Academic literature on the topic 'Trojes'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Trojes.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Trojes"

1

Sol-Sánchez, Ángel, Julian Perez-Flores, Gloria Isela Hernandez-Melchor, Claudia Elena Centeno-Ruiz, Fátima Baqueros-Ballón, and Carlos Alberto Zúniga-González. "Flora arbórea y usos en la cuenca baja del Río Tonalá, Tabasco, México." Revista Iberoamericana de Bioeconomía y Cambio Climático 2, no. 1 (January 30, 2016): 20–42. http://dx.doi.org/10.5377/ribcc.v2i1.5675.

Full text
Abstract:
El presente trabajo se realizó en la cuenca baja del río Tonalá, en los municipios de Cardenas y Huimanguillo, Tabasco, México, con el objetivo de inventariar las especies arbóreas presentes en las localidades de La Venta, Villa Benito Juárez, Paylebot, Cuautemoczin y el Yucateco. Se realizaron entrevistasa los copreros, ganaderos, tasisteros, carboneros,mangleros y carpinteros. Se registro la presencia de 58 especies y 54 géneros, agrupadas en 26 familias botánicas. Las familias más frecuentes fueron Fabaceae, Arecaceae, Moraceae, Anacardiaceae, Combretaceae y Sapindaceae. se registro que el 33% de las especies se desarrollan en áreas inundables y 67% en áreas parcialmente inundadas. Los usos más comunes de estas especies son: combustible, para construcción (cimbra), mango de herramientas, muebles, carpintería, postes, cercos vivos, alimento, medicina y otros. El mangle rojo, se emplea en la construcción de casas, elaboración de carbón, leña y artesanías. La madera del estípite del coco se emplea para la elaboración de muebles, bases para macetas y figuras artesanales; con la copra molida se elabora cocoa y chocolates. Las frondas de las palmas de guano largo se utilizan para el techado de casas, trojes y graneros. El tasiste se emplea para cercos, postes, graneros y en la elaboración de mesas, sillas, camas, comedores entre otros.De la flora registrada Avicennia germinans L., Calophyllum brasiliense Camb., Laguncularia racemosa (L). Gaertn., Rhizophora mangle L., Roystonea regia H.B.K. y Spondias radlkoferi Donn. Smith, son especies amenazadas de acuerdo ala NOM-059-ECOL-2010.
APA, Harvard, Vancouver, ISO, and other styles
2

Jones, Michael J., M. Lenoble, J. Deborde, J. Troadec, F. Gama, and C. Sapin. "Troyes." Britannia 32 (2001): 414. http://dx.doi.org/10.2307/526978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Daly, Chris. "Tropes." Proceedings of the Aristotelian Society 94, no. 1 (June 1, 1994): 253–62. http://dx.doi.org/10.1093/aristotelian/94.1.253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wallace, Ronald. "Tropes." Iowa Review 27, no. 3 (December 1997): 190. http://dx.doi.org/10.17077/0021-065x.4863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

McQuitty, Jane, and Kim Huynh. "Dialogic Tropes:." Cultural and Pedagogical Inquiry 12, no. 1 (February 1, 2021): 318–30. http://dx.doi.org/10.18733/cpi29561.

Full text
Abstract:
Calgary-based installation artist and printmaker Kim Huynh’s projects are profoundly aware of materiality and ways in which it can encourage us to jump out of the ruts and customary ways of categorizing and thinking in late Capitalism. The media that Kim Huynh adopts can range from the extraordinary to the banal, from a vast string of pearls to orange peels. This short interview with Kim Huynh investigates matters that are material and conceptual, incorporated into two projects referencing social injustice and embodied female experiences.
APA, Harvard, Vancouver, ISO, and other styles
6

Rojek, Paweł. "If Tropes." Polish Journal of Philosophy 1, no. 1 (2007): 151–54. http://dx.doi.org/10.5840/pjphil20071127.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Jack, Alison. "Sacred Tropes." Theology & Sexuality 17, no. 2 (May 2011): 218–20. http://dx.doi.org/10.1558/tse.v17i2.218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Smith, Cherise. "Persistent Tropes." Art Journal 78, no. 4 (October 2, 2019): 20–23. http://dx.doi.org/10.1080/00043249.2019.1684106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nanay, Bence. "Perceiving tropes." Erkenntnis 77, no. 1 (August 17, 2011): 1–14. http://dx.doi.org/10.1007/s10670-011-9282-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

LaBossiere, Michael C. "“SWAPPED TROPES”." Pacific Philosophical Quarterly 74, no. 3 (September 1993): 258–64. http://dx.doi.org/10.1111/j.1468-0114.1993.tb00362.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Trojes"

1

Spears, Samuel Bruce. "A Study of Michael Praetorius' Megalynodia Sionia: An Historical and Stylistic Analysis and Selective Performing Edition." Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_dissertations/283.

Full text
Abstract:
Michael Praetorius was one of the most prolific and innovative Lutheran composers of the early seventeenth century. His Megalynodia Sionia ("The Magnificats of Zion") is a collection of fourteen Magnificats for use in Vespers services. The compositions in the collection present a series of complicated issues that modern editors and performers must unravel to be able to perform this music. The most common method for performing Magnificats at this time was alternatim, in which different musical groups alternated in performing verses. For eleven of the Magnificats in Megalynodia, only six of the twelve verses are supplied by Praetorius. Appropriate sources for the other verses must be identified. Also, there was a tradition in the Lutheran church of inserting chorales between the verses of the Magnificat on feast days. The chorales would be songs associated with the occasion, for example Christmas or Easter. Praetorius gives important instructions to prospective performers as to how these insertions should be chosen and performed. Eleven of the Magnificats are parodies of works by other composers, Orlando di Lasso in particular. Parody technique is the use of polyphonic music by another composer as source material for a new composition. It was a very typical compositional method of the sixteenth century. Lasso started a Continental tradition of using parody technique in the Magnificat; in this collection Praetorius follows in his footsteps. One must take all these issues into account in attempting to create modern performing editions of this music. The study culminates in performing editions of two Magnificats from the collection.
APA, Harvard, Vancouver, ISO, and other styles
2

Dharmadhikari, Pranav Hemant. "Hardware Trojan Detection in Sequential Logic Designs." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1543919236213844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Raju, Akhilesh. "Trojan Detection in Hardware Designs." University of Cincinnati / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1504781162418081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Karlsson, Ola. "A Study of Jupiter Trojans." Doctoral thesis, Uppsala universitet, Institutionen för fysik och astronomi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-172151.

Full text
Abstract:
Jupiter Trojan asteroid dynamics have been studied for a long time but it is only within the last decades that the known population has become large enough to make other studies meaningful. In four articles I have been scratching the surface of the unknown Trojan knowledge space. Paper I presents photometric observations confirming a larger variety in surface redness for the smaller Trojans compared to the larger ones, in line with the groups in the outer main asteroid belt. However, the largest Trojans are significantly redder compared to the largest Cybele and Hilda asteroids. Paper II is an investigation of the Trojan discovery completeness. The analysis shows that all Trojans down to a limiting absolute magnitude of H=11.5 mag have been discovered. Missing Trojans in the almost discovery-completed section should have inclinations above the mean of the same group. The faintest Trojans are discovery biased due to orbit orientations similar to the Milky Way. Paper III is a general review of dynamical and physical properties of the discovery-completed sample of Jupiter Trojans found in Paper II. The two Trojan swarms are often treated as being equal, but are different in a number of details. Two known facts are that the L5 swarm is less rich, while the L4 swarm has a larger fraction of low inclination Trojans. Trojans are in general red objects but the mean redness is higher for Trojans which have not collided compared to Trojans in families. Paper IIII is an investigation of Trojan collisions, family detection and evolution. Collision circumstances were mapped using numerical simulations and recorded Trojan close approaches. Synthetic families were created and evolved numerically. The result suggests that the HCM family detection technique can find Trojan families even in a densely populated parameter space. However, interlopers cannot be avoided at any level but their contribution should be less than 30%. Synthetic families can be identified with backwards orbital integrations for times up to a Gyr-scale. However, there are discrepancies between real Trojan families and my synthetic families.
APA, Harvard, Vancouver, ISO, and other styles
5

Parisi, Anthony. "A theory of constitutive tropes." Diss., University of Iowa, 2019. https://ir.uiowa.edu/etd/7009.

Full text
Abstract:
The purpose of this work is to provide a metaphysical theory of properties and scientific laws. This sentence will require some unpacking. By a ‘metaphysical’ theory here, I mean a theory of what exists in the world. In this investigation I am primarily concerned with a theory of what properties there are in the world and the role they play in scientific laws. This may be contrasted with a linguistic or epistemic project, as it is not primarily about our language, ideas, or theorizing but rather about what is in the world itself. Properties are what we may pre-philosophically think of as the characteristics of an object: such as its height, weight, color, etc. Investigation may cause us to doubt whether some of these pre-philosophical properties are genuine in a metaphysical sense: whether or not the property is actually present as a feature of the world. By scientific laws, I mean the statements we make in the form of exceptionless generalities about the world within the sciences. Here I do not mean to evaluate how science comes about these generalizations, only that they do and how these generalizations may be grounded in a metaphysical theory of properties. The link between these two things: properties and scientific laws, comes about because our scientific laws prominently feature properties: velocity, temperature, charge, viscosity, etc. After a review of some of the theories currently proposed in the philosophical literature along with a treatment of some of the problems that arise out of these theories, I will propose a new theory. This theory, entitled ‘Constitutive Trope Theory’ is a form of a ‘bundle trope theory’ as it proposes that objects in the world are composed entirely out of particularized properties. However, rather than proposing a primitive relation that does the bundling, this theory will propose that, at least for the objects we are familiar with, properties arise out of relations between lower-level properties that instantiate them. For example, a mammal may exist because of the relationship between the organs that lead to its unique properties as a mammal. Those organs in turn exist because of relationships between their cells that lead to their unique properties as a particular kind of organ. And so on down the chain until we hit ‘foundational properties’: properties which are not dependent on any other properties for their existence. I will say very little about these properties as I do not believe that any such properties have currently been found and will argue that such theorizing is premature before such properties have been empirically identified. Following this account, I will consider some of the problems that must be overcome and some final considerations in favor of this theory over other competing theories of properties and scientific laws.
APA, Harvard, Vancouver, ISO, and other styles
6

Hellwig, Heinrik Ziehm. "Why tropes cannot be metaphysically simple." Texas A&M University, 2008. http://hdl.handle.net/1969.1/85955.

Full text
Abstract:
A popular concept in contemporary metaphysics is that of metaphysical simplicity - the idea that an existent can have no parts. One reason for this is that the notion of a simple is crucial to discussions of the composition of single objects. Simples, if real, are the basic units that, when combined in various ways, make up all other objects. Keith Campbell claims that tropes - particularized properties - can be simple. In this essay I argue, against Campbell, that tropes cannot be simple. They are made up of at least two parts - a bare particular and a universal. In Section 1 I give an exhaustive account of what it is to be a simple. Then in Section 2 I discuss basic particulars and what conditions must hold for a simple to be basic. Then in Section 3 I explain the nature of tropes and sketch out the parameters of Campbell's trope ontology. In Section 4 I argue that simple tropes actually have universal properties as parts. In Section 5 I give a logical argument to prove the correctness of the argument in Section 4. Then in Section 6 I take up several possible objections to my claim that tropes are not simple and argue that each one fails. Finally in Section 7 I conclude that tropes need to have an individuating component as a part and remark that tropes' location is not sufficient to be this component. My final claim is that tropes are not simple and they cannot be basic units in any robust sense.
APA, Harvard, Vancouver, ISO, and other styles
7

Lombardo, Eugenio Sergio Giovanni. "Dispositions, tropes and laws of nature." Thesis, University of Nottingham, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.403312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bücker, Andreas. "Liturgical theology : Tropes at Ottonian Reichenau." Thesis, University of Cambridge, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.620470.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Berman, Julia E. "African American tropes in popular film /." free to MU campus, to others for purchase, 2003. http://wwwlib.umi.com/cr/mo/fullcit?p3091899.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Scotti, Alba. "Transalpine Hintergründe der liturgischen Musikpraxis im mittelalterlichen Patriarchat Aquileia : Untersuchungen zu den Responsoriumstropen /." Hildesheim [u.a.] : Olms, 2006. http://deposit.d-nb.de/cgi-bin/dokserv?id=2869715&prov=M&dok_var=1&dok_ext=htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Trojes"

1

Barthelemy, Ricardo. La casa en el bosque: Las "trojes" de Michoacán. [Zamora, Michoacán de Ocampo, Mexico]: Colegio de Michoacán, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ostaszewski, Robert. Troję pomścimy. Kraków: IKON, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maurin, Anna-Sofia. If Tropes. Dordrecht: Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-017-0079-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

If tropes. Dordrecht: Kluwer Academic Publishers, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Walter, Philippe. Chrétien de Troyes. Paris: PUF, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Crowell, Bill. Atlantic treasure troves. Hantsport, N.S: Lancelot Press, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Tientos y trotes. Santo Domingo, República Dominicana: Editora Nacional, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rose, Peter I. Tropes of Intolerance. New York, NY: Routledge, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9780429296369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chrétien de Troyes. Paris: Tallandier, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Aribau, Bonaventura Carles. La pàtria: Trobes. [Catalunya]: Biblioteca de Catalunya, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Trojes"

1

Bak, John S. "Of Troops and Tropes." In The Routledge Companion to American Literary Journalism, 235–55. London ; New York : Routledge, [2020] |: Routledge, 2019. http://dx.doi.org/10.4324/9781315526010-17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maurin, Anna-Sofia. "Tropes." In If Tropes, 8–24. Dordrecht: Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-017-0079-5_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Harris, Randy Allen. "The Tropes." In The Routledge Handbook of Language and Persuasion, 227–45. London: Routledge, 2022. http://dx.doi.org/10.4324/9780367823658-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Maurin, Anna-Sofia. "Introduction." In If Tropes, 1–7. Dordrecht: Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-017-0079-5_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Maurin, Anna-Sofia. "Metaphysics." In If Tropes, 25–36. Dordrecht: Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-017-0079-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maurin, Anna-Sofia. "Truth-Making." In If Tropes, 37–58. Dordrecht: Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-017-0079-5_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Maurin, Anna-Sofia. "The Problem of Universalisation." In If Tropes, 59–116. Dordrecht: Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-017-0079-5_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Maurin, Anna-Sofia. "The Problem of Thing-Construction." In If Tropes, 117–80. Dordrecht: Springer Netherlands, 2002. http://dx.doi.org/10.1007/978-94-017-0079-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lin, Lang, Markus Kasper, Tim Güneysu, Christof Paar, and Wayne Burleson. "Trojan Side-Channels: Lightweight Hardware Trojans through Side-Channel Engineering." In Lecture Notes in Computer Science, 382–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04138-9_27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wild, Gerhard. "Chrétien de Troyes." In Kindlers Literatur Lexikon (KLL), 1. Stuttgart: J.B. Metzler, 2020. http://dx.doi.org/10.1007/978-3-476-05728-0_3156-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Trojes"

1

Vashistha, Nidish, Hangwei Lu, Qihang Shi, M. Tanjidur Rahman, Haoting Shen, Damon L. Woodard, Navid Asadizanjani, and Mark Tehranipoor. "Trojan Scanner: Detecting Hardware Trojans with Rapid SEM Imaging Combined with Image Processing and Machine Learning." In ISTFA 2018. ASM International, 2018. http://dx.doi.org/10.31399/asm.cp.istfa2018p0256.

Full text
Abstract:
Abstract Hardware Trojans are malicious changes to the design of integrated circuits (ICs) at different stages of the design and fabrication processes. Different approaches have been developed to detect Trojans namely non-destructive (electrical tests like run-time monitoring, functional and structural tests) and destructive (full chip reverse engineering). However, these methods cannot detect all types of Trojans and they suffer from a number of disadvantages such as slow speed of detection and lack of confidence in detecting all types of Trojans. Majority of hardware Trojans implemented in an IC will leave a footprint at the doping (active) layer. In this paper, we introduce a new version of our previously developed “Trojan Scanner” [1] framework for the untrusted foundry threat model, where a trusted GDSII layout (golden layout) is available. Advanced computer vision algorithms in combination with the supervised machine-learning model are used to classify different features of the golden layout and SEM images from an IC under authentication, as a unique descriptor for each type of gates. These descriptors are compared with each other to detect any subtle changes on the active region, which can raise the flag for the existence of a potential hardware Trojan. The descriptors can differentiate variation due to fabrication process, defects, and common SEM image distortions to rule out the possibility of false detection. Our results demonstrate that Trojan Scanner is more reliable than electrical testing and faster than full chip reverse engineering. Trojan Scanner does not rely on the functionality of the circuit rather focuses on the real physical structure to detect malicious changes inserted by the untrusted foundry.
APA, Harvard, Vancouver, ISO, and other styles
2

Helbert, Jörn, Anko Börner, Alessandro Maturilli, Mario D'Amore, Matthias Grott, Jörg Knollenberg, Gabriele E. Arnold, et al. "Mapping Trojan asteroids in the thermal infrared with TROTIS." In Infrared Remote Sensing and Instrumentation XXVI, edited by Marija Strojnik and Maureen S. Kirk. SPIE, 2018. http://dx.doi.org/10.1117/12.2320111.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Becker, Georg T., Ashwin Lakshminarasimhan, Lang Lin, Sudheendra Srivathsa, Vikram B. Suresh, and Wayne Burelson. "Implementing hardware Trojans: Experiences from a hardware Trojan challenge." In 2011 IEEE 29th International Conference on Computer Design (ICCD 2011). IEEE, 2011. http://dx.doi.org/10.1109/iccd.2011.6081414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhou, Xinzhe, Wenhao Jiang, Sheng Qi, and Yadong Mu. "Multi-Target Invisibly Trojaned Networks for Visual Recognition and Detection." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. California: International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/477.

Full text
Abstract:
Visual backdoor attack is a recently-emerging task which aims to implant trojans in a deep neural model. A trojaned model responds to a trojan-invoking trigger in a fully predictable manner while functioning normally otherwise. As a key motivating fact to this work, most triggers adopted in existing methods, such as a learned patterned block that overlays a benigh image, can be easily noticed by human. In this work, we take image recognition and detection as the demonstration tasks, building trojaned networks that are significantly less human-perceptible and can simultaneously attack multiple targets in an image. The main technical contributions are two-folds: first, under a relaxed attack mode, we formulate trigger embedding as an image steganography-and-steganalysis problem that conceals a secret image in another image in a decipherable and almost invisible way. In specific, a variable number of different triggers can be encoded into a same secret image and fed to an encoder module that does steganography. Secondly, we propose a generic split-and-merge scheme for training a trojaned model. Neurons are split into two sets, trained either for normal image recognition / detection or trojaning the model. To merge them, we novelly propose to hide trojan neurons within the nullspace of the normal ones, such that the two sets do not interfere with each other and the resultant model exhibits similar parameter statistics to a clean model. Comprehensive experiments are conducted on the datasets PASCAL VOC and Microsoft COCO (for detection) and a subset of ImageNet (for recognition). All results clearly demonstrate the effectiveness of our proposed visual trojan method.
APA, Harvard, Vancouver, ISO, and other styles
5

Plusquellic, Jim, and Dhruva Acharyya. "Leveraging the Power Grid for Localizing Trojans and Defects." In ISTFA 2010. ASM International, 2010. http://dx.doi.org/10.31399/asm.cp.istfa2010p0338.

Full text
Abstract:
Abstract The finite, non-zero resistance of the metal wires that define the power grid of chips require the insertion of multiple ports between the grid and the external power supply in order to meet voltage stability requirements across the 2-D plane of the chip. The ports connect to the power grid along its edges for peripheral pad configurations, while, for C4 or array pad configurations, the ports are distributed across the 2-D surface of the chip. In either case, the availability of multiple power ports can be leveraged for detecting and localizing defects and/or Trojan circuits. A localization technique is investigated in this paper that analyzes anomalies introduced by defects and/or Trojans in the measured IDDQs from these ports. The localization accuracy of the technique can be improved significantly through the use of calibration and additional information collected from simulation experiments. The method and model are validated using data collected from a set of chips fabricated in an IBM 65 nm SOI process.1
APA, Harvard, Vancouver, ISO, and other styles
6

Hasan, Syed Rafay, Charles A. Kamhoua, Kevin A. Kwiat, and Laurent Njilla. "Translating circuit behavior manifestations of hardware Trojans using model checkers into run-time Trojan detection monitors." In 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST). IEEE, 2016. http://dx.doi.org/10.1109/asianhost.2016.7835571.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

MAURIN, ANNA-SOFIA. "A WORLD OF TROPES?" In Proceedings of the 5th Metaphysics of Science Workshop. WORLD SCIENTIFIC, 2009. http://dx.doi.org/10.1142/9789814299053_0008.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kareva, Natalia, and Evgeniy Matveev. "Names of tropes and fi gures of speech in the philological works by Lomonosov and his predecessors." In Tenth Rome Cyril-Methodian Readings. Indrik, 2020. http://dx.doi.org/10.31168/91674-576-4.10.

Full text
Abstract:
The paper focuses on the comparison of the terminology of tropes and fi gures in the rhetorical treatises by M. Lomonosov and in the East Slavonic rhetorical treatises of the 17th century. Unlike his pre-decessors, Lomonosov provides strict differentiation between Greek borrowings and lexemes which are Russian by origin and doesn’t allow any terminological redundancy. Oscillations that Lomonosov experienced during the nomination of tropes and fi gures are also analyzed. It is shown how exactly Lomonosov creatively works on the terminological heritage of his predecessors. We also reveal the source of the list of fi gures placed in the «Materials for Russian grammar».
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Yan. "On Tropes in English News." In International Conference on Education, Management, Computer and Society. Paris, France: Atlantis Press, 2016. http://dx.doi.org/10.2991/emcs-16.2016.128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Toombs, Austin L. "Hackerspace Tropes, Identities, and Community Values." In DIS '17: Designing Interactive Systems Conference 2017. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3064663.3064760.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Trojes"

1

Beckert, Chris. Building a Better Trojan Horse. Fort Belvoir, VA: Defense Technical Information Center, August 2000. http://dx.doi.org/10.21236/ada399678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

von Balthasar, Hans Urs. Trois formes d’abandon. Saint John Publications, 2022. http://dx.doi.org/10.56154/rp.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cohen, Lauren, Umit Gurun, and Scott Duke Kominers. Patent Trolls: Evidence from Targeted Firms. Cambridge, MA: National Bureau of Economic Research, August 2014. http://dx.doi.org/10.3386/w20322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Onoszko, Peter W. Horse-Mounted Troops in Low Intensity Conflict. Fort Belvoir, VA: Defense Technical Information Center, June 1991. http://dx.doi.org/10.21236/ada237625.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rodrigue, G., P. Francus, and D. Fortin. Contexte paléoenvironnemental d'un lac à troncs subfossiles. Natural Resources Canada/CMSS/Information Management, 2021. http://dx.doi.org/10.4095/328078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bulent, Kenes. Jobbik: A Turanist Trojan Horse in Europe? European Center for Populism Studies (ECPS), August 2020. http://dx.doi.org/10.55271/op0002.

Full text
Abstract:
Defined as Turanist, Eurasianist, pro-Russian, pro-Iranian, anti-immigrant but pro-Islam, racist, antisemitic, anti-Roma, Hungarist, and radically populist, Jobbik do not exist in a vacuum. The rise of Jobbik from deep nationalist, antisemitic, and anti-Roma currents in Hungarian politics dates back to the late 1980s and early 1990s. Despite its extensive efforts at “image refurbishment” in recent years, Jobbik remains a populist, revisionist, racist, radical right-wing party that threatens to destabilize Hungary, the neighboring region, and the EU.
APA, Harvard, Vancouver, ISO, and other styles
7

Marshak, Ronni. Angie’s List Doesn’t Arm Its Front-Line Troops. Boston, MA: Patricia Seybold Group, April 2015. http://dx.doi.org/10.1571/wp04-16-15cc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gebhardt, James F. Soviet Front Special Purpose Troops: An Historical Perspective. Fort Belvoir, VA: Defense Technical Information Center, June 1990. http://dx.doi.org/10.21236/ada232825.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Guillaume, Clément. Le Développement du moi et le procédé thérapeutique dans les œuvres de Chrétien de Troyes. Portland State University Library, January 2000. http://dx.doi.org/10.15760/etd.989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Grossman, yuval. Trojan Penguins and Isospin Violation in Hadronic B Decays. Office of Scientific and Technical Information (OSTI), September 1999. http://dx.doi.org/10.2172/12482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography