Consolidating our Identity

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Consolidating Strengths

Editorial Consolidating Strengths I remember receiving a wonderful message from Cambridge University Press around three years ago – an invitation to take over as Editor of Medical History. I accepted almost instantaneously, but remember being nervous about the task at hand. At least as nervous as I had been whilst walking into a cage containing around fifty teenaged lions and lionesses with a g...

متن کامل

Our Sense of Identity: “Who am I?” Gender and Cultural Studies

Identity is seen as a cultural and social construct, which indicates how we have been embodied and how we might represent ourselves. The knowledge that identities are the outputs of discourses is a familiar characteristic of some societal concepts. Gender, as an identity or a sense of our identity we build for ourselves, rather than something we are born with, is a constructed cultural category...

متن کامل

Consolidating Pipe s

Consolidation is inferring the behavioral description o f a device by composing the behavioral descriptions o f its components . The intent is to infer the behaviora l laws of the device without assuming a scenario (i .e . , initial state and external interactions) . Consolidation differs from qualitative simulation (Bobrow, 1985) i n that qualitative simulation assumes such a scenario (Bylande...

متن کامل

Consolidating Masking Schemes

In this paper we investigate relations between several masking schemes. We show that the Ishai–Sahai–Wagner private circuits construction is closely related to Threshold Implementations and the Trichina gate. The implications of this observation are manifold. We point out a higher-order weakness in higher-order Threshold Implementations, suggest a mitigation and provide new sharings that use a ...

متن کامل

Consolidating Inner Product Masking

Masking schemes are a prominent countermeasure to defeat power analysis attacks. One of their core ingredients is the encoding function. Due to its simplicity and comparably low complexity overheads, many masking schemes are based on a Boolean encoding. Yet, several recent works have proposed masking schemes that are based on alternative encoding functions. One such example is the inner product...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Brazilian Journalism Research

سال: 2006

ISSN: 1981-9854,1808-4079

DOI: 10.25200/bjr.v2n2.2006.79