Showing 1,281 - 1,300 results of 33,375 for search '"authority"', query time: 0.07s Refine Results
  1. 1281

    The Boston Women’s Educational and Industrial Union: When Business Undergirded Claims to Political Participation (1877-1920) by Jeanne Boiteux

    Published 2020-05-01
    “…It is an examination of the ways in which some reform organizations headed and staffed by women could embrace and then flaunt a business ethos in order to increase their standing and authority, especially in the context of public–private partnerships. …”
    Get full text
    Article
  2. 1282

    Jump Diffusion Modelling for the Brazilian Short-Term Interest Rate by José Carlos Nogueira Cavalcante Filho, Edson Daniel Lopes Gonçalves

    Published 2015-01-01
    “…This structure also allows the verification of the information content of specific events, such as Brazilian monetary policy authority (COPOM) meetings and public bond auctions.…”
    Get full text
    Article
  3. 1283

    PEMBINAAN APARATUR PEMERINTAHAN DALAM PELAKSANAAN TUGAS TUGAS ORGANISASI DI BAGIAN UMUM SEKRETARIAT KANTOR BUPATI KABUPATEN DELI SERDANG by Eko Surya

    Published 2016-03-01
    “…In an effort to improve performance, local governments do things that lead to the achievement of the organization at the local authority as mandated in the legislation. Absolute internal improvements done as a provision in the service eksternal.Tujuan this study to see how peminaan conducted by the local government of Deli Serdang Regency to the general secretariat of the apparatus at the office of Regent of Deli Serdang. …”
    Get full text
    Article
  4. 1284

    ¿Primos o hermanos? Nacionalismo, integralismo y humanismo cristiano en la Argentina de los años sesenta by José A. Zanca

    Published 2012-09-01
    “…In this sense, this work considers Christian humanism as «an internal agent of secularization», as its practices and discourse allowed the decrease of the importance of authority in the religious culture.…”
    Get full text
    Article
  5. 1285

    Florida Solid and Hazardous Waste Regulation Handbook: Local Government Structuring by Michael T. Olexa, Aaron Leviten, Kelly Samek

    Published 2004-01-01
    “…These local laws have the authority of the state behind them and you can be prosecuted for violating them, much the same as state laws. …”
    Get full text
    Article
  6. 1286

    An investigation into Calvin's use of Augustine by S. J. Han

    Published 2008-12-01
    “… This article briefly investigates the use of Augustine as an authority from the early church in John Calvin’s writings. …”
    Get full text
    Article
  7. 1287

    “Millions of false eyes / Are stuck upon thee.” The scope of surveillance in Measure for Measure by Sébastien Lefait

    Published 2013-01-01
    “…To this effect, I first relate the surveillance practices of Shakespeare’s time to some of the play’s prevalent thematic pairs: imprisonment and punishment, authority and the prerogatives of the ruler, divine rule and secular law. …”
    Get full text
    Article
  8. 1288

    Les barrages alpins by Alain Marnezy

    Published 2008-03-01
    “…Today, the use of facilities belonging to EDF (French Electricity Authority) to provide water for winter resorts to make artificial snow represents a new phase. …”
    Get full text
    Article
  9. 1289

    La genèse de l’article 64 du code pénal by Laurence Guignard

    Published 2016-04-01
    “…The whole file shows that a lot of difficulties met later, during the 19th C, by the new system founded on penal irresponsibility, civil incapacity and medicalization of madness, had been anticipated in a very precise and concrete way by the discussions of revolutionary and imperial period.For instance, legal definition of insanity or of competent authority (magistrates, experts, group of wise men), detention of insane, or therapeutic order for those who would have been considered as penally irresponsible were hard-debatted, but wise assemblies preferred not to decide anything.…”
    Get full text
    Article
  10. 1290

    Design of Distance English Teaching Application System Combined with Behavioral Cognitive Settlement by Wenqin Liu

    Published 2022-01-01
    “…In the research, relevant technologies such as settlement system integration, automatic scoring, data encryption, authority control and problem matching are introduced, and the system is improved. …”
    Get full text
    Article
  11. 1291

    Qualifier la gestion de l’eau, se positionner par rapport au conflit : les cas de l’usine de dessalement dans la bande de Gaza et du canal entre la mer Rouge et la mer Morte by Klervi Fustec

    Published 2017-04-01
    “…Through these two examples, this article analyzes the relationships between the Palestinian Authority and financial sponsors on the one hand, and the civil society on the other hand. …”
    Get full text
    Article
  12. 1292

    Noms, étiquette(s) et identités dans Persuasion, de Jane Austen by Marie-Laure Massei

    Published 2014-06-01
    “…Jane Austen’s last novel, Persuasion, dramatises the tensions inherent in the decline of the ancient landed order and of its traditional sources of authority, as the emergence of a new social hierarchy, in the wake of the Napoleonic wars, was leading to a questioning of signifiers: patronyms and titles are thus subject to constant reassessment in the novel while the honorific term ‘gentleman’ is threatened with devaluation. …”
    Get full text
    Article
  13. 1293

    Murales et rayados de Valparaíso : entre institutionnalisation et vandalisme by Elsa Bouvier

    Published 2016-05-01
    “…The diversity of the urban inscriptions sends back to different relationships with the authority, and the wall / rayado cleavage crystallizes the political and media debate around the porteñas’ urban inscriptions. …”
    Get full text
    Article
  14. 1294

    Cloud computing based smartphone social authentication system by Yan-bing LIU, Fei-fei LIU

    Published 2012-09-01
    “…Cloud computation provided the capabilities to store and compute infinitely,which can filled the gap of resource constrain.So a cloud-computation based social authentication system for smartphones aimed at the problem that the present authentication methods require a long period of validity of the authentication tokens and make the terminals consume large resources was proposed.The system took three types of social networking features into considered,which were different certification authority between the friends,behavior differences between individual and trust level carried by each interactive event.The results of experiments show that the system can effectively solve the problem that system performance will sharply decline when the expiry date of authentication tokens is short.…”
    Get full text
    Article
  15. 1295

    مهارات الوعى المعلوماتى کنواتج للتعلم فى المعاییر القومیة الأکادیمیة القیاسیة لبرامج التعلیم العالى : دراسة تحلیلیة... by د. ضیاء الدین عبد الواحد

    Published 2017-01-01
    “…This article explores whether and how information literacy skills are reflected in the National Academic Reference Standards (NARS), issued by The National Authority for Quality Assurance, Accreditation of Education and examine the connections between the National standards and information literacy standards.The Results indicate that there is significant overlap between the Learning outcomes required of students and information literacy skills, as well as the standards support for information literacy as an important student learning outcome, Despite differences in terms used to describe these skills.…”
    Get full text
    Article
  16. 1296

    Ut commutando donemus : An Approach to Female Artistic Patronage in Northeast Iberia (1000-1100) by Verónica Carla Abenza Soria

    Published 2022-06-01
    “…By focusing on a representative set of women from the period, one of the main goals of this article is to show that, beyond devotional reasons, artistic patronage helped medieval women overcame some of these social constraints and allowed them to exercise different degrees of power and authority.…”
    Get full text
    Article
  17. 1297

    Research progress of sensor-cloud security by Tian WANG, Yang LI, Weijia JIA, Guojun WANG, Shaoliang PENG

    Published 2018-03-01
    “…Through consulting lots of domestic and international literatures about sensor-cloud security,a series of security problems are found,such as reputation problem of service provider,the coupling problem of physical nodes,the leak of authority management,et al,which seriously hinders the further development of sensor-cloud.The secure problems occurring in sensor-cloud were analyzed,the current secure technologies were contrasted ,similarities and differences of various types solutions were discussed and summarized.After that,several future challenges of sensor-cloud security were concluded.Finally,a fog-based structure was proposed to solve the security problems,which would bring new ideas to the sensor-cloud security research.…”
    Get full text
    Article
  18. 1298

    Reorganization of Public Administration in Turkey and Public Libraries by Bülent Yılmaz

    Published 2005-03-01
    “…For this purpose, related laws such as,“The Law About the Basic Principles and Reorganization of the Public Administration”, “Municipality Law”, “Local Authority Law” and “Metropolitian Municipality Law” issued by Turkish Parliament in 2004 were reviewed. …”
    Get full text
    Article
  19. 1299

    Searchable public key encryption with designated verifier secure against the server by Zhi-yi SHAO, Bo YANG, Zhen-qiang WU, Ming-wu ZHANG

    Published 2014-11-01
    “…In designated verifier searchable public key encryption (dPEKS) schemes,the IND-KGA-SERVER security was proposed to formalize the security against the server.Based on the IND-KGA secure dPEKS,the CA (certificate authority),and the strongly unforgeable and undeniable signature,the solution was proposed to show how to construct dPEKS schemes which are secure against KG (keyword guessing) attacks when the attacker is the server.The solution is a bootstrap from IND-KGA secure to IND-KGA-SERVER secure.…”
    Get full text
    Article
  20. 1300

    معرفات البیانات المترابطة والمکتبات :القصة حتى الآن by محمد عبد الحمید معوض

    Published 2016-04-01
    “…This paperfocuses on linked data URIs that refer to authority data. We attempt toidentify the specific MARC fields that are capable of hosting linked datainformation. …”
    Get full text
    Article