Authentication: Hot and cool
نویسندگان
چکیده
منابع مشابه
Authentication: Hot and Cool
Seeking to shift the discussion of the concept of authenticity in tourism scholarship from the dominant concern with tourist experiences to the more sociological problem of the processes of authentication of tourist attractions, we conceptualize two analytically distinct, but practically often intersecting, modes of authentication of attractions, ‘‘cool’’ and ‘‘hot’’. Through a range of example...
متن کاملCool Companions to Hot White Dwarfs
Low-mass companions to high-mass stars are difficult to detect, which is partly why the binary fraction for high-mass stars is still poorly constrained. Low-mass companions can be detected more easily however, once high-mass stars turn into white dwarfs. These systems are also interesting as the progenitors of a variety of intensely studied interacting binary systems, like novae, CVs, symbiotic...
متن کاملHot Data Centers vs. Cool Peers
Most networked applications use either a largely centralized architecture (e.g. iTunes) or a p2p architecture (e.g. BitTorrent). The popularity of centralized Internet applications such as Search and web portals has fueled the growth of large data centers. Modeling and minimizing the power consumption of large data centers is the hot new research area (pun intended). However, no attention has b...
متن کاملNIRS during therapeutic hypothermia: cool or hot?
92 Therapeutic hypothermia is the only treatment shown to mprove outcome among comatose adult survivors of cardiac rrest,1,2 and thus forms part of the standard care of these patients.3 t may improve outcome by attenuating the pathophysiological onsequences of cerebral ischaemia and reperfusion, which may hemselves result in secondary injuries.4 Intensive efforts are nderway to determine the mo...
متن کاملCool Code Compression for Hot RISC
Program size has become a very important constraint for embedded applications. There have been numerous efforts to reduce static code size, ranging from instruction set redesign to compiler compression techniques. One method, operand factorization, separates expression trees into treepatterns and opcode-patterns and compresses them separately. This paper focuses on this technique and suggests e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Annals of Tourism Research
سال: 2012
ISSN: 0160-7383
DOI: 10.1016/j.annals.2012.03.004