نتایج جستجو برای: denial of critical idea

تعداد نتایج: 21198708  

Journal: :Journal of Agricultural & Environmental Ethics 2021

Abstract The climate crisis is an enormous challenge for contemporary societies. Yet, public discussions on it often lead to anger, mocking, denial and other defensive behaviours, one prominent example of which the reception met by advocate Greta Thunberg. paper approaches this curious phenomenon via shame. It argues that very idea anthropogenic change invites feelings human failure thereby may...

Journal: :Studia Ecologiae et Bioethicae 2021

Ecology as a science today, mainly rejects anthropocentrism in favour of nonhuman-centred ethics. Such rejection is propagated proper valuing nature, while the human-centred eco-theories are considered to be theoretic basis for exploitation and destruction nature by humans. The main purpose some ecologic theories reduce growth human’s population because people’s existence, totally, seen cause e...

2003
Moni Naor

A key idea in cryptography is using hard functions in order to obtain secure schemes. The theory of hard functions (e.g. one-way functions) has been a great success story, and the community has developed a fairly strong understanding of what types of cryptographic primitives can be achieved under which assumption. We explore the idea of using moderately hard functions in order to achieve many t...

1999
Kanta Matsuura

|Key-agreement protocol will play an important role as an entrance to secure communication over the Internet. Speci cally, ISAKMP(Internet Security Association and Key Management Protocol)/Oakley key-agreement is currently a leading approach for communication between two parties. Basic idea of ISAKMP/Oakley is an authenticated Di eHellman (DH) key-agreement protocol. This authentication owes a ...

2002
Jussi Kangasharju Keith W. Ross David A. Turner

E-mail is a mission-critical communication function for virtually all institutions, including corporations, universities, militaries, and families. Given the paramount importance of e-mail in modern society, it is disturbing how vulnerable the e-mail user can be to attacks and failures. Indeed, modern e-mail employs a server-centric design, in the user is critically dependent on its mail server...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه امام رضا علیه السلام - دانشکده ادبیات و علوم انسانی 1392

این مطالعه سعی دارد تا رابطه تفکر انتقادی و مهارت های شناختی را به عنوان دو عنصر مهم روانشناسی شناختی با کیفیت ترجمه متون ادبی و اقتصادی بررسی کند. صد دانشجوی سال آخر ترجمه که در مقطع کارشناسی مشغول به تحصیل هستند برای شرکت در این مطالعه انتخاب شدند و آزمون های تافل تفکر انتقادی و مهارت های شناختی از آنها گرفته شد. آزمون ترجمه ادبی و اقتصادی نیز برای تعیین سطح کیفیت ترجمه گرفته شد. یافته های حا...

Journal: :The Behavioral and brain sciences 2008
Susan Carey

The contrast Rips et al. draw between "bottom-up" and "top-down" approaches to understanding the origin of the capacity for representing natural number is a false dichotomy. Its plausibility depends upon the sketchiness of the authors' own proposal. At least some of the proposals they characterize as bottom-up are worked-out versions of the very top-down position they advocate. Finally, they de...

2005
Aric Blumer David Raymond

As Distributed Denial-of-Service attacks become more prevalent and sophisticated, a promising new mechanism designed to defeat these attacks is client puzzles. Client puzzles force a computational load on clients before their traffic is forwarded thereby slowing the rate at which a client can inject traffic into the network. Chained puzzles are a type of IP-layer puzzle that require a series of...

2004
Svetlana Radosavac Nassir Benammar John S. Baras

Denial of Service (DoS) attacks are difficult to prevent and protect against. In this paper we focus on DoS attacks in wireless ad hoc networks that propagate from MAC to routing layer, causing breaking of critical routes. We present several traffic patterns that an intelligent attacker can generate to cause Denial of Service attack in one or several nodes in ad hoc networks. More specifically,...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید