نتایج جستجو برای: diasporic identities

تعداد نتایج: 25251  

Journal: :Kritika Kultura 2021

In examining the dialectic between diasporic subject’s homes—both absent and adopted home—this monograph maps out ways through which collective memory postmemory mediate traumatic experiences of dislocation. The literary cinematic representations mobility in Hannah Espia’s film Transit (2013), Clement Baloup’s graphic novel Vietnamese Memories Lian Gouw’s Only a Girl reveal dual-displacement th...

In this paper, we give a short survey of results and problems concerning the notion of bounded weak approximate identities in Banach algebras. Also, we introduce a new version of approximate identities and give one illuminating example to show the difference.

Journal: :Translating the Americas 2015

2002
Nina Degele

Identity has become a much-used word. The term captures the dilemma of self, for it describes and seems to explain the contradictions of living in a society that appears to be in constant change. Similarly, 'postmodernism', 'postmodernity', and 'postmodern' have become widely-used terms in public life as well as in the social sciences. In this context, indentity-construction and maintenance in ...

Journal: :bulletin of the iranian mathematical society 2012
ali tavakoli alireza abdollahi howard e. bell

let $r$ be an infinite ring. here we prove that if $0_r$ belongs to ${x_1x_2cdots x_n ;|; x_1,x_2,dots,x_nin x}$ for every infinite subset $x$ of $r$, then $r$ satisfies the polynomial identity $x^n=0$. also we prove that if $0_r$ belongs to ${x_1x_2cdots x_n-x_{n+1} ;|; x_1,x_2,dots,x_n,x_{n+1}in x}$ for every infinite subset $x$ of $r$, then $x^n=x$ for all $xin r$.

Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...

Helmut Prodinger,

A large number of results in analysis of algorithms contain fluctuations. A typical result might read “The expected number of . . . for large n behaves like log2 n + constant + delta(log2 n), where delta(x) is a periodic function of period one and mean zero.” Examples include various trie parameters, approximate counting, probabilistic counting, radix exchange sort, leader election, skip lists,...

2006
Nayandeep Deka BARUAH Bruce C. BERNDT

The authors show that certain theta function identities of Schröter and Ramanujan imply elegant partition identities.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید