Gotowa bibliografia na temat „Secure omniscience”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Secure omniscience”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Secure omniscience"
Tamanoi, Mariko Asano. "Knowledge, Power, and Racial Classifications: The “Japanese” in “Manchuria”". Journal of Asian Studies 59, nr 2 (maj 2000): 248–76. http://dx.doi.org/10.2307/2658656.
Pełny tekst źródłaBadica, Andreea Liliana, i Mircea Ovidiu Mitucă. "IOT-Enhanced Digital Marketing Conceptual Framework". BRAIN. Broad Research in Artificial Intelligence and Neuroscience 12, nr 4 (20.12.2021): 509–31. http://dx.doi.org/10.18662/brain/12.4/262.
Pełny tekst źródłaMali, Mateus. "Teodise dan Covid-19". DUNAMIS: Jurnal Teologi dan Pendidikan Kristiani 7, nr 2 (9.01.2023): 592–609. http://dx.doi.org/10.30648/dun.v7i2.830.
Pełny tekst źródłaBarker, George. "A Comparative Institutional Approach to Law and Legal Institutions". Victoria University of Wellington Law Review 26, nr 1 (1.02.1996): 109. http://dx.doi.org/10.26686/vuwlr.v26i1.6181.
Pełny tekst źródłaEka Maulana, Dimas. "ANALISIS TEKNIK RESTRICTED NARRATION DALAM MEMBANGUN DRAMATIK PADA SINEMATOGRAFI FILM 1917 KARYA SAM MENDES". TONIL: Jurnal Kajian Sastra, Teater dan Sinema 19, nr 2 (17.12.2022): 90–103. http://dx.doi.org/10.24821/tnl.v19i2.7857.
Pełny tekst źródłaNgala, Erna, i Veydy Yanto Mangantibe. "Penginjilan Terhadap Masyarakat Plural Berdasarkan Surat Efesus". Excelsis Deo: Jurnal Teologi, Misiologi, dan Pendidikan 5, nr 1 (29.06.2021): 1–16. http://dx.doi.org/10.51730/ed.v5i1.58.
Pełny tekst źródłaAshimi, Tijani Ahmad. "Islam and the Acquisition of Knowledge (Islam dan Perolehan Ilmu)". Journal of Islam in Asia (E-ISSN: 2289-8077) 14, nr 3 (21.01.2018): 311–25. http://dx.doi.org/10.31436/jia.v14i3.635.
Pełny tekst źródłaRihatno, Taufik. "PELATIHAN BRAIN GYM (SENAM OTAK) PADA PESERTA PPG ASRAMA RUSUNAWA 1 UNIVERSITAS NEGERI JAKARTA". Sarwahita 14, nr 02 (1.12.2017): 123–31. http://dx.doi.org/10.21009/sarwahita.142.06.
Pełny tekst źródłaWorsley, Peter John. "Some Thoughts About Genre in Old Javanese Literature". Jumantara: Jurnal Manuskrip Nusantara 12, nr 2 (2.12.2021). http://dx.doi.org/10.37014/jumantara.v12i2.1148.
Pełny tekst źródłaKarimi, Negin, Ahmad Yousefian Darani i Marcus Greferath. "Correcting adversarial errors with generalized regenerating codes". Advances in Mathematics of Communications, 2022, 0. http://dx.doi.org/10.3934/amc.2022005.
Pełny tekst źródłaRozprawy doktorskie na temat "Secure omniscience"
Mukherjee, Manuj. "Secret Key Generation in the Multiterminal Source Model : Communication and Other Aspects". Thesis, 2017. http://etd.iisc.ernet.in/2005/3783.
Pełny tekst źródłaKsiążki na temat "Secure omniscience"
Jones, Charlotte. Realism, Form, and Representation in the Edwardian Novel. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780198857921.001.0001.
Pełny tekst źródłaCzęści książek na temat "Secure omniscience"
Schuldiner, Ruth. "The Narrative Tease: Narratorial Omniscience, Implicature and the Making of Sensation in Lady Audley’s Secret". W Pragmatic Literary Stylistics, 172–91. London: Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137023278_10.
Pełny tekst źródła"Chapter Five On Doubt and Self-Understanding: The Omniscience of an Author and his Arch-Exponent". W The Secret Sankara, 51–61. BRILL, 2011. http://dx.doi.org/10.1163/9789004216334_006.
Pełny tekst źródła"the novel, to the embroidered message in Ethiopian hieroglyphs which Persinna exposed with her daughter and which remained unread until Kalasiris tracked her down in Delphi and deciph ered it: Above all, be sure to find among the treasures that I laid beside you a certain ring. Keep it by you always. It was a gift that your father gave me during our courtship, engraved all around with the royal crest and set with a pantar be jewel that endows it with holy, mystic powers. (4.8.7) These holy, mystic powers are unspecified.9 Nevertheless, the mere mention of them would lead a competent reader to surmise that the plot would exploit them sooner or later, and an exceptionally alert reader might beat the author to the connection in Book 8. It is not difficult to find other sections within the narrative of the Aithiopika which are constructed as riddles, a vital piece of information being kept back and then released as an answer. Two more examples can be mentioned briefly, both from the ninth book, whose military subject matter could easily lead to the false assumption that its narrative technique is simple. Oroondates is besieged by the Ethiopians in Syene. He parleys with them, and secures their permission to send two envoys to his troops at Elephantine, ostensibly to negotiate their surrender at the same time as his. His real motives are not divulged, nor are they when he makes an apparently impossible break-out and stealthily enters Elephantine by night (9.7ff.). The riddle set is: what is his plan?, and, as is by now familiar, the reader’s ignorance is produced by the exploitation of partial in-text viewpoints. In this case all Oroondates’ actions are described as seen by the Ethiopians with out authorial explanation. Some additional clues are given later in the narrative, but the full answer is withheld until the moment when the Persian army from Elephantine suddenly turns up with Oroondates at its head (9.13), at which point the omniscient nar rator intervenes to fill in the gaps he had left in his own narrative. There ensues a battle, in which the Persians have a seemingly decisive weapon, their armoured cavalry. A lengthy description stresses the totality of the protection of both rider and horse and the awesome power of their arms (9.15). Against them Hydaspes stations troops of the Blemmyes and Seres, two subject nations, with special instructions which are not communicated to the". W Greek Literature in the Roman Period and in Late Antiquity, 325. Routledge, 2014. http://dx.doi.org/10.4324/9780203616895-40.
Pełny tekst źródłaStreszczenia konferencji na temat "Secure omniscience"
Chan, Chung, Navin Kashyap, Praneeth Kumar Vippathalla i Qiaoqiao Zhou. "Secure Information Exchange for Omniscience". W 2020 IEEE International Symposium on Information Theory (ISIT). IEEE, 2020. http://dx.doi.org/10.1109/isit44484.2020.9174231.
Pełny tekst źródłaVippathalla, Praneeth Kumar, Chung Chan, Navin Kashyap i Qiaoqiao Zhou. "Secret Key Agreement and Secure Omniscience of Tree-PIN Source with Linear Wiretapper". W 2021 IEEE International Symposium on Information Theory (ISIT). IEEE, 2021. http://dx.doi.org/10.1109/isit45174.2021.9518075.
Pełny tekst źródłaChan, Chung, Manuj Mukherjee, Navin Kashyap i Qiaoqiao Zhou. "When is omniscience a rate-optimal strategy for achieving secret key capacity?" W 2016 IEEE Information Theory Workshop (ITW). IEEE, 2016. http://dx.doi.org/10.1109/itw.2016.7606855.
Pełny tekst źródła