Academic literature on the topic 'Edition de visage'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Edition de visage.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Edition de visage":

1

Baek, Jiewon. "The Ethics of Uncovering Something Else in Histoire(s) du cinema." Journal of French and Francophone Philosophy 22, no. 1 (September 19, 2014): 40–60. http://dx.doi.org/10.5195/jffp.2014.642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In lieu of an abstract, here is the essay's opening paragraph:Marguerite Duras prefaces the second edition of Le navire night, from which an excerpt is cited above, by explaining that after writing the story of a man named J.M., everything came too late, including the realization of the film version of Le navire night. Once the event has been written and the common night of history been closed up, did she have the right to flash a light into the darkness to go back and see? The only seeing through cinema that was possible, she continues, was to film the failure, the disaster of the film. But how does one film the failure of realizing a film adaptation of a written text, which itself was transcribed from an oral re-telling of a story, which itself was adapted from memory? The event already took place – writing, “this history here” –, leaving cinema to film what never took place, namely, the film itself. As Jean-Luc Godard confirms in a chapter titled Seul le cinéma in Histoire(s) du cinéma, not only in the form of his project as a whole but also more explicitly in one shot that positions two close-up photographs of his face with the sound of Paul Hindemith’s “Funeral Music” and this text: “Faire une description précise de ce qui n’a jamais eu lieu est le travail de l’historien.” Describing the rise of the film Le navire night from its disastrous death, Duras writes: “On a mis la caméra à l’envers et on a filmé ce qui entrait dedans, de la nuit, de l’air, des projecteurs, des routes, des visages aussi.” The camera turned upside-down, or in the other sense, inside-out, Duras films the entrance of the exterior, a sort of a Levinasian visage. The question no longer is one of having the right but of the duty to re-write history, as is insinuated by the reference to “The Critic as Artist” written across one of the photographs mentioned above, which is again a gesture of Godard’s positioning himself as the critic whose role Oscar Wilde defined: “The one duty we owe to history is to rewrite it.”
2

Esnard, Monique. "Les Enfants de la Rue: L'autre visage de la ville - Les enfants de la rue — L'autre visage de la ville, Rapport à la Commission indépendante sur les questions humanitaires internationales présenté par Susanna Agnelli, Berger-Levrault, Collection « Mondes en Devenir », Paris, 1986, 142 pp. Edition anglaise: Street children—A growing urban tragedy, Weidenfeld & Nicolson, London, 1986. A paraître également en arabe, espagnol, indonésien, japonais et serbo-croate." Revue Internationale de la Croix-Rouge 69, no. 764 (April 1987): 240–41. http://dx.doi.org/10.1017/s0035336100091401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hu, Zhenjun, David M. Ng, Takuji Yamada, Chunnuan Chen, Shuichi Kawashima, Joe Mellor, Bolan Linghu, Minoru Kanehisa, Joshua M. Stuart, and Charles DeLisi. "VisANT 3.0: new modules for pathway visualization, editing, prediction and construction." Nucleic Acids Research 35, suppl_2 (July 2007): W625—W632. http://dx.doi.org/10.1093/nar/gkm295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ahrens, Hans-Jürgen. "Das deutsche Modellgesetz für Geistiges Eigentum (GGE) - Wissenschaftlicher und gesetzgeberischer Bedarf auch für die Europäische Union?" European Review of Private Law 22, Issue 6 (December 1, 2014): 943–53. http://dx.doi.org/10.54648/erpl2014068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract: The German Association for the Protection of Intellectual Property Law (GRUR) supported the private scientific project by which a draft Code of Intellectual Property was developed as a model law. Supporting experts from the German Federal Supreme Court, the Federal Patent Court, the German Bar and the German Patent and Trademark Office made inspiring suggestions to the scientists. The core of the code is the forming of a common general part for IP rights. The existing separated German statutes on IP are reproduced in a version adapted to the general part. Additional model rules are made for the employees' creations. The model law can serve as a framework and provide food of thought for the future design of IP legislation of the European Union, e.g., in the field of contractual exploitation of IP rights. The German full edition was published in 2012, an abbreviated English edition in 2013, each by Sellier European law publishers. Resumé: L'association allemande pour la protection du droit de la propriété intellectuelle (GRUR) a soutenu le programme scientifique privé visant à mettre en oeuvre un projet de Code de la propriété intellectuelle qui servirait de loi type. Des spécialistes de la Cour suprême fédérale allemande, de la Cour fédérale pour les brevets, du Barreau allemand et de l'Office allemand des brevets et des marques ont émis des suggestions intéressantes pour les scientifiques. L'essentiel du Code consiste en l'élaboration d'une partie générale commune aux droits de la propriété intellectuelle. Les lois séparées allemandes existant en matière de propriété intellectuelle sont reproduites dans une version adaptée à la partie générale. Des règles types supplémentaires ont été ajoutées pour les créations des employés. La loi type peut servir de cadre et fournir matière à réflexion pour l'élaboration future de la législation sur la propriété intellectuelle de l'Union européenne, par exemple dans le domaine de l'exploitation contractuelle des droits de la propriété intellectuelle. L'édition complète allemande a été publiée en 2012 et une edition anglaise abrégée en 2013, toutes deux chez Sellier European law publishers.
5

Krijnsen, C. "Jean Barbier, L’abbé Couturier, apôtre de l'unité chrétienne (Visages de l'Eglise). Paris, Editions du Chalet, 1989. 21½ × 13½, 104 p., FF 55." Het Christelijk Oosten 42, no. 3 (November 12, 1990): 217. http://dx.doi.org/10.1163/29497663-04203011.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cazes, Hélène. "Représentations des textes et des savoirs chez Charles Estienne : la « vive parole » d’un humaniste." Renaissance and Reformation 40, no. 3 (November 24, 2017): 187–216. http://dx.doi.org/10.33137/rr.v40i3.28741.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Homme aux savoirs multiples et homme de vulgarisation, Charles Estienne (1514–1564) s’intéressa à la traduction et à l’édition théâtrale parallèlement à ses activités éditoriales et scientifiques, tant en latin qu’en français. Non pas en marge, mais au centre d’une carrière consacrée à la parole du partage des savoirs, l’intérêt pour le théâtre de Charles Estienne se manifeste d’abord par la traduction française d’une comédie italienne contemporaine, rééditée au moins deux fois, puis par des éditions annotées pour la jeunesse d’une comédie de Térence, l’Andrie, qui se continuent par la traduction française de cette comédie, accompagnée d’un traité sur les Jeux des Anciens. Ces deux pièces de théâtres sont représentatives de l’entreprise de Charles Estienne visant à rendre accessible à un plus grand public les grandes oeuvres du passé classique comme de la modernité italienne. Surtout, ces textes sont conçus pour la représentation, dans un cadre éducatif mais aussi, simplement, pour le plaisir du spectacle théâtral. La mise en français, mais aussi la mise en lisibilité (par des lexiques, annotations, commentaires, abrègements etc.) paraissent de fait constituer une mise sur scène du texte source, qui sera dit lors de la représentation mais également par son médiateur, le vulgarisateur (qui traduit, édite, rend compréhensible et diffuse). Ainsi, la traduction pour la scène illustre une parole humaniste, de la transmission et du partage des savoirs : une représentation de la reprise et de la vulgarisation. A man of much learning and a man of popularisation, Charles Estienne (1514–1564) was interested in theatrical translation and edition both in Latin and in French, as well as in many other editorial and scientific activities. Interest in theatre was at the centre of Charles Estienne’s career consecrated to knowledge sharing; it manifested itself first in the French translation of a contemporary Italian comedy, re-edited at least twice. Then he produced several annotated editions for young people of a comedy by Terence, Andria. These were followed by the French translation of this same comedy, accompanied by a treatise on the Jeux des Anciens [Plays of the Ancients]. These two plays are representative of Charles Estienne’s endeavour to make the great works of from classical past as well as contemporary Italy accessible to a wider public. Above all, these texts are designed for performance, in an educational context but also simply for the pleasure of theatrical spectacle. The rendering of the French, and the rendering of readability (through lexica, annotations, commentaries, abridgements etc.) stage the source text, which would be spoken during the performance but also stage its mediator, the populariser (who translated, edited, made comprehensible and disseminated the text). Thus translation for the stage illustrated a humanist position on the transmission and sharing of knowledge: a performance of revival and popularisation.
7

Parker, Sarah E. "Reading and Viewing Sex in Early Modern French Vernacular Medicine." Renaissance and Reformation 38, no. 4 (February 9, 2016): 65–88. http://dx.doi.org/10.33137/rr.v38i4.26374.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Discussions of sex in early modern medical discourse did not simply legitimize a titillating topic. Medicine was engaged in a broader struggle to establish itself as a legitimate and professionally defined discipline; yet many practitioners marketed their ideas to a non-professional public readership. Using both textual and visual material, this article analyzes the tension between these aims in two sixteenth-century French vernacular works that discussed medical topics related to sex: La Dissection des parties du corps humain (1546) by Charles Estienne and the Erreurs Populaires (first edition, 1578) by Laurent Joubert. These medical authors employed visual and textual strategies to legitimize sexual content and to increase their professional reputations—while nevertheless exploiting the erotic nature of the content in order to improve the marketability of their publications. Le traitement du sexe dans le discours médical des débuts de la modernité ne cherchait pas seulement à légitimer un thème émoustillant. La médecine était aussi engagée dans un débat plus important visant à établir son statut en tant que discipline professionnelle légitime et bien définie. Toutefois, plusieurs praticiens de la discipline destinaient leurs travaux à un public non professionnel. À travers des documents à la fois écrits et visuels, cet article analyse les tensions entre ces objectifs dans deux ouvrages du seizième siècle de langue française se penchant sur des questions en lien avec le sexe : La Dissection des parties du corps humain (1546) de Charles Estienne et Erreurs Populaires (1578) de Laurent Joubert. Ces auteurs en médecine on utilisé des stratégies visuelles et textuelles afin de légitimer l’étude du sexe et de promouvoir leur réputation professionnelle, et ce, tout en tablant sur la nature érotique de ces thèmes afin d’augmenter l’intérêt du marché pour leurs publications.
8

Galante, Angelica. "Developing EAL Learners’ Intercultural Sensitivity Through a Digital Literacy Project." TESL Canada Journal 32, no. 1 (March 25, 2015): 53. http://dx.doi.org/10.18806/tesl.v32i1.1199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Language and culture are informally integrated in many English as an Additional Language (EAL) programs, but cultural discussions are often regarded from the perspective of a particular dominant culture. Although this integration is crucial for the development of communicative competence, practical applications are still challenging as language teachers tend to know more about linguistic items than cultural aspects (Celce-Murcia, 2007). This article describes a digital literacy project implemented with language learners in an adult EAL program. Using Bennett’s (1993) DMIS model for intercultural sensitivity, the project invited international students and newcomers to Canada to explore and expand on their understanding of intercultural relationships while studying in a multicultural EAL class. The learners engaged in 5 steps to complete the project (reflective discussion, script writing, video recording scenes, editing, and final reflection), with a short movie serving as the digital product. The digital literacy project is proposed as a potential tool for integrating intercultural sensitivity into EAL programs and engaging learners in discussions about diversity in cultural values, beliefs, and behaviours as a way to affirm their cultural and intercultural identities.Alors que plusieurs programmes d’anglais langue additionnelle (ALA) intègrent informellement la langue et la culture, les discussions portant sur la culture adoptent souvent le point de vue d’une culture dominante particulière. Bien que cette intégration soit cruciale pour le développement de la compétence communicative, les applications pratiques demeurent un problème de taille puisque les enseignants de langue ont généralement plus de connaissances relatives à la langue qu’à la culture (Celce-Murcia, 2007). Cet article décrit un projet d’initiation au numérique mis en œuvre auprès d’apprenants adultes dans un programme d’ALA. S’appuyant sur le modèle DMIS de Bennett (1993) de sensibilité interculturelle, le projet visait à encourager des étudiants internationaux et des nouveaux arrivants au Canada à approfondir leurs connaissances des rapports interculturels tout en poursuivant leur apprentissage dans une classe d’ALA multiculturelle. Les étudiants ont suivi les 5 démarches du projet (discussion de réflexion, rédaction de scénarios, enregistrement vidéo de scènes, édition et réflexion finale) pour arriver à la production d’un court-métrage. Nous proposons ce projet d’initiation au numérique comme outil pouvant appuyer l’intégration de la sensibilité interculturelle dans les programmes d’ALA et inciter les étudiants à discuter de diversité en matière de valeurs, croyances et comportements culturels afin d’affirmer leurs identités culturelles et interculturelles.
9

Mattelart, Tristan. "Comprendre la stratégie de Facebook à l’égard des médias d’information." Sur le journalisme, About journalism, Sobre jornalismo 9, no. 1 (June 15, 2020): 24–43. http://dx.doi.org/10.25200/slj.v9.n1.2020.416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
FR. Dans cet article, nous nous interrogeons sur la manière dont Facebook s’est efforcé d’exercer son pouvoir sur les médias d’information. Convoquant une approche relevant de l’économie politique de la communication, nous décrivons par le menu la façon dont Facebook a, tout à sa volonté de voir croître le nombre de ses usagers et les recettes publicitaires afférentes, élaboré une politique volontariste visant à courtiser les médias à une échelle mondiale pour qu’ils fassent leurs les ressources fournies par sa plateforme. Nous appuyant sur un corpus de documents produits par la firme elle-même — constitué par les éditions états-uniennes de sa Newsroom et de son blog « Facebook for media » —, nous exposons d’abord les traits généraux de la stratégie d’expansion poursuivie par Facebook, avant d’analyser la place qui est accordée, au sein de celle-ci, aux médias d’information. Nous étudions ainsi comment la firme de Menlo Park s’est efforcée de faire de sa plateforme un lieu majeur de distribution d’informations et des médias des fournisseurs de contenus d’actualité, parmi d’autres, œuvrant à son service. Parallèlement, nous décryptons les mesures prises par cette entreprise pour, de manière croissante, peser sur la nature de ces contenus et pour, au-delà, s’imposer comme un acteur incontournable du nouvel environnement de l’information en ligne, au détriment des médias, placés dans une position de dépendance à son égard. *** EN. This paper investigates how Facebook has exerted its power over news media. Using a political economy of communication model, we analyze in detail the ways in which Facebook, eager to maintain the growth of its user base and the advertising revenue associated with it, has implemented a deliberate policy aimed at convincing media to use the resources provided by its platform. Based on a corpus of documents produced by Facebook itself in the US editions of its “Newsroom” and its blog “Facebook for Media,” we first describe some of the general features of its policy of expansion. We then consider the strategies that have been taken, within this context, towards news media. We study how Facebook has invested considerable effort in establishing its platform as a major nexus for news distribution and for converting media into news content suppliers working, among other suppliers, for its benefit. We also explore the different initiatives Facebook has undertaken to influence the nature of news content in order to impose itself as a key player in the online news environment at the expense of media, which finds itself in an asymmetrical position of dependence. *** PT. Neste artigo, questionamos como o Facebook tem buscado exercer seu poder sobre a mídia de notícias. Partindo de uma abordagem da economia política da comunicação, descrevemos minuciosamente como o Facebook, no intuito de ampliar o número de seus usuários e as decorrentes receitas publicitárias, desenvolveu uma política proativa de sedução dos meios de comunicação em escala global, para levá-los a adotar os recursos oferecidos por sua plataforma. Com base em um corpus de documentos produzidos pela própria empresa - composto pelas edições norte-americanas de sua Newsroom e de seu blog "Facebook for media" -, delineamos inicialmente as características gerais da estratégia de expansão do Facebook, para então analisar o espaço que a empresa disponibiliza para a mídia de notícias. Dessa forma, examinamos como a Menlo Park tem se esforçado para, por um lado, fazer da sua plataforma um locus de distribuição de notícias e, por outro, recorrer à mídia enquanto provedora de notícias a seu serviço, entre outras fontes. Ao mesmo tempo, analisamos as medidas tomadas pela empresa para influenciar cada vez mais a natureza desse conteúdo e se estabelecer progressivamente como agente indispensável desse novo ambiente da informação online, em detrimento da mídia, agora em posição assimétrica de dependência. ***
10

Rousseau, Sandrine. "Marianne Cohen et Ghislaine Duqué, 2001, Les deux visages du Sertão. Stratégies paysannes face aux sécheresses (Nordeste, brésil), Paris, IRD Editions, Collection « À travers champs », 388 p." Développement durable et territoires, January 5, 2006. http://dx.doi.org/10.4000/developpementdurable.1694.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Edition de visage":

1

Yao, Xu. "Latent representations for facial images and video editing." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAT019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Apprendre à éditer des images et des vidéos de visages est un domaine particulièrement actif dans la recherche académique et industrielle. Cette thèse aborde le problème de l'édition de visages dans le cas particulier des images et des vidéos à haute résolution. Dans cette thèse, nous développons des méthodes basées sur l'apprentissage profond pour effectuer l'édition d'images faciales. Plus précisément, nous explorons la tâche en utilisant les représentations latentes obtenues à partir de deux types de réseaux neuronaux profonds : les modèles basés sur l'auto-encodage et les réseaux antagonistes génératifs (GAN). Pour chaque type de méthode, nous considérons un problème spécifique d'édition d'image et proposons une solution efficace qui surpasse l'état de l'art. La thèse comprend deux parties. Dans la partie I, nous explorons les tâches d'édition d'images via l'espace latent des autoencodeurs. Nous considérons d'abord la tâche de transfert de style entre les photos, et proposons un algorithme efficace qui est construit sur une paire de réseaux basés sur des autoencodeurs. Ensuite, nous étudions la tâche d'édition de l'âge du visage pour les images à haute résolution, en utilisant une architecture d'encodeur-décodeur. Le réseau proposé encode une image de visage en représentations de caractéristiques invariantes selon l'âge, et apprend un vecteur de modulation correspondant à un âge cible. Notre approche permet une édition fine de l'âge sur des images à haute résolution dans un seul modèle unifié.Dans la deuxième partie, nous explorons la tâche d'édition via l'espace latent des modèles antagonistes génératifs (GAN). Tout d'abord, nous considérons le problème de l'édition "démêlée" (disentangled) des attributs faciaux sur des images synthétiques et réelles, en proposant un réseau de transformation latent qui agit dans l'espace latent d'un modèle GAN pré-entraîné. Nous avons également proposé un pipeline de manipulation vidéo, afin de généraliser le résultat de l'édition aux vidéos. Deuxièmement, nous étudions le problème de l'inversion du GAN - la projection d'une image réelle dans l'espace latent d'un GAN pré-entraîné. En particulier, nous proposons un encodeur feed-forward, qui encode une image donnée en un code caractéristique et un code latent en une seule passe. L'encodeur proposé s'avère plus précis et plus stable pour l'inversion d'images et de vidéos, tout en conservant de bonnes capacités d'édition
Learning to edit facial images and videos is one of the most popular tasks in both academia and industrial research. This thesis addresses the problem of face editing for the special case of high-resolution images and videos.In this thesis, we develop deep learning-based methods to perform facial image editing. Specifically, we explore the task using the latent representations obtained from two types of deep neural networks: autoencoder-based models and generative adversarial networks. For each type of method, we consider a specific image editing problem and propose an effective solution that outperforms the state-of-the-art.The thesis contains two parts. In part I, we explore image editing tasks via the latent space of autoencoders. We first consider the style transfer task between photos and propose an effective algorithm that is built on a pair of autoencoder-based networks. Second, we study the face age editing task for high-resolution images, using an encoder-decoder architecture. The proposed network encodes a face image to age-invariant feature representations and learns a modulation vector corresponding to a target age. Our approach allows for fine-grained age editing on high-resolution images in a single unified model.In part II, we explore the editing task via the latent space of generative adversarial models (GANs). First, we consider the problem of facial attribute disentangled editing on synthetic and real images, by proposing a latent transformation network that acts in the latent space of a pre-trained GAN model. We also proposed a video manipulation pipeline, to generalize the editing result to videos. Second, we investigate the problem of GAN inversion -- the projection of a real image to the latent space of a pretrained GAN. In particular, we propose a feed-forward encoder, which encodes a given image to a feature code and a latent code in one pass. The proposed encoder is shown to be more accurate and stable for image and video inversion, meanwhile, maintaining good editing capacities

Books on the topic "Edition de visage":

1

Carrion, Ramon. USA Immigration Guide, 5th Edition. Naperville: Sourcebooks, Inc., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Thompson, Vicki, Denise M. Baran-Unland, Rebekah A. Baran, Colleen Robbins, Sarah C. Stegall, Matt Coundiff, and Graphics Inc Cal. Visage: Official Edition. Denise Unland, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

D'Ivoi, Paul. Espion X. 323 - Volume I - l'Homme Sans Visage ( Edition Illustrée ). Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vance, Jack, and J. Vance. Le Visage Du Demon (La Geste Des Princes-Demons, Tome 4) (Ldp Science Fic) (French Edition). Livre de Poche, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Feth, Monika. Le peintre des visages (French Edition). Hachette, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Birtalan, Dave, and William Nunley. Optoelectronics: Infrared-Visable-Ultraviolet Devices and Applications, Second Edition. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Birtalan, Dave, and William Nunley. Optoelectronics: Infrared-Visable-Ultraviolet Devices and Applications, Second Edition. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Birtalan, Dave, and William Nunley. Optoelectronics: Infrared-Visable-Ultraviolet Devices and Applications, Second Edition. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Birtalan, Dave, and William Nunley. Optoelectronics: Infrared-Visable-Ultraviolet Devices and Applications, Second Edition. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Magnan. Video Manual to Accompany Paroles, Deuxieme Editio N (Visages Et Cultures). John Wiley & Sons Inc, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Edition de visage":

1

Wiedenmann, Nicole. "6. Cartes-de-Visite, Miniaturization and the Materiality of Circulation." In Edition Medienwissenschaft, 109–34. Bielefeld, Germany: transcript Verlag, 2021. http://dx.doi.org/10.14361/9783839452462-006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nergaard, Henrik, Nils Ulltveit-Moe, and Terje Gjøsæter. "ViSPE: A Graphical Policy Editor for XACML." In Communications in Computer and Information Science, 107–21. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-27668-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chen, Yuan-tsung. "The Mob Rule." In The Secret Listener, 195–209. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197573341.003.0016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In 1966, the Cultural Revolution broke out. Chen Yi, the foreign minister and Zhou Enlai’s right-hand man, sent a message to Jack, through Comrade Xia on a secret errand, that he would grant Jack an exit visa if he applied for one. But soon Mao’s Red Guards ran amok. Chen Yi was pushed aside. Jack, no longer protected by his family’s reputation and his own connections, was assaulted and not allowed to leave the compound of the Foreign Languages Bureau, where he worked on the English edition of the Peking Review. Yuan-tsung, however, was mobile. She went to see the Red Guards rally at Tiananmen; each of the participants held the Little Red Book, the compilation of Mao’s quotes.
4

Ashrafzadeh, Amin, and Roger Steinert. "Evaluation of Patients for Refractive Surgery with Visante Anterior Segment OCT and the Combined Datalink with Atlas Corneal Topographer." In Dr Agarwals㆒ Textbook on Corneal Topography (SECOND EDITION), 137. Jaypee Brothers Medical Publishers (P) Ltd., 2010. http://dx.doi.org/10.5005/jp/books/11028_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Stone, Richard. "Reporting in Authoritarian Regimes." In A Tactical Guide to Science Journalism, 304—C42.P37. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197551509.003.0043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract Richard Stone, senior science editor for HHMI Tangled Bank Studios and former international news editor for the journal Science, combines experience and insight from reporting under risky circumstances to craft this chapter on science journalism under authoritarian regimes. Prep hard before a reporting trip, he writes, to gather independently verified information, and be ready to work diligently after you return to vet the reporting you’ve gathered. Avoid flying in under the radar: Reduce risks to yourself and to your sources by obtaining a journalist visa. You may end up burdened with a government minder, but in some countries, few scientists and officials would dare speak with you without such a chaperone. And take care to protect your sources and fixers, especially if your story ends up criticizing or embarrassing a regime.
6

Po Cheong, Chi. "A Simple and Secure Credit Card-Based Payment System." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 1299–306. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Credit card is the most popular payment method used in Internet shopping. The idea of credit card payment is to buy first and pay later. The cardholder can pay at the end of the statement cycle or they can pay interest on the outstanding balance. Therefore, there are many credit card-based electronic payment systems (EPSs) that have been developed to facilitate the purchase of goods and services over the Internet such as CyberCash (VeriSign), iKP (Bellare, Garary, Hauser, et al, 1995), SET (Visa and MasterCard, 1997), CCT (Li & Zhange, 2004), and so forth. Usually a credit card-based EPS involves five parties: cardholder, merchant, acquirer bank, issuer bank, and financial institution. Internet is an open system and the communication path between each other is insecure. All communications are potentially open for an eavesdropper to read and modify as they pass between the communicating endpoints. Therefore, the payment information transmitted between the cardholder and the merchant through Internet is dangerous without a secure path. SSL (Zeus Technology, 2000) is a good example to secure the communication channel. Besides the issue of insecure communication, there are a number of factors that each participant must consider. For example, merchant concerns about whether the credit card or the cardholder is genuine. There is no way to know the consumer is a genuine cardholder. As a result, the merchant is incurring the increase in losses due to cardholder disputes and frauds. On the other hand, cardholders are worried about the theft of the privacy or sensitive information such as the credit card number. They don’t want any unauthorized usage of their credit cards and any modification to the transaction amount by a third party. These security issues have deterred many potential consumers from purchasing online. Existing credit card-based EPSs solve the problems in many different ways. Some of them use cryptography mechanisms to protect private information. However, they are very complicated, expensive, and tedious (Xianhau, Yuen, Ling, & Lim, 2001). Some EPSs use the Certificate Authority (CA) model to fulfill the authentication, integrity, and nonrepudiation security schemes. However, each participant requires a digital certificate during the payment cycle. These certificates are issued by independent CAs but the implementation and maintenance cost of this model is very high. In addition, the validation steps of Certificate-based systems are very time-consuming processes. It requires access to an online certificate server during the payment process. Moreover, the certificate revocation list is a major disadvantage of the PKI-based certification model (The Internet Engineering Task Force). The cardholder’s certificate also includes some private information such as the cardholder’s name. The requirement of a cardholder’s certificate means software such as e-Wallet is required to be installed on the cardholder’s computer. It is the barrier for the cardholder to use Certificatebased payment systems. To solve this problem, Visa Company has developed a new payment system called Verified by Visa (VbV) (http:www/visa-asia.com/ ap/sea/merchants/productstech/vbv_implementvbv. shtml). However, sensitive information such as credit card number is still passed to the merchant. Therefore, the cardholder is not protected by the system.
7

Hentea, Mariana. "Information Security Management." In Encyclopedia of Multimedia Technology and Networking, Second Edition, 675–81. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-014-1.ch091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Information assurance is a continuous crisis in the digital world. The attackers are winning and efforts to create and maintain a secure environment are proving not very effective. Information assurance is challenged by the application of information security management which is the framework for ensuring the effectiveness of information security controls over information resources. Information security management should “begin with the creation and validation of a security framework, followed by the development of an information security blueprint” (Whitman & Mattord, 2004, p. 210). The framework is the result of the design and validation of a working security plan which is then implemented and maintained using a management model. The framework serves as the basis for the design, selection, and implementation of all subsequent security controls, including information security policies, security education and training programs, and technological controls. A blueprint can be designed using established security models and practices. The model could be proprietary or based on open standards. The most popular security management model is based on the British Standard 7999 which addresses areas of security management practice. The recent standards, called ISO/IEC 27000 family, include documents such as 27001 IMS Requirements (replaces BS7799:2); 27002, Code of Practice for Information Security Management (new standard number for ISO 17799); and 27006, Guidelines for the accreditation of organizations offering ISMS certification, and several more in development. Similar security models are supported by organizations such as NIST, IETF, and VISA. From one point of view, information security management evolved on an application of published standards, using various security technologies promoted by the security industry. Quite often, these guidelines conflict with each other or they target only a specific type of organization (e.g., NIST standards are better suited to government organizations). However, building a security control framework focused only on compliance to standards does not allow an organization “to achieve the appropriate security controls to manage risk” (ISM-Community, 2007, p. 27). Besides technical security controls (firewalls, passwords, intrusion detection systems, disaster recovery plans, encryption, virtual private networks, etc.), security of an organization includes other issues that are typically process and people issues such as policies, training, habits, awareness, procedures, and a variety of other less technical and nontechnical issues (Heimerl & Voight, 2005; Tassabehji, 2005). All these factors make security a complex system (Volonino & Robinson, 2004) and a process which is based on interdisciplinary techniques (Maiwald, 2004; Mena, 2004). While some aspects of information security management changed since the first edition of the chapter (Hentea, 2005), the emerging trends became more prevalent. Therefore, the content of this chapter is organized on providing an update of the security threats and impacts on users and organizations, followed by a discussion on global challenges and standardization impacts, continued with information security management infrastructure needs in another section, followed with a discussion of emerging trends and future research needs for the information security management in the 21st century. The conclusion section is a perspective on the future of the information security management.

Conference papers on the topic "Edition de visage":

1

Garcia, Vinicius Cardoso, Valdirene Fontanette, Adriano Bossonaro, Ângela de Britto Perez, and Antonio Francisco do Prado. "DDE – Draco Domain Editor." In Simpósio Brasileiro de Engenharia de Software. Sociedade Brasileira de Computação, 2002. http://dx.doi.org/10.5753/sbes.2002.23962.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Este artigo apresenta uma ferramenta para edição de domínios do Sistema Transformacional Draco, denominada Draco Domain Editor. No ST Draco, um domínio é definido por uma Linguagem e esta por sua vez é formada por: uma gramática, um parser e Prettyprinter, ou unparser, definidos a partir dessa gramática. A ferramenta DDE facilita a edição destas partes do domínio, através de recursos textuais e gráficos. Outros recursos do DDE visam a edição de transformações e de scripts que orientam o processo de aplicação das transformações, e o gerenciamento de projetos que utilizam o ST Draco.

To the bibliography