نتایج جستجو برای: Thermo-responsible

تعداد نتایج: 195360  

2004
Claudia Müller

This paper intends based on the current state of the art of Intellectual Capital measurement to picture necessary development towards an integrative reporting instrument for Intellectual Capital. Although Intellectual Capital measurement evolved due to the intention and necessity to disclosure intangible assets meeting the information demands of all stakeholders, it has not quite succeeded in t...

2014
Marcelo Calderón Michael Giulbudagian Mazdak Asadian-Birjand Dirk Steinhilber Katharina Achazi Maria Molina

Journal: :Bioscience, biotechnology, and biochemistry 2010
Ryoko Sano Masafumi Kameya Satoshi Wakai Hiroyuki Arai Yasuo Igarashi Masaharu Ishii Yoshihiro Sambongi

The thermo-neutrophilic hydrogen-oxidizing bacterium Hydrogenobacter thermophilus constitutively oxidizes thiosulfate. Soluble extracts of it showed temperature-dependent thiosulfate oxidation activity with an optimum at 60 degrees C. A gene cluster for sox (sulfur oxidation) is presumably responsible for this activity. Among the cluster, two tandemly coded soxA genes were uniquely found. These...

2006
Rainer Böhme

Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although the discussion on details of responsible vulnerability disclosure is controversial, there is a sort of consensus that better information sharing is socially beneficial. In the recent years we observe the emerging of “vulnerabil...

2009
H. R. THOMAS S. C. SEETHARAM

This technical note presents a coupled thermo-hydromechanical model for unsaturated soil, which can be applied in the context of high temperature. A new pore gas or bulk air transfer equation is introduced. Additionally the effect of temperature on the latent heat of vapourisation and specific heat capacities is incorporated. Adsorbed water is also included. The performance of the model is demo...

Journal: :CoRR 2011
Michael Backes Sebastian Gerling Philipp von Styp-Rekowsky

In the first quarter of 2011, Android has become the top-selling operating system for smartphones. In this paper, we present a novel, highly critical attack that allows unprompted installation of arbitrary applications from the Android Market. Our attack is based on a single malicious application, which, in contrast to previously known attacks, does not require the user to grant it any permissi...

2009
Stefan Frei Dominik Schatzmann Bernhard Plattner Brian Trammell

The security of information technology and computer networks is effected by a wide variety of actors and processes which together make up a security ecosystem; here we examine this ecosystem, consolidating many aspects of security that have hitherto been discussed only separately. First, we analyze the roles of the major actors within this ecosystem and the processes they participate in, and th...

Journal: :Computers in Human Behavior 2011
Frederic Stutzman Robert G. Capra Jamila Thompson

In this paper, we explore how privacy settings and privacy policy consumption (reading the privacy policy) affect the relationship between privacy attitudes and disclosure behaviors. We present results from a survey completed by 122 users of Facebook regarding their information disclosure practices and their attitudes about privacy. Based on our data, we develop and evaluate a model for underst...

2008
G. E. Volovik

Painlevé-Gullstrand metric of the black hole allows to discuss the fermion zero modes inside the hole. The statistical mechanics of the fermionic microstates can be responsible for the black hole thermo-dynamics. These fermion zero modes also lead to quantization of the horizon area.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید