diferenciando-os de figuras correlatas, demonstrando sua aplicabilidade prática e discutindo questionamentos sobre o tema. Aborda de início os princípios da boa-fé e da confiança, cujo entendimento se julga essencial para a compreensão do tema. Examina a boa-fé objetiva com foco na vedação ao comportamento contraditório e na teoria dos atos próprios. Traça um contexto histórico da boa-fé, mostrando a evolução da necessidade de proteção à confiança como fundamento de existência da relação jurídica. Estuda a origem dos conceitos da suppressio e da surrectio, conceitua os institutos e caracteriza seus pressupostos de existência e suas hipóteses de cabimento. Discute o conceito e a aplicabilidade de outras figuras decorrentes do princípio que veda o comportamento contraditório e suas hipóteses de cabimento, trazendo sua previsão e aplicação na doutrina e jurisprudência. Trata dos efeitos da suppressio e da surrectio com base na distinção de aplicação prática em relação aos institutos da prescrição, decadência, preclusão lógica, novação e renúncia tácita. Mostra o atual cenário da utilização de referidas figuras pelos operadores do direito brasileiro, assim como dos demais institutos mencionados, com base em análise de acórdãos relevantes prolatados por nossos Tribunais
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Aguirre, João Ricardo Brandão. „Responsabilidade por informações, conselhos ou recomendações nas relações entre particulares“. Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/2/2131/tde-02082011-115409/.

Der volle Inhalt der Quelle
Annotation:
A evolução das relações sociais, o acelerado avanço tecnológico e a dinâmica das relações comerciais fizeram com que o conhecimento e a informação se tornassem bens de inegável valor em um mundo globalizado e em constante transformação. Como conseqüência, a informação constitui instrumento essencial para o desenvolvimento das relações humanas, e sua transmissão pauta-se, em regra, pela confiança depositada nos diversos interlocutores. No entanto a troca de informações pode acarretar a quebra dessa confiança, causando danos à pessoa ou ao patrimônio e dando origem à obrigação de repará-los. O presente trabalho, desenvolvido a partir de compilação doutrinária e jurisprudencial, objetiva proceder à análise e discussão da responsabilidade daqueles que dão informações, conselhos ou recomendações a outrem, em especial no que tange às relações entre particulares. O exercício potencialmente danoso do dever de informar, a negligente transmissão de um parecer ou de um simples esclarecimento e os prejuízos daí decorrentes justificam o estudo mais detalhado deste tema. Assim, pretende-se discorrer sobre os fundamentos do dever de informar, de dar conselhos ou recomendações, tomando-se por base a ordem de valores de nosso ordenamento, alicerce necessário para o desenvolvimento das relações pessoais e fonte de um dever ético de conduta, a fim de demonstrar a existência de uma responsabilidade pela quebra da confiança depositada no sistema jurídico brasileiro, cuja violação gera a obrigação de reparação dos danos que dela decorram. Sobre essa base valorativa, nosso trabalho objetiva proceder à análise da responsabilidade pelos danos causados nas relações entre particulares, em virtude de conselhos, recomendações ou informações, seja na fase que antecede a formação do contrato, seja na fase de sua conclusão e execução ou até mesmo posteriormente à sua extinção.
The development of social relationships, the swift technological advancements, and the dynamics of business relations have turned knowledge and information into invaluable assets in an ever changing, globalized world. As a result, information has become a fundamental tool in the development of human relations. Disclosure of information is currently subject to the mutual reliability exercised by the several actors involved in the process. However, exchanging information may lead to a failure in complying with such reliability, which is likely to cause ultimate damage to persons or assets and therefore result in the obligation to repair. This paper was prepared on the basis of data gathered from case law and legal rules, and aims to review and discuss the liability assigned to those who provide information, counseling and recommendations to third parties, particularly within the framework of private parties. The reasons for a more detailed approach to this issue lie on the potentially damaging nature of the obligation to inform and the damage that is likely to result from the reckless rendering of either an opinion or more specific information. This paper will approach the fundamentals of the obligation to render information, counseling or recommendations on the basis of the Brazilian legal system, which is not only a pillar of personal relations development, but also a source for ethical conduct obligation. To a larger extent, it aims to provide evidence that liability stems from relying on the Brazilian legal system, and that failure to comply with said system will lead into the obligation of repairing the damage incurred. Based on these values, this paper will further review the liability derived from providing counseling, recommendations or information within the scope of private parties relationships. This applies to the initial stages of an agreement as well as the termination and settlement thereof and the procedures following thereafter.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Sperb, Gabriela Steffens. „A relação de emprego sob uma perspectiva comunitária: um contrato existencial, relacional e fraterno pautado pela boa-fé“. reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/148779.

Der volle Inhalt der Quelle
Annotation:
A presente dissertação se propõe a fazer uma análise do contrato de trabalho atual e de como a crise da pós-modernidade e os modos de produção adotados pela sociedade pós-industrial o afetaram. Será realizada uma revisão histórica do contrato de trabalho, bem como, uma investigação das teorias acerca de sua natureza jurídica, dedicando-se especial atenção à teoria comunitário-pessoal da relação de trabalho. O contrato de trabalho e suas características serão objeto de estudo, com especial atenção às críticas atuais ao instituto, a partir das quais será realizada uma comparação entre ele e os contratos civilistas e consumeristas. Analisadas as particularidades dos chamados contratos pós-modernos e a proposta de reconstrução dogmática elaborada por Maria do Rosário Palma Ramalho, será sugerida uma configuração diferente do contrato de trabalho clássico apoiada na boa-fé e a partir das concepções existencial, relacional e fraterna do contrato. A aplicação da boa-fé, sob a ótica da função social, será estudada como forma de viabilizar a noção comunitária do vínculo laboral. Analisar-se-á o conceito e a aplicabilidade das categorias contratuais existenciais e relacionais à relação de trabalho, destacando-se a possibilidade de agregá-las às características clássicas do contrato laboral. A fraternidade será estudada como elemento indispensável à concepção comunitária das relações de trabalho.
This dissertation aims make an analysis of the current labor agreement and how it is affected by the post-modern crisis and the production methods adopted by the post-industrial society. A historical review of the employment contract will be carried out and an investigation of the theories about its legal nature, devoting particular attention to community-personal theory of the employment relationship. The employment contract and its characteristics will be studied, with special attention to the current criticism of the institute, from which will be compared to civil law contract and consumer. Analyzed the characteristics of so-called postmodern contracts and the proposed dogmatic reconstruction drafted by Maria do Rosário Palma Ramalho, will be a suggested different configuration of the standard employment contract with emphasis on good faith and from the existential concepts, relational and fraternal contract. The application of good faith from the perspective of social function, will be studied as a way to enable the community concept of employment. It will analyze the concept and applicability of existential and relational categories contractual employment relationship, especially the ability to aggregate them to the classic characteristics of the labor contract. It will examine the fraternity as an essential element to the community conception of labor relations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Truant (Boat)"

1

McGee, Rick. Eleven chickens in a boat: A story of faith, fear, and feathers! Hazelwood, MO: WAP Children, an imprint of Word Aflame Press, 2013.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Ortberg, John. If you want to walk on water, you've got to get out of the boat. Philadelphia: Running Press, 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

If you want to walk on water, you've got to get out of the boat. Grand Rapids, Mich: Zondervan Pub. House, 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

If you want to walk on water, you've got to get out of the boat. Grand Rapids, Mich: Zondervan Pub. House, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Ortberg, John. If you want to walk on water, you've got to get out of the boat. Waterville, ME: Thorndike Press, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

If You Want to Walk on Water, You've Got to Get Out of the Boat. Grand Rapids: Zondervan, 2004.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

If you want to walk on water, you've got to get out of the boat. Grand Rapids, Mich: Zondervan, 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

If you want to walk on water, you've got to get out of the boat. Waterville, Me: Walker Large Print, 2003.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Office, General Accounting. Boating and fishing: Administration of the Wallop-Breaux Trust Fund : briefing report to congressional requesters. Washington, D.C: The Office, 1988.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Canada. Bill: An act to amend the Fisheries Act, and to prohibit the wanton destruction of small fish. Ottawa: Hunter, Rose, 2001.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Mehr Quellen

Buchteile zum Thema "Truant (Boat)"

1

Syed, Rehan, und Moe Thandar Wynn. „How to Trust a Bot: An RPA User Perspective“. In Lecture Notes in Business Information Processing, 147–60. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58779-6_10.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Gazza, F., M. Botti, L. Ragionieri, C. Sorteni, D. Russo, P. Clavenzani, R. Chiocchetti, L. Bo Minelli und R. Panu. „Distribution Pattern and Chemical Coding of Sympathetic Trunk Ganglia Neurons Supplying the Boar Urinary Bladder Trigone“. In Trends in Veterinary Sciences, 27–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36488-4_5.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

„70. Tree Trunk for a Boat“. In A Flowering Tree, 191–93. University of California Press, 1997. http://dx.doi.org/10.1525/9780520311459-071.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Dickens, Charles. „Chapter XI“. In Great Expectations. Oxford University Press, 2008. http://dx.doi.org/10.1093/owc/9780199219766.003.0034.

Der volle Inhalt der Quelle
Annotation:
After well considering the matter while I was dressing at the Blue Boar in the morning, I resolved to tell my guardian that I doubted Orlick’s being the right sort of man to fill a post of trust at Miss Havisham’s. “Why, of course...
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Kipling, Rudyard. „The Elephant’S Child“. In Just So Stories for Little Children. Oxford University Press, 2009. http://dx.doi.org/10.1093/owc/9780199538607.003.0006.

Der volle Inhalt der Quelle
Annotation:
N the High and Far-Off Times the Elephant, O Best Beloved, had no trunk. He had only a blackish, bulgy nose, as big as a boot, that he could wriggle about from side to side; but he couldn’t pick up things with it. But...
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Raitz, Karl. „Connections“. In Making Bourbon, 191–219. University Press of Kentucky, 2020. http://dx.doi.org/10.5810/kentucky/9780813178752.003.0011.

Der volle Inhalt der Quelle
Annotation:
Kentucky’s early farmers and distillers were shipping products to New Orleans by way of the Ohio and Mississippi Rivers by the late 1780s. River navigation was influenced by access, channel obstructions, cold weather, and water levels; seasonal dry periods and ice-covered streams curtailed shipping. Steam-powered boats enabled two-way traffic on trunk streams. Overland roads were mere tracks prior to the turnpike era of “built roads,” which began in the 1830s and lasted until the 1890s. Some distillers obtained state charters to build turnpikes that linked their works to trunk roads, rivers, or railroads. By the 1850s, railroads reliably moved goods between the largest cities and productive hinterlands. As the railroads extended new branch lines across the countryside and through cities, distillers often relocated their works to rail-side sites.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Rodrigues, Dário de Oliveira. „Marketing-Mix Metamorphosis and New Trusted Business Practices“. In Competitive Drivers for Improving Future Business Performance, 46–66. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-1843-4.ch004.

Der volle Inhalt der Quelle
Annotation:
This chapter discusses the impact on the marketing-mix due to the confluence of the internet of things and the internet of value which seems to be made possible by the blockchain technology. This “perfect storm” induces a vortex of reliability and business trust between people (“peer-to-peer”) and machines (“bot-to-bot”), without the traditional need of third parties to ensure confidence in a negotiation. This implies innovative business practices and self-executing contracts that will take place in a more decentralized and trustworthy environment, speeding up the metamorphosis of the four marketing-mix elements in such a way that marketers will have to deal with a “product” that is always in a “beta-version”; a dynamic “price” that initially has to be free; an atomized “promotion” of reliable messages found by costumers (not the opposite); and a new virtual secure “place,” which is made possible due to augmented reality and blockchain.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Chauvin, John, Ray Duran, Stanley Ng, Thomas Burke, Kenneth Barton, Nicholas MacKinnon, Kouhyar Tavakolian, Alireza Akhbardeh und Fartash Vasefi. „Advanced Optical Technologies in Food Quality and Waste Management“. In Innovation in the Food Sector Through the Valorization of Food and Agro-Food By-Products. IntechOpen, 2021. http://dx.doi.org/10.5772/intechopen.97624.

