Literatura académica sobre el tema "Secure omniscience"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Secure omniscience".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Secure omniscience"
Tamanoi, Mariko Asano. "Knowledge, Power, and Racial Classifications: The “Japanese” in “Manchuria”." Journal of Asian Studies 59, no. 2 (2000): 248–76. http://dx.doi.org/10.2307/2658656.
Texto completoBadica, Andreea Liliana, and Mircea Ovidiu Mitucă. "IOT-Enhanced Digital Marketing Conceptual Framework." BRAIN. Broad Research in Artificial Intelligence and Neuroscience 12, no. 4 (2021): 509–31. http://dx.doi.org/10.18662/brain/12.4/262.
Texto completoMali, Mateus. "Teodise dan Covid-19." DUNAMIS: Jurnal Teologi dan Pendidikan Kristiani 7, no. 2 (2023): 592–609. http://dx.doi.org/10.30648/dun.v7i2.830.
Texto completoBarker, George. "A Comparative Institutional Approach to Law and Legal Institutions." Victoria University of Wellington Law Review 26, no. 1 (1996): 109. http://dx.doi.org/10.26686/vuwlr.v26i1.6181.
Texto completoEka Maulana, Dimas. "ANALISIS TEKNIK RESTRICTED NARRATION DALAM MEMBANGUN DRAMATIK PADA SINEMATOGRAFI FILM 1917 KARYA SAM MENDES." TONIL: Jurnal Kajian Sastra, Teater dan Sinema 19, no. 2 (2022): 90–103. http://dx.doi.org/10.24821/tnl.v19i2.7857.
Texto completoNgala, Erna, and Veydy Yanto Mangantibe. "Penginjilan Terhadap Masyarakat Plural Berdasarkan Surat Efesus." Excelsis Deo: Jurnal Teologi, Misiologi, dan Pendidikan 5, no. 1 (2021): 1–16. http://dx.doi.org/10.51730/ed.v5i1.58.
Texto completoAshimi, Tijani Ahmad. "Islam and the Acquisition of Knowledge (Islam dan Perolehan Ilmu)." Journal of Islam in Asia (E-ISSN: 2289-8077) 14, no. 3 (2018): 311–25. http://dx.doi.org/10.31436/jia.v14i3.635.
Texto completoRihatno, Taufik. "PELATIHAN BRAIN GYM (SENAM OTAK) PADA PESERTA PPG ASRAMA RUSUNAWA 1 UNIVERSITAS NEGERI JAKARTA." Sarwahita 14, no. 02 (2017): 123–31. http://dx.doi.org/10.21009/sarwahita.142.06.
Texto completoWorsley, Peter John. "Some Thoughts About Genre in Old Javanese Literature." Jumantara: Jurnal Manuskrip Nusantara 12, no. 2 (2021). http://dx.doi.org/10.37014/jumantara.v12i2.1148.
Texto completoKarimi, Negin, Ahmad Yousefian Darani, and Marcus Greferath. "Correcting adversarial errors with generalized regenerating codes." Advances in Mathematics of Communications, 2022, 0. http://dx.doi.org/10.3934/amc.2022005.
Texto completoTesis sobre el tema "Secure omniscience"
Mukherjee, Manuj. "Secret Key Generation in the Multiterminal Source Model : Communication and Other Aspects." Thesis, 2017. http://etd.iisc.ernet.in/2005/3783.
Texto completoLibros sobre el tema "Secure omniscience"
Jones, Charlotte. Realism, Form, and Representation in the Edwardian Novel. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198857921.001.0001.
Texto completoCapítulos de libros sobre el tema "Secure omniscience"
Schuldiner, Ruth. "The Narrative Tease: Narratorial Omniscience, Implicature and the Making of Sensation in Lady Audley’s Secret." In Pragmatic Literary Stylistics. Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137023278_10.
Texto completo"Chapter Five On Doubt and Self-Understanding: The Omniscience of an Author and his Arch-Exponent." In The Secret Sankara. BRILL, 2011. http://dx.doi.org/10.1163/9789004216334_006.
Texto completo"the novel, to the embroidered message in Ethiopian hieroglyphs which Persinna exposed with her daughter and which remained unread until Kalasiris tracked her down in Delphi and deciph ered it: Above all, be sure to find among the treasures that I laid beside you a certain ring. Keep it by you always. It was a gift that your father gave me during our courtship, engraved all around with the royal crest and set with a pantar be jewel that endows it with holy, mystic powers. (4.8.7) These holy, mystic powers are unspecified.9 Nevertheless, the mere mention of them would lead a competent reader to surmise that the plot would exploit them sooner or later, and an exceptionally alert reader might beat the author to the connection in Book 8. It is not difficult to find other sections within the narrative of the Aithiopika which are constructed as riddles, a vital piece of information being kept back and then released as an answer. Two more examples can be mentioned briefly, both from the ninth book, whose military subject matter could easily lead to the false assumption that its narrative technique is simple. Oroondates is besieged by the Ethiopians in Syene. He parleys with them, and secures their permission to send two envoys to his troops at Elephantine, ostensibly to negotiate their surrender at the same time as his. His real motives are not divulged, nor are they when he makes an apparently impossible break-out and stealthily enters Elephantine by night (9.7ff.). The riddle set is: what is his plan?, and, as is by now familiar, the reader’s ignorance is produced by the exploitation of partial in-text viewpoints. In this case all Oroondates’ actions are described as seen by the Ethiopians with out authorial explanation. Some additional clues are given later in the narrative, but the full answer is withheld until the moment when the Persian army from Elephantine suddenly turns up with Oroondates at its head (9.13), at which point the omniscient nar rator intervenes to fill in the gaps he had left in his own narrative. There ensues a battle, in which the Persians have a seemingly decisive weapon, their armoured cavalry. A lengthy description stresses the totality of the protection of both rider and horse and the awesome power of their arms (9.15). Against them Hydaspes stations troops of the Blemmyes and Seres, two subject nations, with special instructions which are not communicated to the." In Greek Literature in the Roman Period and in Late Antiquity. Routledge, 2014. http://dx.doi.org/10.4324/9780203616895-40.
Texto completoActas de conferencias sobre el tema "Secure omniscience"
Chan, Chung, Navin Kashyap, Praneeth Kumar Vippathalla, and Qiaoqiao Zhou. "Secure Information Exchange for Omniscience." In 2020 IEEE International Symposium on Information Theory (ISIT). IEEE, 2020. http://dx.doi.org/10.1109/isit44484.2020.9174231.
Texto completoVippathalla, Praneeth Kumar, Chung Chan, Navin Kashyap, and Qiaoqiao Zhou. "Secret Key Agreement and Secure Omniscience of Tree-PIN Source with Linear Wiretapper." In 2021 IEEE International Symposium on Information Theory (ISIT). IEEE, 2021. http://dx.doi.org/10.1109/isit45174.2021.9518075.
Texto completoChan, Chung, Manuj Mukherjee, Navin Kashyap, and Qiaoqiao Zhou. "When is omniscience a rate-optimal strategy for achieving secret key capacity?" In 2016 IEEE Information Theory Workshop (ITW). IEEE, 2016. http://dx.doi.org/10.1109/itw.2016.7606855.
Texto completo