Academic literature on the topic 'Attante'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Attante.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Attante"
Hefez, Serge. "Attache-moi." Adolescence 56, no. 2 (2006): 305. http://dx.doi.org/10.3917/ado.056.0305.
Full textRonceray, Sébastien. "Attaque d'images." Vertigo 32, no. 3 (2007): 61. http://dx.doi.org/10.3917/ver.032.0061.
Full textJ.A. "Gesalzene Attacke." CardioVasc 14, no. 4 (September 2014): 22–23. http://dx.doi.org/10.1007/s15027-014-0431-9.
Full textEl-Baradei, Mohamed. "Qui attaque qui ?" SAY N° 3, no. 1 (January 1, 2021): 85–87. http://dx.doi.org/10.3917/say.003.0085.
Full textTestot, Laurent. "L'empire contre-attaque." Sciences Humaines N° 244, no. 1 (January 1, 2013): 8. http://dx.doi.org/10.3917/sh.244.0008.
Full textFox, Dirk. "Die Mifare-Attacke." Datenschutz und Datensicherheit - DuD 32, no. 5 (May 2008): 348–50. http://dx.doi.org/10.1007/s11623-008-0082-z.
Full textGingras, Yves. "L’empirisme contre-attaque." Pour la Science N° 542 – Décembre, no. 12 (November 29, 2022): 22. http://dx.doi.org/10.3917/pls.542.0022.
Full textR, Mathan kumar. "Thavayogam and sivayogam in Thirumanthiram." International Research Journal of Tamil 3, no. 1 (November 16, 2020): 13–23. http://dx.doi.org/10.34256/irjt2112.
Full textArgenton, Cédric. "La prochaine attaque russe." Commentaire Numéro159, no. 3 (2017): 700. http://dx.doi.org/10.3917/comm.159.0700.
Full textBonnaud, Irène, Stany Grelet, Mathieu Potte-Bonneville, and Jeanne Revel. "Le Contre-Empire attaque." Vacarme 13, no. 3 (2000): 4. http://dx.doi.org/10.3917/vaca.013.0004.
Full textDissertations / Theses on the topic "Attante"
Gosse, François. "Attaque de panique et angoisse de séparation." Bordeaux 2, 1990. http://www.theses.fr/1990BOR23056.
Full textChomarat, Nadine. "Attaque enzymatique d'un tissu conjonctif, la peauTexte imprimé." Toulouse, INSA, 1993. http://www.theses.fr/1993ISAT0022.
Full textMASSAT, CATHERINE. "Spasmophilie ou attaque de panique ? contribution a leur etude." Toulouse 3, 1991. http://www.theses.fr/1990TOU31131.
Full textBruneau, Nicolas. "Attaque par canaux auxillaires multivariées, multi-cibles et d'ordre élevé." Thesis, Paris, ENST, 2017. http://www.theses.fr/2017ENST0025/document.
Full textSide Channel Attacks are a classical threat against cryptographic algorithms in embedded systems. They aim at exploiting the physical leakages unintentionally emitted by the devices during the execution of their embedded programs to recover sensitive data. As such attacks represent a real threat against embedded systems different countermeasures have been developed. In thesis we investigate their security in presence of multiple leakages. Indeed there often are in the leakage measurements several variables which can be exploited to mount Side Channel Attacks. In particular we show in this thesis the optimal way to exploit multiple leakages of a unique variable. This dimensionality reduction comes with no loss on the overall exploitable information. Based on this result we investigate further how such dimensionality reduction methodscan be applied in the case of protected implementations. We show that the impact of such methods increases with the security “level” of the implementation. We also investigate how to exploit the leakages of multiplevariables in order to improve the results of Side Channel Analysis. We start by improving the attacks against masking schemes, with a precomputed table recomputation step. Some protections have been developed to protect such schemes. As a consequence we investigate the security provided by these protections. In this context we present results which show that the main parameter to evaluate the security of the masking schemes is not sufficient to estimate the global security of the implementation. Finally we show that in the context of masking scheme with shuffling the optimal attack is not computable. As a consequence we present a truncated version of this attack with a better effectiveness
Steiner, Marion. "Analyse von Netzwerkangriffen : Einsatz von Simulationen zur Steigerung der Awareness /." Saarbrücken : VDM, Müller, 2006. http://deposit.d-nb.de/cgi-bin/dokserv?id=2874012&prov=M&dok_var=1&dok_ext=htm.
Full textSteiner, Marion. "Analyse von Netzwerkangriffen Einsatz von Simulationen zur Steigerung der Awareness." Saarbrücken VDM, Müller, 2003. http://deposit.d-nb.de/cgi-bin/dokserv?id=2874012&prov=M&dok_var=1&dok_ext=htm.
Full textSbresny, Katja. "Hämodynamik cerebraler Gefässe und kognitive Funktionen bei Patienten mit transitorischer ischämischer Attacke." [S.l.] : [s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=968764118.
Full textWioland, Laetitia. "Attaque du système nerveux central par la toxine epsilon de Clostridium perfringens." Strasbourg, 2013. http://www.theses.fr/2013STRAJ128.
Full textRamirez, Lopez Alberto. "Mise en évidence d'une attaque microbienne de dérivés de lignine en anaérobiose." Lille 1, 1987. http://www.theses.fr/1987LIL10083.
Full textRamirez, Lopez Alberto. "Mise en évidence d'une attaque microbienne de dérivés de lignine en anaérobiose." Grenoble 2 : ANRT, 1987. http://catalogue.bnf.fr/ark:/12148/cb376091611.
Full textBooks on the topic "Attante"
L'amour contre toute attante. Abidjan: Adoras, 2004.
Find full textAttaque! Amsterdam: Prometheus, 2007.
Find full textEzequiel, Sánchez Jorge, ed. Attaque 77. Buenos Aires, Argentina: Clarín, 2008.
Find full textL' attaque. Dublin: Mercier, 1998.
Find full textL' attaque. Baile A tha Cliath: Mercier, 1989.
Find full textL' attaque. Cork: Mercier Press, 1998.
Find full textWolf, Klaus-Peter. Karma-Attacke: Roman. München: Scherz, 2001.
Find full text1939-, Capdevila Roser, ed. Alerte! Bébé attaque! [Paris]: Hachette jeunesse, 1993.
Find full text1957-, Odgers Sally, Binette Louise, and Dawson Janine, eds. La patte attaque. Toronto: Editions Scholastic, 2007.
Find full textHeigy, Max. Attaque dans l'espace. Paris: Hatier, 2003.
Find full textBook chapters on the topic "Attante"
Ziegler, Manuel. "Exkurs D: Rasteralgorithmus (Brute-Force-Attacke)." In Web Hacking, 179–91. München: Carl Hanser Verlag GmbH & Co. KG, 2014. http://dx.doi.org/10.3139/9783446441125.014.
Full textHartmann, Jürgen. "Der Behavioralismus - eine Attacke auf die konventionelle Politikwissenschaft." In Wozu politische Theorie?, 163–90. Wiesbaden: VS Verlag für Sozialwissenschaften, 1997. http://dx.doi.org/10.1007/978-3-322-83288-7_8.
Full textSitzer, G. "Die transitorisch-ischämische Attacke und ihre Behandlung durch Nicergolin." In Therapeutische Wirksamkeitsnachweise bei nootropen und vasoaktiven Substanzen, 227–36. Berlin, Heidelberg: Springer Berlin Heidelberg, 1985. http://dx.doi.org/10.1007/978-3-662-10458-3_17.
Full textEsterhammer, Ruth. "Heine und die Folgen Die Platen-Attacke als ein Skandal mit Langzeitwirkung." In Heine-Jahrbuch 2007, 1–25. Stuttgart: J.B. Metzler, 2007. http://dx.doi.org/10.1007/978-3-476-00312-6_1.
Full textDrogan, Dagmar, Christian Gerloff, Karl Heinrich Scholz, and Christian Günster. "Die stationäre Behandlung von Patientinnen und Patienten mit Herzinfarkt und Schlaganfall während der Covid-19-Pandemie." In Krankenhaus-Report 2022, 75–108. Berlin, Heidelberg: Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-662-64685-4_5.
Full text"Attacke f." In Wörterbuch GeoTechnik/Dictionary Geotechnical Engineering, 64. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-33335-4_12778.
Full text"ATTAQUE QUADRILLE." In Strauß-Elementar-Verzeichnis (SEV), 111–12. Hollitzer Verlag, 1992. http://dx.doi.org/10.2307/j.ctvg8p640.27.
Full text"Abbon attaque." In Abbon de Fleury, 161–96. Turnhout: Brepols Publishers, 2004. http://dx.doi.org/10.1484/m.stmh-eb.4.00106.
Full textMoshenska, Joe. "‘Attactu Nullo’." In Feeling Pleasures, 81–108. Oxford University Press, 2014. http://dx.doi.org/10.1093/acprof:oso/9780198712947.003.0004.
Full textSchneede, Uwe M. "Überschärfe und Attacke." In Otto Dix, 28–41. Verlag C.H.BECK oHG, 2019. http://dx.doi.org/10.17104/9783406732249-28.
Full textConference papers on the topic "Attante"
Liang, Hongru, Qian Li, Haozheng Wang, Hang Li, Jin-Mao Wei, and Zhenglu Yang. "AttAE-RL²." In Companion of the The Web Conference 2018. New York, New York, USA: ACM Press, 2018. http://dx.doi.org/10.1145/3184558.3186902.
Full textAvis, R. "A news edit system in an attache case - with Betacam SX." In International Broadcasting Conference (IBC). IEE, 1997. http://dx.doi.org/10.1049/cp:19971336.
Full textZhang, Gege, Qinghua Ma, Licheng Jiao, Fang Liu, and Qigong Sun. "AttAN: Attention Adversarial Networks for 3D Point Cloud Semantic Segmentation." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. California: International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/110.
Full textClavijo, Cristian E., Julie Crockett, and Daniel Maynes. "Analytical Model of Post-Impact Droplet Spreading on a Micro-Patterned Superhydrophobic Surface With Surface Slip." In ASME 2014 4th Joint US-European Fluids Engineering Division Summer Meeting collocated with the ASME 2014 12th International Conference on Nanochannels, Microchannels, and Minichannels. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/fedsm2014-21648.
Full textAroca, S. "La muqueuse péri-implantaire : nécessité esthétique ou fonctionnelle ? Intérêt de l’augmentation de tissus mous peri-implantaires." In 66ème Congrès de la SFCO. Les Ulis, France: EDP Sciences, 2020. http://dx.doi.org/10.1051/sfco/20206601015.
Full textReports on the topic "Attante"
DEPARTMENT OF THE ARMY WASHINGTON DC. Personnel Selection and Classification: Assignment to Army Attache Duty. Fort Belvoir, VA: Defense Technical Information Center, August 2001. http://dx.doi.org/10.21236/ada402429.
Full textHameury, Laurence, and Lina Rossetti. Médiation Équine et Psychotraumatisme : Étude Préliminaire Après une Attaque Terroriste. Peeref, September 2022. http://dx.doi.org/10.54985/peeref.2209p6567471.
Full textDeng, Yingjun, ShengJing Liu, Ming Zhao, Feng Zhao, Jun Guo, and Bin Yan. Diet-induced male infertility in mice models: a systematic review and network meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, May 2022. http://dx.doi.org/10.37766/inplasy2022.5.0116.
Full text