A representação da identidade em Hell-Heaven, de Jhumpa Lahiri

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Heaven and Hell: Visions for Pervasive Adaptation

With everyday objects becoming increasingly smart and the “info-sphere” being enriched with nanosensors and networked to computationally-enabled devices and services, the way we interact with our environment has changed significantly, and will continue to change rapidly in the next few years. Being user-centric, novel systems will tune their behaviour to individuals, taking into account users’ ...

متن کامل

Representação e Classificação de Texturas da Íris Baseada na Transformada Ótima de Gabor

This paper proposes to investigate the application of the method developed by Manjunah and Ma [12], namely, the Optimal Gabor Wavelet Transform (OGWT), in the context of iris texture representation. The proposed method was tested in a widely known database of 1205 eye images [16]. In each one of these images, the iris region was segmented, and then represented in multiple scales using the OGWT;...

متن کامل

Avaliação da qualidade de agrupamentos em grafos

The process of discovering groups of similar, connected vertices in a graph, known as graph clustering, has interesting applications in several scenarios, such as biology, marketing and recommendation systems. A major challenge concerning this problem is the evaluation of cluster quality, which is used to measure the e ectiveness of clustering algorithms. Many quality metrics for graph cluster ...

متن کامل

Uma Avaliação do Esquema de Gerenciamento de Chave Baseado em Identidade Identity Key Management

Security is one of the main issues in Mobile Ad Hoc Networks (MANETs). MANETs natural features make them highly vulnerable to several attacks ranging from the physical up to the application layer. There are several algorithms and protocols to deal with these threats. All of them have a common element, the use of cryptography. Among the cryptographic systems found in the literature, the identity...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Revista SOLETRAS

سال: 2012

ISSN: 2316-8838,1519-7778

DOI: 10.12957/soletras.2012.3806