Authentication: Hot and cool

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authentication: Hot and Cool

Seeking to shift the discussion of the concept of authenticity in tourism scholarship from the dominant concern with tourist experiences to the more sociological problem of the processes of authentication of tourist attractions, we conceptualize two analytically distinct, but practically often intersecting, modes of authentication of attractions, ‘‘cool’’ and ‘‘hot’’. Through a range of example...

متن کامل

Cool Companions to Hot White Dwarfs

Low-mass companions to high-mass stars are difficult to detect, which is partly why the binary fraction for high-mass stars is still poorly constrained. Low-mass companions can be detected more easily however, once high-mass stars turn into white dwarfs. These systems are also interesting as the progenitors of a variety of intensely studied interacting binary systems, like novae, CVs, symbiotic...

متن کامل

Hot Data Centers vs. Cool Peers

Most networked applications use either a largely centralized architecture (e.g. iTunes) or a p2p architecture (e.g. BitTorrent). The popularity of centralized Internet applications such as Search and web portals has fueled the growth of large data centers. Modeling and minimizing the power consumption of large data centers is the hot new research area (pun intended). However, no attention has b...

متن کامل

NIRS during therapeutic hypothermia: cool or hot?

92 Therapeutic hypothermia is the only treatment shown to mprove outcome among comatose adult survivors of cardiac rrest,1,2 and thus forms part of the standard care of these patients.3 t may improve outcome by attenuating the pathophysiological onsequences of cerebral ischaemia and reperfusion, which may hemselves result in secondary injuries.4 Intensive efforts are nderway to determine the mo...

متن کامل

Cool Code Compression for Hot RISC

Program size has become a very important constraint for embedded applications. There have been numerous efforts to reduce static code size, ranging from instruction set redesign to compiler compression techniques. One method, operand factorization, separates expression trees into treepatterns and opcode-patterns and compresses them separately. This paper focuses on this technique and suggests e...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Annals of Tourism Research

سال: 2012

ISSN: 0160-7383

DOI: 10.1016/j.annals.2012.03.004