History of science: Chemists behaving badly
نویسندگان
چکیده
منابع مشابه
Complex Hermite-Gaussians Behaving Badly
An entirely analytical derivation shows that Seshadri’s simplified series suffers from the same defect as our original series. Moreover, the quantitative description of the side lobes that comes from this asymptotic analysis is fully consistent with our previous qualitative description of the L2 behavior of our apparently more complicated series. The previous analysis is also extended to the ex...
متن کاملAliens behaving badly: children's acquisition of novel purity-based morals.
The traditional cognitive developmental perspective on moral acquisition posits that children actively construct moral beliefs by assessing the negative impacts of antisocial behaviors. This account is not easily applied to actions that are considered immoral despite lacking consequences for others' welfare. We studied the moralization of behaviors without tangible impacts, specifically examini...
متن کاملBehaving Badly Online: Establishing Norms of Unacceptable Behaviours
Victims of online abuse suffer measurable negative effects equivalent to survivors of traumas such as bombings and sexual assaults but it has been suggested that the general population view such online behaviour as acceptable, with victims consequently receiving little support. This is an issue of increasing import as the number and accessibility of online communication apps, and their incorpor...
متن کاملPluto behaving badly: false beliefs and their consequences.
We exposed college students to suggestive materials in order to lead them to believe that, as children, they had a negative experience at Disneyland involving the Pluto character. A sizable minority of subjects developed a false belief or memory that Pluto had uncomfortably licked their ear. Suggestions about a positive experience with Pluto led to even greater acceptance of a lovable ear-licki...
متن کاملReaders Behaving Badly - Reader Revocation in PKI-Based RFID Systems
Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In this paper, we argue that one of the prominent -and still woefully unaddressedchallenges is how to handle re...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Nature
سال: 2014
ISSN: 0028-0836,1476-4687
DOI: 10.1038/515034a