Der volle Inhalt der Quelle
Annotation:
Food waste is a global problem caused in large part by premature food spoilage. Seafood is especially prone to food waste because it spoils easily. Of the annual 4.7 billion pounds of seafood destined for U.S. markets between 2009 and 2013, 40 to 47 percent ended up as waste. This problem is due in large part to a lack of available technologies to enable rapid, accurate, and reliable valorization of food products from boat or farm to table. Fortunately, recent advancements in spectral sensing technologies and spectroscopic analyses show promise for addressing this problem. Not only could these advancements help to solve hunger issues in impoverished regions of the globe, but they could also benefit the average consumer by enabling intelligent pricing of food products based on projected shelf life. Additional technologies that enforce trust and compliance (e.g., blockchain) could further serve to prevent food fraud by maintaining records of spoilage conditions and other quality validation at all points along the food supply chain and provide improved transparency as regards contract performance and attribution of liability. In this chapter we discuss technologies that have enabled the development of hand-held spectroscopic devices for detecting food spoilage. We also discuss some of the analytical methods used to classify and quantify spoilage based on spectral measurements.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Shibasaki, Hiroshi, Mark Hallett, Kailash P. Bhatia, Stephen G. Reich und Bettina Balint. „Dyskinesia, Motor Stereotypies, and Tics“. In Involuntary Movements, 137–54. Oxford University Press, 2020. http://dx.doi.org/10.1093/med/9780190865047.003.0006.

Der volle Inhalt der Quelle
Annotation:
Dyskinesia is characterized by complex, irregular involuntary movements involving lips, tongue, extremities, and/or trunk. The term “dyskinesia” is often used to encompass complex involuntary movements that do not fit into another category of involuntary movements. Focal dyskinesia is commonly seen in the lips and tongue (orolingual dyskinesia or oral dyskinesia). Drug side effects are the most common cause of generalized dyskinesia, usually those that influence dopamine such as L-dopa and neuroleptics (drug-induced dyskinesia, tardive dyskinesia). Motor stereotypies are repetitive occurrences of the same movements; movements commonly encountered in this condition range from simple movements like shaking arms and nodding to complex movements. Motor stereotypies are commonly observed in children with Asperger syndrome, Rett syndrome and other automatisms, and mental retardation. In adults, stereotyped movements are seen in cases of severe infectious encephalitis, autoimmune encephalitis (e.g., limbic encephalitis), cerebrovascular diseases involving the frontal lobe, and neurodegenerative diseases like frontotemporal lobar degeneration. Tics are irregular, typically brisk movements ranging from shock-like simple movements resembling myoclonus (simple tic) to complex movements (complex tic). Patients with tics tend to repeat certain movements like blinking or grimacing, but in the patients with Gilles de la Tourette syndrome, tics appear as a variety of movements including vocalization (vocal tic). These patients can stop the movements for several seconds, but it is often followed by rebound; they often feel an urge to move before a bout of tics and feel release after the bout.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

„Results and Discussions“. In Detection and Mitigation of Insider Attacks in a Cloud Infrastructure, 83–90. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7924-3.ch006.

Der volle Inhalt der Quelle
Annotation:
This chapter describes the proof-of-concept of the proposed protocol architecture. The eXtensible modular hypervisor framework has been utilized to build the TrustVisor hypervisor along with the core modules: cryptography operations, TEE, and TPM emulator, which contains TPM library function to make a secure communication with TPM hardware. The constructed hypervisor has been placed in the cloud server grub entry to make a choice of hypervisor. To ensure the trust worthiness of cloud platform, a remote attestation concept is used along with the most popular and widely used method called integrity measurement architecture (IMA). Remote attestation uses IMA. It works based on binary attestation concept. After configuring IMA, it calculates and extends the hashes of all components while boot process into their respective PCRs. To ensure the remote attestation with privacy preserving of NC, the authors used attestation identity key (AIK) for signing hashes of PCRs while performing quote operation. They used TPM emulator for communication with TPM device using TPM driver.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Truant (Boat)"

1

Pavur, James, Martin Strohmeier, Vincent Lenders und Ivan Martinovic. „In the Same Boat: On Small Satellites, Big Rockets, and Cyber Trust“. In 2021 13th International Conference on Cyber Conflict (CyCon). IEEE, 2021. http://dx.doi.org/10.23919/cycon51939.2021.9468300.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Pocklassery, G., W. Che, F. Saqib, M. Areno und J. Plusquellic. „Self-authenticating secure boot for FPGAs“. In 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2018. http://dx.doi.org/10.1109/hst.2018.8383919.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Khalid, Obaid, Carsten Rolfes und Andreas Ibing. „On implementing trusted boot for embedded systems“. In 2013 IEEE International Symposium on Hardware-Oriented Security and Trust (HOST). IEEE, 2013. http://dx.doi.org/10.1109/hst.2013.6581569.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Wang, Tian, Xiaoxin Cui, Yewen Ni, Dunshan Yu, Xiaole Cui und Gang Qu. „A practical cold boot attack on RSA private keys“. In 2017 Asian Hardware Oriented Security and Trust Symposium (AsianHOST). IEEE, 2017. http://dx.doi.org/10.1109/asianhost.2017.8353995.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Suzaki, Kuniyasu, Kengo Iijima, Toshiki Yagi und Nguyen Anh Quynh. „Trusted Boot and Platform Trust Services on 1CD Linux“. In 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference (APTC). IEEE, 2008. http://dx.doi.org/10.1109/aptc.2008.23.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

McMahan, Joseph, Weilong Cui, Liang Xia, Jeff Heckey, Frederic T. Chong und Timothy Sherwood. „Challenging on-chip SRAM security with boot-state statistics“. In 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2017. http://dx.doi.org/10.1109/hst.2017.7951806.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Streit, Franz-Josef, Florian Fritz, Andreas Becher, Stefan Wildermann, Stefan Werner, Martin Schmidt-Korth, Michael Pschyklenk und Jurgen Teich. „Secure Boot from Non-Volatile Memory for Programmable SoC Architectures“. In 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST). IEEE, 2020. http://dx.doi.org/10.1109/host45689.2020.9300126.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Shellshear, Evan, Johan S. Carlson und Robert Bohlin. „A Combinatorial Packing Algorithm and Standard Trunk Geometry for ISO Luggage Packing“. In ASME 2012 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2012. http://dx.doi.org/10.1115/detc2012-70778.

Der volle Inhalt der Quelle
Annotation:
Automated packing algorithms for luggage compartments in automobiles are of great interest. The difficulty of automatically computing the volume of a mesh representation of a boot according to the ISO 3832 standard restricts the design of vehicles required to meet minimal trunk volume specifications and also increases the cost of physical and virtual verification of the original design specifications. In our paper we present a new heuristic combinatorial packing algorithm for the ISO luggage packing standard. The algorithm presents numerous advantages over previous algorithms in terms of its simplicity and speed as well as producing high density of packed objects. The algorithm also solves the problem of requiring a fixed grid structure to position discrete objects in the boot and can also be used as an additional optimization on existing algorithms. In addition, we also provide the first comparison of state of the art packing algorithms for a simplified trunk geometry and propose a standard trunk geometry to enable future researchers to compare their results with other packing algorithms.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Martinez-Bea, Sergi, Sergio Castillo-Perez und Joaquin Garcia-Alfaro. „Real-time malicious fast-flux detection using DNS and bot related features“. In 2013 Eleventh Annual Conference on Privacy, Security and Trust (PST). IEEE, 2013. http://dx.doi.org/10.1109/pst.2013.6596093.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Yin, Hongfei, Hongjun Dai und Zhiping Jia. „Verification-Based Multi-backup Firmware Architecture, an Assurance of Trusted Boot Process for the Embedded Systems“. In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2011. http://dx.doi.org/10.1109/trustcom.2011.160.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie