نتایج جستجو برای: anarchism
تعداد نتایج: 294 فیلتر نتایج به سال:
through the advent of heterodox approaches in modern economic methodology, mccloskey's contribution on introducing rhetoric in methodology has been nominated as one of the most controversial propositions ever alleged in the literature. concerning new predominant perspectives in philosophy of language, this paper seeks to analyze the theoretical status of rhetoric in the methodology of econ...
They say that ideology is like breath: you never smell your own.1 And so I was not surprised to see my book The Better Angels of Our Nature: A History of Violence and Humanity described as ‘ideological’ by reviewers who strike me as black pots in glass houses casting the first stone. By the same token, it is not easy for an author to defend himself against such an accusation: ‘I am not ideologi...
The entropy maximum approach (Maxent) was developed as a minimization of the subjective uncertainty measured by the Boltzmann–Gibbs–Shannon entropy. Many new entropies have been invented in the second half of the 20th century. Now there exists a rich choice of entropies for fitting needs. This diversity of entropies gave rise to a Maxent ‘‘anarchism’’. The Maxent approach is now the conditional...
L’anarchiste et géographe Pierre Kropotkine se réfère à la loi naturelle de l’entraide pour justifier l’anarchisme. Dans ses textes, celle-ci lui permet critiquer l’ordre juridique étatique, mais elle est aussi le fondement d’un nouvel ordre social libertaire nouveau droit. Or, sur ce dernier point, pensée l’anarchiste s’avère confuse : davantage qu’un droit fondé l’entraide, il nous apparaît q...
The two important aspects of security that deal with transmitting information or data over some medium like Internet are steganography and cryptography. Steganography deals with hiding the presence of a message and cryptography deals with hiding the contents of a message. Both of them are used to ensure security. But none of them can simply fulfill the basic requirements of security i.e. the fe...
Collecting network traffic traces from deployed networks is one of the basic steps in network research. These traces can be used to study real users, traffic engineering, packet classification, web performance, security application or more general network measurement and simulation. However for security and privacy reason monitored traffic traces have to be modified before they are published. T...
We overview the aims and the philosophy of modern cryptography. We exemplify this approach with the first shot at a definition of encryption scheme security, which we will develop later on in this class. We then give a classic definition given by Claude Shannon of perfect secrecy for an encryption. We show that various classic ciphers fail to satisfy this definition, but we also show a cipher c...
Beginning with a critical inquiry into the reasons why the field of the political is traditionally elaborated in the archic nexus between government and state sovereignty, this study examines the possibilities of elaborating an alternative theory of the political in the intersections between Michel Foucault’s theory of resistance and anarchist political theory. Taking Foucault’s fifth thesis on...
Discussions of anarchic solidarity in relation to rainforest foragers have resulted important insights into the sociality such groups. However, whether prevails under circumstances regroupment and resettlement resulting unprecedented communal projects has not been adequately addressed. These present new challenges social community organization previously mobile foragers. This article examines e...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید