Academic literature on the topic 'Protect'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Protect.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Protect"

1

Chen, Huan, Liling Zhou, and Shufang Han. "Protest and protect." Journal of Asian Pacific Communication 27, no. 1 (May 11, 2017): 99–120. http://dx.doi.org/10.1075/japc.27.1.06che.

Full text
Abstract:
Abstract A phenomenological study reveals Chinese mothers’ perception and interpretation of smartphone (tablet) in their everyday communications and interactions with their young children. In total, 23 in-depth interviews were used to collect data. Data of the current study indicated that Chinese mothers’ perception of smartphone (tablet) in their everyday lives’ communication and interaction with young children is both grounded and reflective of their parenting philosophy and family communication style. Data of the current study indicated that today’s Chinese mothers have a mixed feeling toward the role of smartphone and tablet plays in their parenting practices. According to those participants, the smartphone and tablet both help and hurt their communications and interactions with their children. There are both direct and indirect benefits of using smartphone for parenting. Similarly, the smartphone (tablet) also hurts Chinese mothers’ communications and interactions with their children directly and indirectly.
APA, Harvard, Vancouver, ISO, and other styles
2

CORDLE, DANIEL. "Protect/Protest: British nuclear fiction of the 1980s." British Journal for the History of Science 45, no. 4 (December 2012): 653–69. http://dx.doi.org/10.1017/s0007087412001112.

Full text
Abstract:
AbstractAnalyses of nuclear fiction have tended to focus on the literature of the United States, particularly that of the 1950s. This article not only switches attention to British literature, but makes the case for the 1980s as a nuclear decade, arguing that the late Cold War context, especially renewed fears of global conflict, produced a distinctive nuclear literature and culture. Taking its cue from E.P. Thompson's rewriting of the British government's civil-defence slogan, ‘Protect and Survive’, as ‘Protest and Survive’, it identifies a series of issues – gender and the family, the environment and socio-economic organization – through which competing nuclear discourses can be read. In particular, it argues, British fiction of this period functions by undercutting the idea that protection is possible. Hence, although few nuclear texts advocate particular policy positions, they are characterized by a politics of vulnerability. Proposing for the first time the existence of a distinctive 1980s nuclear culture, it seeks to suggest the broad parameters within which further research might take place.
APA, Harvard, Vancouver, ISO, and other styles
3

Bhatt, Nikhil J., Mona M. Abaza, Kanwar S. Kelley, Ayesha N. Khalid, Steve Church, William Matthes, and K. J. Lee. "Protect Your Practice, Protect Yourself, and Protect Your Family." Otolaryngology–Head and Neck Surgery 151, no. 1_suppl (September 2014): P9. http://dx.doi.org/10.1177/0194599814538403a6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Martinez-Ortiz, Wilnelly, and Ming-Ming Zhou. "Could PROTACs Protect Us From COVID-19?" Drug Discovery Today 25, no. 11 (November 2020): 1894–96. http://dx.doi.org/10.1016/j.drudis.2020.08.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fox, Eleanor M. "“We Protect Competition, You Protect Competitors”." World Competition 26, Issue 2 (June 1, 2003): 149–65. http://dx.doi.org/10.54648/woco2003002.

Full text
Abstract:
It is widely stated, in contemporary antitrust circles, that antitrust law protects consumers, not competitors. This article explores two questions: Do these words have a clear and uniform meaning, and, Is the statement a fair description of what antitrust laws in fact do? Antitrust laws protect competition. But the laws do not mandate competition; they simply intervene to prevent certain obstructions. This mission may take one or more of three paths: 1) prevent direct harm to consumer welfare by output-limiting acts or transactions, 2) also, protect the openness of markets, and 3) also, put a lid on aggressive competition that might destroy a market of smaller, weaker firms. This article argues that only the third category unabashedly protects competitors. The second category takes a broad view of a dynamic process that “should” not be degraded. It is not designed to protect competitors from competition. But the second category could err on the side of protecting competitors unless the jurisdiction gives serious regard to efficiency justifications, even while the first category could err on the side of perpetuating the power of dominant firms.
APA, Harvard, Vancouver, ISO, and other styles
6

REBMANN, TERRI. "Protect yourself, protect your patients." Nursing Made Incredibly Easy! 5, no. 1 (January 2007): 30–39. http://dx.doi.org/10.1097/00152258-200701000-00008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Katz, Barbara. "Protect Your Paperwork, Protect Your Identity." Emergency Medicine News 30, no. 11 (November 2008): 32. http://dx.doi.org/10.1097/01.eem.0000340968.24163.5a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

The Lancet. "Protect the kidney, protect the heart." Lancet 375, no. 9722 (April 2010): 1226. http://dx.doi.org/10.1016/s0140-6736(10)60524-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Waters, Rebecca. "Protect your hands: protect your health." Dental Nursing 15, no. 11 (November 2, 2019): 562–63. http://dx.doi.org/10.12968/denn.2019.15.11.562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Gonsoulin, Sid, and Daniel M. Wax. "Protect Our Program! Protect Our Referees!" Recreational Sports Journal 13, no. 3 (May 1989): 54–56. http://dx.doi.org/10.1123/nirsa.13.3.54.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Protect"

1

Alhabashneh, Mohammad Abad Alhameed. "Protect team handler (PTH)." Thesis, University West, Department of Technology, Mathematics and Computer Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-567.

Full text
Abstract:

There is always a need for easy-to-follow processes that enable accurate and non-time consuming solutions. Nowadays we see a lot of different approaches to development processes in software engineering. This project is concerned with how to manage a software development process in a reliable, secure and efficient way. Software is available which provides some help for project managers / administrators to work more productively, with effective communication. Using such systems, it is possible to keep track of all the phases of development, including task distribution, making maximum use of previous hands-on experience and increasing productivity, to deliver a finished product in minimum time. No existing solution, however, fulfills all the desirable criteria. This paper describes the motivation, design and implementation of an improved development management system using Active Server Pages and Microsoft Internet Information Services with a backend Microsoft Access Database developed using a waterfall software development process. The resulting system is described and evaluated. This system will be beneficial for software houses, because they can communicate on the web, allowing efficiency gains by avoiding the need to call meetings for distribution of tasks among employees, with the additional advantage of location-transparent team management through the Internet.

APA, Harvard, Vancouver, ISO, and other styles
2

Ярмак, Любов Павлівна, Любовь Павловна Ярмак, Liubov Pavlivna Yarmak, and N. Novatarska. "To protect our environment." Thesis, Видавництво СумДУ, 2008. http://essuir.sumdu.edu.ua/handle/123456789/15998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shaibah, Hassan S. "Does Wld's protect in Drosophila?" Thesis, University of Southampton, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pollentine, Marc. "Constructing the responsibility to protect." Thesis, Cardiff University, 2012. http://orca.cf.ac.uk/43100/.

Full text
Abstract:
Debate about how populations can be protected from mass atrocities is well-established in international affairs. Beset with a raft of ethical, legal, political and normative questions, the rapid development of the ‘responsibility to protect’ has been held up as evidence of emerging, and even settled, consensus in this area. Indeed, from the perspective of well-established models of norm construction, notably the “Norm Life Cycle”, R2P’s institutionalization in the 2005 World Summit Outcome may signify momentum towards full acceptance. However, based upon a detailed tracing of R2P’s path into the Summit Outcome, this thesis questions how R2P is increasingly characterized as well as the theoretical explanatory frames used by scholars to describe the development and impact of international norms. It challenges the twin problems of linearity and norm exogenization which distort our understanding, and which are evident in overly optimistic portrayals of R2P’s development. With these in mind, the thesis adopts a framework constituted by a constructivist-inspired hypothesis and a process-tracing methodology defined by elite-level interviews and extensive documentary analysis. It shows how tracing the micro-processes of R2P’s development generates a very different story to those derived from broader theoretical frames. Indeed, the empirical findings show how and why the agreement was possible, and – through an analysis of the complex political negotiations – in what form R2P was collectively defined. This leads to the introduction of the concept of the ‘structured outcome’ to describe how R2P was propelled towards agreement more by a series of factors relating to the design and effect of the negotiation process than by the progressive acceptance of states. Accordingly, R2P’s formulation was purposefully limited to navigate pronounced dividing-lines and as a political agreement was more cosmetic than transformational. Resultantly its normative foundations were far shallower and far less significant than oft-rendered in mainstream perception.
APA, Harvard, Vancouver, ISO, and other styles
5

Pochatko, T. V. "Ways to protect your ideas." Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/62829.

Full text
Abstract:
Nowadays the protection of intellectual property is very important in our society. Several forms of legal protection are available for your creations. Which you should use depends on what you have created.
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Yaping. "Organic Coatings to Protect Ferrous Structures." Diss., North Dakota State University, 2013. https://hdl.handle.net/10365/27125.

Full text
Abstract:
Corrosion induces damages that can result in enormous costs and safety issues. Steels are the most commonly used metallic structural materials but they can corrode rapidly when exposed to corrosive environments and need to be protected. The thesis research focuses on two aspects of steel protection. The first aspect is using barrier protection mechanism to protect steel pipeline structures in the presence of Super-Critical CO2. The second aspect is improving cathodic protection of steels by metal rich coatings in ground vehicles, bridges, water tanks, and other structures. In part one, coatings for protection of steel pipeline used for carbon transportation in the form of supercritical carbon dioxide were examined. Pipeline coatings serve to protect pipelines by maintaining their integrity and to increase their service time. Different pipeline coatings with the exposure to SCCO2 have been examined, and these results will be presented here. Different parameters, such as the thickness of coatings, the exposure temperature and pressure, and the exposure time as they affect pipeline coating were investigated and will be described. In the second part of this thesis research, the addition of magnesium particles to the standard zinc particles as metal rich primer was examined for the improvement of current zinc rich coatings to serve as protection for metal substrates in Army ground vehicles. Optimization of primer formulation, such as ratio of Mg and Zn, was investigated. The test primers were exposed in accelerated weathering tests, including ASTM B117 salt spray method and ProhesionTM cycle test as part of this research. The results have been compared with the behavior of the current commercial zinc rich primers to identify the improvements in the protection of the steel with mixed metal systems. For both investigations, electrochemical impedance spectroscopy was mainly used to examine coating performance. Other tests, including color measurement, thickness measurement, X-ray diffraction measurements, and pH measurements, were used to examine the corrosion behavior of steel structures under different corrosive environments. Results showed that coating systems can protect ferrous structures in ways of barrier protection and cathodic protection and can be improved by the application of modern methods and equipment.
Department of Energy
North Dakota State University. Department of Coatings and Polymeric Materials
APA, Harvard, Vancouver, ISO, and other styles
7

MARTINS, THEO COTRIM. "DO MANDATORY DIVIDEND RULES PROTECT MINORITY SHAREDHOLDERS?" PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2010. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=16280@1.

Full text
Abstract:
Este trabalho mostra que as regras brasileiras de dividendos mínimos fazem com que a distribuição de proventos no Brasil seja alta relativamente aos Estados Unidos, apesar da fraca proteção oferecida pela lei das S.A. aos acionistas minoritários no Brasil. Ainda assim, subterfúgios legais permitem que 42% de uma ampla amostra de empresas não financeiras com ações listadas na Bovespa distribuem menos dividendos do que o previsto em estatuto. Tal retenção de ganhos poderia ser benéfica aos acionistas, visto que garante financiamento a novos projetos. Entretanto, dados de investimentos das empresas listadas na Bovespa mostram que este não parece ser o caso: à exceção de períodos com forte restrição ao crédito, a regra brasileira de dividendos mínimos protege os acionistas minoritários sem prejudicar a capacidade das firmas financiarem oportunidades de investimento.
This paper shows that Brazil s mandatory dividend rules partly explain why its average dividend yield is higher than in the U.S. And yet, several Brazilian firms bypass the mandatory dividend rules. We show that 42% of a broad sample of nonfinancial firms with shares listed at Bovespa use legal loopholes to pay fewer dividends than the amount that their statutes call for. The data suggest that the main reason for these firms to bypass the dividend rules is not to ensure financing for new projects. Instead, lower dividend payments seem to pave the way for the controlling shareholders to dilute the cash-flow rights of minority shareholders. Thus, short of credit crunch, the Brazilian mandatory dividend rules do protect minority shareholders, without making harder for firms to finance investment opportunities.
APA, Harvard, Vancouver, ISO, and other styles
8

Hayes, Kelli A. "Logical extensions of the responsibility to protect." Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/2197.

Full text
Abstract:
Thesis (MPhil (Philosophy))--University of Stellenbosch, 2009.
ENGLISH ABSTRACT: Are violent and non-violent mass atrocities morally different? According to the United Nations, they are. But why? The answer to this question is important as it in part determines our obligations to people living in other countries. This thesis seeks to determine if violent and non-violent mass atrocities are morally different and, if not, whether the latter should be included under the United Nations’ doctrine of the responsibility to protect. In order to do this, the thesis first examines the conditions under which sovereignty exists in order to understand when intervention can occur. It also analyzes just war theory to discern when military intervention to halt nonviolent mass atrocities is justified. Having established these two concepts, the thesis then presents three arguments for why non-violent mass atrocities are morally indistinguishable from violent ones and should also be included under the doctrine of the responsibility to protect. A discussion of the feasibility of implementing this extension and the long-term effects of these types of interventions follows. Finally, the thesis contains three case studies in order to apply the arguments presented earlier.
AFRIKAANSE OPSOMMING: Is daar ‘n morele verskil tussen gewelddadige en nie-gewelddadige gruweldade? Volgens die Verenigde Nasies is daar so ‘n verskil, maar hoekom? Die antwoord tot hierdie vraag is deels belangrik omdat dit ons verantwoordelikhede tot mense in ander lande bepaal. In hierdie tesis word daar gepoog om te bepaal of daar so ‘n verskil tussen gewelddadige en nie-gewelddadige gruweldade is, en, indien nie, of nie-gewelddadige gruweldade ook moet tel onder die Verenige Nasies se verantwoordelikheid om te beskerm. Die tesis poog eerstens om die kondisies vir soewereiniteit te bepaal ten einde te probeer verstaan wanneer ‘n intervensie moreel regverdigbaar is. Dit analiseer ook die teorie van geregverdigde oorlogvoering ten einde te bepaal wanneer militêre inmenging om nie-gewelddadige gruweldade stop te sit geregverdig is. Na hierdie twee konsepte ondersoek is word daar drie argumente verskaf om aan te toon dat nie-gewelddadige gruweldade nie moreel onderskeibaar is van gewelddadige gruweldade nie, en dus dat nie-gewelddadige gruweldade onder die verantwoordelikheid om te beskerm behoort te tel. Dit word gevolg deur ‘n bespreking van die praktiese haalbaarheid van die implementering van so ‘n uitbreiding van die verantwoordelikheid om te beskerm, asook ‘n bespreking van die langtermyn effekte van hierdie tipes intervensies. Die tesis eindig met drie gevallestudies ten einde die argumente wat reeds gemaak is toe te pas.
APA, Harvard, Vancouver, ISO, and other styles
9

Asher, Courtani. "Project protect and nurture| A grant proposal." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10076460.

Full text
Abstract:

The purpose of this project was to write a grant proposal to identify resource materials that can be used in whole or adapted for a series of workshops for K–6 school social workers and their colleagues (teachers, counselors, and support staff) aimed at enhancing their knowledge and skills in child abuse and trauma prevention and intervention. The potential host agency will be Dr. Albert Schweitzer Elementary, a school in Anaheim, California. The grant writer developed the project after an extensive review of the literature available on child abuse and trauma. The project seeks to provide social workers and their colleagues with the skills and knowledge needed to aid in the prevention and treatment of child abuse and trauma. The Weingart Foundation was chosen as the potential funding source for this project. The actual funding and submission of this grant proposal was not a requirement for successful completion of this project.

APA, Harvard, Vancouver, ISO, and other styles
10

Mazzanti, Maria Rita. "From State sovereignty to responsibility to protect." Paris, Institut d'études politiques, 2013. https://spire.sciencespo.fr/notice/2441/45eb019724sn6sg9mcu4j489l.

