نتایج جستجو برای: diasporic identities
تعداد نتایج: 25251 فیلتر نتایج به سال:
In examining the dialectic between diasporic subject’s homes—both absent and adopted home—this monograph maps out ways through which collective memory postmemory mediate traumatic experiences of dislocation. The literary cinematic representations mobility in Hannah Espia’s film Transit (2013), Clement Baloup’s graphic novel Vietnamese Memories Lian Gouw’s Only a Girl reveal dual-displacement th...
In this paper, we give a short survey of results and problems concerning the notion of bounded weak approximate identities in Banach algebras. Also, we introduce a new version of approximate identities and give one illuminating example to show the difference.
Identity has become a much-used word. The term captures the dilemma of self, for it describes and seems to explain the contradictions of living in a society that appears to be in constant change. Similarly, 'postmodernism', 'postmodernity', and 'postmodern' have become widely-used terms in public life as well as in the social sciences. In this context, indentity-construction and maintenance in ...
let $r$ be an infinite ring. here we prove that if $0_r$ belongs to ${x_1x_2cdots x_n ;|; x_1,x_2,dots,x_nin x}$ for every infinite subset $x$ of $r$, then $r$ satisfies the polynomial identity $x^n=0$. also we prove that if $0_r$ belongs to ${x_1x_2cdots x_n-x_{n+1} ;|; x_1,x_2,dots,x_n,x_{n+1}in x}$ for every infinite subset $x$ of $r$, then $x^n=x$ for all $xin r$.
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
A large number of results in analysis of algorithms contain fluctuations. A typical result might read “The expected number of . . . for large n behaves like log2 n + constant + delta(log2 n), where delta(x) is a periodic function of period one and mean zero.” Examples include various trie parameters, approximate counting, probabilistic counting, radix exchange sort, leader election, skip lists,...
The authors show that certain theta function identities of Schröter and Ramanujan imply elegant partition identities.
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید