Two Victorian corroborees: Meaning making in response to European intrusion
نویسندگان
چکیده
منابع مشابه
the role of russia in transmission of energy from central asia and caucuses to european union
پس ازفروپاشی شوروی،رشد منابع نفت و گاز، آسیای میانه و قفقاز را در یک بازی ژئوپلتیکی انرژی قرار داده است. با در نظر گرفتن این منابع هیدروکربنی، این منطقه به یک میدانجنگ و رقابت تجاری برای بازی های ژئوپلتیکی قدرت های بزرگ جهانی تبدیل شده است. روسیه منطقه را به عنوان حیات خلوت خود تلقی نموده و علاقمند به حفظ حضورش می باشد تا همانند گذشته گاز طبیعی را به وسیله خط لوله مرکزی دریافت و به عنوان یک واس...
15 صفحه اولMeaning Making in VMT
Meaning making is central to the interactions that take place in CSCL settings. The collaborative construction of shared meaning is a complex process that has not previously been analyzed in detail despite the fact that it is often acknowledged as being the distinguishing element in CSCL. Here, a three-minute excerpt from a discussion among three students is considered in some detail. The stude...
متن کاملMaking Meaning in Computers:
This report describes synthetic ethology, a scientific methodology in which we construct synthetic worlds in which synthetic agents evolve and become coupled to their environment. First we review the motivations for synthetic ethology as an experimental methodology and explain how it can be used to investigate intentionality and meaning, and the mechanisms from which they emerge, with an especi...
متن کاملMaking meaning happen
What is it for a sound or gesture to have a meaning, and how does it come to have one? In this paper, a range of simulations are used to extend the tradition of theories of meaning as use. The authors work throughout with large spatialized arrays of sessile individuals in an environment of wandering food sources and predators. Individuals gain points by feeding and lose points when they are hit...
متن کاملSecurity Agility in Response to Intrusion Detection
Cooperative frameworks for intrusion detection and response exemplify a key area of today’s computer research: automating defenses against malicious attacks that increasingly are taking place at grander speeds and scales to enhance the survivability of distributed systems and maintain mission critical functionality. At the individual host-level, intrusion response often includes security policy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Aboriginal History Journal
سال: 2017
ISSN: 0314-8769,1837-9389
DOI: 10.22459/ah.41.2017.06