Full text
Abstract:
Notre étude a pour objet l’analyse des développements politiques et juridiques relatifs au concept de “Responsabilité de protéger“ (R2P). Notre recherche est conduite selon deux parcours parallèles : l’un traite de l’évolution du concept de souveraineté et de l’importance grandissante du rôle qu’assume la communauté internationale dans les affaires internes d’un Etat ; l’autre est consacré à la notion d’intervention à des fins humanitaires et des leçons qui découlent des expériences des années ‘90. Notre point de départ était que ce que la Responsabilité de protéger est ou n’est pas aujourd'hui, doit être compris à la lumière de cette évolution. Ayant délimité notre espace de recherche et identifié quels sont les éléments essentiels de la Responsabilité de protéger, nous avons evalué si, et de quelle manière la Responsabilité de protéger - après dix années d’existence - a été capable d’influencer la conduite de la communauté internationale, et, en particulier, du Conseil de Sécurité des Nations Unies. C’est pourquoi nous avons choisi d’étudier quatre cas – Libye, Côte d’Ivoire et Sri Lanka et Syrie – où la Responsabilité de protéger a été invoquée ou aurait dû l’être, pour déterminer les règles applicables à l’avenir. Nous avons adopté pour hypothèse de recherche que la Responsabilité de protéger est influencée par cinq variables indépendantes, à savoir, , la dynamique des discussions au sein du Conseil de Sécurité, la perspective d’un succès raisonnable fondée sur l’analyse coûts/bénéfices; le rôle des organisations régionales/subrégionales concernées; les activités du Conseil des droits de l´homme et l´action de la société civile
The research was aimed at understanding by means of which developments in the political and legal thinking the R2P finally reached its present shape. To this end, we analyzed on one side the evolution of the concept of absolute sovereignty and the shift towards an increased involvement of the international community in the internal affairs of the individual states, and, on the other side, the modifications incurred in the concept of intervention for humanitarian purposes and the lessons learned out of the experiences of the 1990s. We have argued that what R2P is, or is not, should be understood in the light of this long development. Having then established what now R2P is about we wanted to measure to which extent R2P was able, in the ten years of its existence, to influence the behavior of the international community, and in particular of the United Nations Security Council. Hence, we selected four cases – Libya, Côte d’Ivoire Sri Lanka and Syria – where R2P was invoked or should have been invoked, with the aim of finding regularities useful for guiding future action. Our research hypothesis was that R2P is influenced by five main independent variables, namely: the dynamic within the Security Council (active involvement of some specific countries/country representatives); reasonable perspective of success/attractive cost-benefit profile; the role of the relevant regional/sub-regional organizations; the activity of the Human Rights Council; and the action of civil society
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Protect"

1

Barnham, Kay. Protect nature. New York: Crabtree Pub. Co., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ericson, Carol. Conceal, protect. Don Mills, Ont: Harlequin Enterprises Ltd., 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Protect nature. London: Wayland, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Police, Illinois State. Scott's Law: Let's protect those who protect us. Springfield, Ill.]: Illinois State Police, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Police, Illinois State. Scott's Law: Let's protect those who protect us. Springfield, Ill.]: Illinois State Police, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mills, DiAnn. Sworn to protect. Carol Stream, Ill: Tyndale House, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Werner, Patricia. His to protect. Richmond: Silhouette, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Protect Your Patent. Naperville: Sourcebooks, Inc., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Domnauer, Teresa. Protect!: Wild animals. Greensboro, NC: Carson-Dellosa, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Werner, Patricia. His to protect. Richmond: Silhouette, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Protect"

1

Weik, Martin H. "protect." In Computer Science and Communications Dictionary, 1358. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_14964.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Melone, Michael. "Protect." In Designing Secure Systems, 83–124. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003144182-10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Earle, Sylvia. "Protect the Ocean, Protect Ourselves." In Coastal Change, Ocean Conservation and Resilient Communities, 155–61. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-41914-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bährle-Rapp, Marina. "protect(ing)." In Springer Lexikon Kosmetik und Körperpflege, 456. Berlin, Heidelberg: Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-71095-0_8589.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cordle, Daniel. "Protect–Protest: Introducing the Nuclear 1980s." In Late Cold War Literature and Culture, 1–24. London: Palgrave Macmillan UK, 2016. http://dx.doi.org/10.1057/978-1-137-51308-3_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cooper, Richard H., and Juliette Voïnov Kohler. "Introduction The Responsibility to Protect." In Responsibility to Protect, 1–12. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Schulz, William F. "Spread Wide the Word." In Responsibility to Protect, 145–59. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Simmons, Adele, and April Donnellan. "Reaching Across Borders." In Responsibility to Protect, 163–78. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Feinstein, Lee, and Erica De Bruin. "Beyond Words." In Responsibility to Protect, 179–98. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Volk, Joe, and Scott Stedjan. "Building Structures for Peace." In Responsibility to Protect, 199–218. New York: Palgrave Macmillan US, 2009. http://dx.doi.org/10.1057/9780230618404_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Protect"

1

Kumar, Udayan, Gautam Thakur, and Ahmed Helmy. "PROTECT." In the 6th International Wireless Communications and Mobile Computing Conference. New York, New York, USA: ACM Press, 2010. http://dx.doi.org/10.1145/1815396.1815543.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lindner, Steffen, Daniel Merling, Marco Häberle, and Michael Menth. "P4-Protect." In CoNEXT '20: The 16th International Conference on emerging Networking EXperiments and Technologies. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3426744.3431327.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shenoy, Jayanth, Zikun Liu, Bill Tao, Zachary Kabelac, and Deepak Vasisht. "RF-protect." In SIGCOMM '22: ACM SIGCOMM 2022 Conference. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3544216.3544256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Uriel Gallego, Marta, Edgar Abarca Lachén, Nuriea Berenguer Torrijo, Loreto Saez-Benito, Ana Sáez-Benito Suescun, and Carlota Gómez Rincón. "PROTECT YOURSELF FROM THE SUN, PROTECT YOURSELF FROM LUPUS." In International Conference on Education and New Learning Technologies. IATED, 2017. http://dx.doi.org/10.21125/edulearn.2017.1408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Page, D. "Protect and survive." In DEFENCE SITES: HERITAGE AND FUTURE 2012. Southampton, UK: WIT Press, 2012. http://dx.doi.org/10.2495/dshf120081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kim, Kyung-chul, and Eun hye Kim. "Let’s Protect Precious Crayfishes!" In Advanced Science and Technology 2017. Science & Engineering Research Support soCiety, 2017. http://dx.doi.org/10.14257/astl.2017.143.09.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hutchinson, Shinelle, Bing Zhou, and Umit Karabiyik. "Are We Really Protected? An Investigation into the Play Protect Service." In 2019 IEEE International Conference on Big Data (Big Data). IEEE, 2019. http://dx.doi.org/10.1109/bigdata47090.2019.9006100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Toll, D., E. Engman, K. Arsenault, L. Friedl, C. Peters-Lidard, A. Pinheiro, J. Nigro, and J. Triggs. "Protect and Monitor Water Resources." In 2006 IEEE International Symposium on Geoscience and Remote Sensing. IEEE, 2006. http://dx.doi.org/10.1109/igarss.2006.900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Шахаева, Фатима Магомедовна, and Сайд-Магомед Аббазович Осмаев. "WARNING WAYS TO PROTECT COPYRIGHT." In Высокие технологии и инновации в науке: сборник избранных статей Международной научной конференции (Санкт-Петербург, Май 2020). Crossref, 2020. http://dx.doi.org/10.37539/vt185.2020.28.78.019.

Full text
Abstract:
В статье рассматриваются предупредительные способы защиты авторских прав, в том числе и технические, дается подробная характеристика и оценка данным способам. The article discusses precautionary methods of copyright protection, including technical, provides a detailed description and evaluation of these methods.
APA, Harvard, Vancouver, ISO, and other styles
10

Poulallion, P. L., L. A. de Abreu Moreira, and J. L. R. Dominguez. "Protect the Forest With LNG." In SPE Gas Technology Symposium. Society of Petroleum Engineers, 1993. http://dx.doi.org/10.2118/26162-ms.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Protect"

1

Newmark, R. Innovative Technologies to Protect Water Supplies. Office of Scientific and Technical Information (OSTI), July 2004. http://dx.doi.org/10.2172/15014411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Doerry, Armin W. Radar Design to Protect Against Surprise. Office of Scientific and Technical Information (OSTI), February 2015. http://dx.doi.org/10.2172/1171595.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Erin Eastwood, Erin Eastwood. Using DNA to Protect Fiji's Fisheries. Experiment, January 2014. http://dx.doi.org/10.18258/1836.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Jishnu, Das, Benjamin Daniels, and Tahir Andrabi. We Have to Protect the Kids. Research on Improving Systems of Education (RISE), May 2020. http://dx.doi.org/10.35489/bsg-rise-ri_2020/016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sadun, Raffaella. Does Planning Regulation Protect Independent Retailers? Cambridge, MA: National Bureau of Economic Research, January 2014. http://dx.doi.org/10.3386/w19797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Marter, W. L. Proposed Release Guides to Protect Aquatic Biota. Office of Scientific and Technical Information (OSTI), March 2001. http://dx.doi.org/10.2172/781033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pangman, Dale. Can the U.S. Adequately Protect Its Forces? Fort Belvoir, VA: Defense Technical Information Center, June 1997. http://dx.doi.org/10.21236/ada328095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Seyle, D. Conor. Business Participation in the Responsibility to Protect. One Earth Future Foundation, April 2013. http://dx.doi.org/10.18289/oef.2013.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hillman, K. THYRATRON-PROTECT SYSTEM FOR POLARIZED PROTON MODULATORS. Office of Scientific and Technical Information (OSTI), June 1985. http://dx.doi.org/10.2172/1151134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Atack, Jeremy, and Fred Bateman. Whom Did Protective Legislation Protect? Evidence From 1880. Cambridge, MA: National Bureau of Economic Research, December 1991. http://dx.doi.org/10.3386/h0033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography