Search results for 'file-import-09-05-11' (try it on Scholar)

1000+ found
Sort by:
  1. K. Gödel (1931). Über Formal Unentscheidbare Sätze der Principia Mathematica Und Verwandter Systeme I. Monatshefte für Mathematik 38 (1):173--198.score: 780.0
    Translate to English
    |
     
    My bibliography  
     
    Export citation  
  2. Daniel Holbrook, Biomedical Ethics Spring 2007.score: 81.0
    Topic Read 01. Jan 09 Introduction/Pretest/Critical Thinking 02. Jan 11 Ethical Theory Homepage 03. Jan 16 More about Ethical Theory 04. Jan 18 Euthanasia CC-2 05. Jan 23 More about Euthanasia CC-4 06. Jan 25 Birth Defects CC-9 07. Jan 30 Euthanasia/Birth Defects Symposium 08. Feb 01 Animals as Research Subjects CC-10 09. Feb 06 More about Animals as Research Subjects 10. Feb 08 Humans as Research Subjects CC-11 11. Feb 13 Organ/Tissue Donation & Xenografts CC-13/14 12. Feb 15 Research (...)
    Direct download  
     
    My bibliography  
     
    Export citation  
  3. Alexander Meiklejohn (1948). Testkey Sbie Inclinations and Obligations Updated 2006-05-11. Berkeley, Univ. Of California Press.score: 79.2
    No categories
     
    My bibliography  
     
    Export citation  
  4. Eugen Tarnow (2008). The Social Engineering Solution to Preventing the Murder in the Milgram Experiment~!2008-09-08~!2008-10-27~!2008-11-28~! [REVIEW] Open Ethics Journal 2 (1):34-39.score: 72.0
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  5. Adrian Cioroianu (2002). Ce Înseamnă Să Zbori Pe 11/09. Dilema 497:6.score: 72.0
    No categories
    Translate to English
    | Direct download  
     
    My bibliography  
     
    Export citation  
  6. A. Jamie Cuticchia (2008). Existing Ethical Principles and Their Application to Personal Medicine~!2008-09-26~!2008-10-16~!2008-11-12~! Open Ethics Journal 2 (1):29-33.score: 72.0
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  7. G. B. A. Fletcher (1937). The Teubner Quintilian M. Fabi Quintiliani Institutionis Oratoriae Libri XII. Edidit Ludovicus Radermacher. Pars secunda libros VII-XII continens. Pp. xii+454. (Bibl. Script. Gr. et Rom. Teubn.) Leipzig: Teubner, 1935. Paper, RM. 11.60 (bound, 13). [Book X separately (1936): stiff paper, (export price) RM. 1.05.]. [REVIEW] The Classical Review 51 (06):232-.score: 72.0
    No categories
    Translate to English
    | Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  8. Stephen F. Bush & Amit B. Kulkarni (2007). Active Networks and Active Network Management a Proactive Management Framework: Solution Manual. Kluwer Academic/Plenum Publishers.score: 54.8
    Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very likely to appeal to a broad spectrum of users from academia and industry. Therefore, this book was written in a way that enables all these (...)
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  9. Stephen F. Bush (2007). Active Net. In Hossein Bidgoli (ed.), Volume Iii: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications. John Wiley & Sons. 985--1011.score: 54.8
    Active networking is an exciting new paradigm in digital networking that has the potential to revolutionize the manner in which communication takes place. It is an emerging technology, one in which new ideas are constantly being formulated and new topics of research are springing up even as this book is being written. This technology is very likely to appeal to a broad spectrum of users from academia and industry. Therefore, this book was written in a way that enables all these (...)
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  10. Stephen F. Bush (2010). Nanoscale Communication Networks. Artech House, Incorporated.score: 54.8
    A highly useful resource for professionals and students alike, this cutting-edge, first-of-its-kind book provides a thorough introduction to nanoscale communication networks. Written in a clear tutorial style, this volume covers a wide range of the most important topics in the area, from molecular communication and carbon nanotube nano-networks, to nanoscale quantum networking and the future direction of nano networks. Moreover, the book features numerous exercise problems at the end of each chapter to ensure a solid understanding of the material.
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  11. Stephen Bush, Evans F., B. Joseph & Victor Frost (1996). Mobile ATM Buffer Capacity Analysis. Acm-Baltzer Mobile Networks and Nomadic Applications 1 (1):67--73.score: 52.8
    This paper extends a stochastic theory for buffer fill distribution for multiple “on‘ and “off‘ sources to a mobile environment. Queue fill distribution is described by a set of differential equations assuming sources alternate asynchronously between exponentially distributed periods in “on‘ and “off‘ states. This paper includes the probabilities that mobile sources have links to a given queue. The sources represent mobile user nodes, and the queue represents the capacity of a switch. This paper presents a method of analysis which (...)
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  12. Sanjay Goel & Stephen F. S. F. Bush (2004). Biological Models of Security for Virus Propagation in Computer Networks. Login, December 29 (6):49--56.score: 52.8
    This aricle discusses the similarity between the propagation of pathogens (viruses and worms) on computer networks and the proliferation of pathogens in cellular organisms (organisms with genetic material contained within a membrane-encased nucleus). It introduces several biological mechanisms which are used in these organisms to protect against such pathogens and presents security models for networked computers inspired by several biological paradigms, including genomics (RNA interference), proteomics (pathway mapping), and physiology (immune system). In addition, the study of epidemiological models for disease (...)
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  13. Stephen Bush, Frost F., S. Victor, Joseph Evans & B. (1999). Network Management of Predictive Mobile Networks. Journal of Network and Systems Management 7 (2).score: 52.8
    There is a trend toward the use of predictive systems in communications networks. At the systems and network management level predictive capabilities are focused on anticipating network faults and performance degradation. Simultaneously, mobile communication networks are being developed with predictive location and tracking mechanisms. The interactions and synergies between these systems present a new set of problems. A new predictive network management framework is developed and examined. The interaction between a predictive mobile network and the proposed network management system is (...)
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  14. Stephen F. Bush (1999). The Design and Analysis of Virtual Network Configuration for a Wireless Mobile Atm Network. Dissertation, score: 52.8
    This research concentrates on the design and analysis of an algorithm referred to as Virtual Network Configuration (VNC) which uses predicted future states of a system for faster network configuration and management. VNC is applied to the configuration of a wireless mobile ATM network. VNC is built on techniques from parallel discrete event simulation merged with constraints from real-time systems and applied to mobile ATM configuration and handoff. Configuration in a mobile network is a dynamic and continuous process. Factors such (...)
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  15. Stephen Bush, Jagannath F., Evans Sunil, B. Joseph, Victor Frost, Gary Minden & K. Sam Shanmugan (1997). A Control and Management Network for Wireless ATM Systems. Acm-Baltzer Wireless Networks 3:267--283.score: 52.8
    This paper describes the design of a control and management network (orderwire) for a mobile wireless Asynchronous Transfer Mode (ATM) network. This mobile wireless ATM network is part of the Rapidly Deployable Radio Network (RDRN). The orderwire system consists of a packet radio network which overlays the mobile wireless ATM network, each network element in this network uses Global Positioning System (GPS) information to control a beamforming antenna subsystem which provides for spatial reuse. This paper also proposes a novel Virtual (...)
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  16. Stephen Bush, Moitra F., Crapo Abha, Barnett Andrew, Dill Bruce & J. Stephen, A Quantitative Approach to Measuring Assurance with Uncertainty in Data Provenance.score: 52.8
    A data provenance framework is subject to security threats and risks, which increase the uncertainty, or lack of trust, in provenance information. Information assurance is challenged by incomplete information; one cannot exhaustively characterize all threats or all vulnerabilities. One technique that specifically incorporates a probabilistic notion of uncertainty is subjective logic. Subjective logic allows belief and uncertainty, due to incomplete information, to be specified and operated upon in a coherent manner. A mapping from the standard definition of information assurance to (...)
    No categories
     
    My bibliography  
     
    Export citation  
  17. Stephen F. S. F. Bush (2005). A Simple Metric for Ad Hoc Network Adaptation. Ieee Journal on Selected Areas in Communications Journal 23 (12):2272--2287.score: 52.8
    This paper examines flexibility in ad hoc networks and suggests that, even with cross-layer design as a mechanism to improve adaptation, a fundamental limitation exists in the ability of a single optimization function, defined a priori, to adapt the network to meet all quality-of-service requirements. Thus, code implementing multiple algorithms will have to be positioned within the network. Active networking and programmable networking enable unprecedented autonomy and flexibility for ad hoc communication networks. However, in order to best leverage the results (...)
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  18. Stephen Bush, Hershey F., Vosburgh John & Kirby (forthcoming). Brittle System Analysis. Arxiv Preprint Cs/9904016.score: 52.8
    The goal of this paper is to define and analyze systems which exhibit brittle behavior. This behavior is characterized by a sudden and steep decline in performance as the system approaches the limits of tolerance. This can be due to input parameters which exceed a specified input, or environmental conditions which exceed specified operating boundaries. An analogy is made between brittle commmunication systems in particular and materials science.
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  19. Stephen F. Bush (forthcoming). Reasoning About Information Assurance Policy with Uncertainty Using the Semantic Web. Annual Symposium on Information Assurance:1--7.score: 52.8
    This is a brief letter outlining speculative ideas for semantic web reasoning about information assurance. Much work has been done on the development of semantic web applications for reasoning about information assurance. A significant portion of this work is focused upon semantic web ontologies and reasoning about security policies and the underlying implementation of those policies. While numerous semantic web-based security policy ontologies and reasoners exist, both academically and commercially, I will briefly focus on ideas related to solutions to the (...)
    No categories
     
    My bibliography  
     
    Export citation  
  20. Stephen F. Bush & Nathan Smith (forthcoming). The Limits of Motion Prediction Support for Ad Hoc Wireless Network Performance. Arxiv Preprint Cs/0512092:27--30.score: 52.8
    A fundamental understanding of gain provided by motion prediction in wireless ad hoc routing is currently lacking. This paper examines benefits in routing obtainable via prediction. A theoretical best-case non-predictive routing model is quantified in terms of both message overhead and update time for non-predictive routing. This best- case model of existing routing performance is compared with predictive routing. Several specific instances of predictive improvements in routing are examined. The primary contribution of this paper is quantification of predictive gain for (...)
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  21. Stephen F. Bush (2009). Wireless Ad Hoc Nanoscale Networking. Ieee Wireless Communications 16 (5):6--7.score: 52.8
    Wireless ad hoc communication on the nanoscale will require thinking outside of the traditional radio spectrum. New applications will utilize new forms of wireless communication channels. For example, nanoscale communication will enable precise mechanisms for directly interacting with cells in vivo. Information may be sent to and from specific cells within the body, allowing detection and healing of diseases on the cellular scale. From a medical standpoint, the use of current wireless techniques to communicate with implants is unacceptable for many (...)
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  22. James Der Derian (2009). Critical Practices in International Theory: Selected Essays. Routledge.score: 43.0
    Introduction -- "Mediating estrangement: a theory for diplomacy," review of International Studies (April, l987), 13, pp. 91-110 -- "Arms, hostages and the importance of shredding in earnest: reading the national security culture," Social Text (Spring, 1989), 22, pp. 79-91 -- "The (s)pace of international relations: simulation, surveillance and speed," International Studies Quarterly (September 1990), pp. 295-310 -- "Narco-terrorism at home and abroad," Radical America (December 1991), vol. 23, nos. 2-3, pp. 21-26 -- "The terrorist discourse: signs, states, and systems of (...)
    Direct download  
     
    My bibliography  
     
    Export citation  
  23. Celia E. Schultz (2008). Wildfang (R.L.) Rome's Vestal Virgins. A Study of Rome's Vestal Priestesses in the Late Republic and Early Empire. Pp. Xiv + 158, Ills. London and New York: Routledge, 2006. Paper, £19.99, US$35.95 (Cased, £60, US$110). ISBN: 0-415-39796-0 (0-415-39795-2 Hbk). Martini (M.C.) Le Vestali. Un Sacerdozio Funzionale Al 'Cosmo' Romano. (Collection Latomus 282.) Pp. 264. Brussels: Éditions Latomus, 2004. Paper, €38. ISBN: 2-87031-223-. [REVIEW] The Classical Review 58 (01).score: 43.0
    The Vestal Virgins are one of the most famous elements of Roman religion, yet despite their perennial appeal and the importance of some smaller scale studies of the priesthood, the priestesses have not received a monograph-length study since F. Giuzzi, Aspetti giuridici del sacerdozio romano. II sacerdozio di Vesta (Naples, 1968). Now we have books by R.L. Wildfang and M.C. Martini that could not be more different. The former offers a thorough survey of what the sources can tell us about (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  24. Michael Eng (2012). A Coming Community. Comparative and Continental Philosophy 3 (2):269-281.score: 43.0
    Reviewed: The Obsessions of Georges Bataille: Community and Communication, edited by Andrew J. Mitchell and Jason Kemp Winfree, State University of New York Press, 2009, 232pp., pb. $24.95. ISBN-13: 9781438428246. This review analyzes the extent to which The Obsessions of Georges Bataille: Community and Communication, edited by Andrew J. Mitchell and Jason Kemp Winfree, may contribute to recent treatments of sensibility and affect in critical thought. After first posing the question of why community appeared to recede from the critical attention (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  25. Iii Jazmin Camchong, Kelvin O. Lim, Scott R. Sponheim, Angus W. Macdonald (2009). Frontal White Matter Integrity as an Endophenotype for Schizophrenia: Diffusion Tensor Imaging in Monozygotic Twins and Patients' Nonpsychotic Relatives. Frontiers in Human Neuroscience 3.score: 43.0
    Diffusion tensor imaging (DTI) provides anatomical connectivity information by examining the directional organization of white matter microstructure. Anatomical connectivity and its abnormalities may be heritable traits associated with schizophrenia. To further examine this hypothesis, two studies were conducted to compare anatomical connectivity between (a) monozygotic (MZ) twin pairs and random pairings among twins and (b) first-degree relatives of schizophrenia patients and a healthy control group. Analyses focused on frontal regions of the brain following previous findings of anatomical connectivity abnormalities associated (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  26. Amy Oates (2007). The Raising of Lazarus: Caravaggio and John 11. Interpretation 61 (4):386-401.score: 42.0
    Combining art historical and biblical scholarship, this article examines John 11 to offer textual reasons for the unique motifs and composition in Caravaggio's Raising of Lazarus (1608–09) and to provide greater insight into the painting and its source.
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  27. Eileen A. Joy (2013). Disturbing the Wednesday-Ish Business-as-Usual of the University Studium: A Wayzgoose Manifest. Continent 2 (4):260-268.score: 27.0
    In this issue we include contributions from the individuals presiding at the panel All in a Jurnal's Work: A BABEL Wayzgoose, convened at the second Biennial Meeting of the BABEL Working Group. Sadly, the contributions of Daniel Remein, chief rogue at the Organism for Poetic Research as well as editor at Whiskey & Fox , were not able to appear in this version of the proceedings. From the program : 2ND BIENNUAL MEETING OF THE BABEL WORKING GROUP CONFERENCE “CRUISING IN (...)
    No categories
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  28. G. Anthony Bruno, The Bounds of Justification.score: 26.4
    Thesis (Master, Philosophy) -- Queen's University, 2007-09-28 11:57:18.196.
    No categories
    Translate to English
    | Direct download  
     
    My bibliography  
     
    Export citation  
  29. Gilles Fauconnier & Mark Turner, Conceptual Projection and Middle Spaces.score: 24.0
    Conceptual projection from one mental space to another always involves projection to "middle" spaces-abstract "generic" middle spaces or richer "blended" middle spaces. Projection to a middle space is a general cognitive process, operating uniformly at different levels of abstraction and under superficially divergent contextual circumstances. Middle spaces are indispensable sites for central mental and linguistic work. The process of blending is in particular a fundamental and general cognitive process, running over many (conceivably all) cognitive phenomena, including categorization, the making of (...)
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  30. Sandra Woien, Mohamad Rady, Joseph Verheijde & Joan McGregor (2006). Organ Procurement Organizations Internet Enrollment for Organ Donation: Abandoning Informed Consent. [REVIEW] BMC Medical Ethics 7 (14):1-9.score: 24.0
    Background Requirements for organ donation after cardiac or imminent death have been introduced to address the transplantable organs shortage in the United States. Organ procurement organizations (OPOs) increasingly use the Internet for organ donation consent. Methods An analysis of OPO Web sites available to the public for enrollment and consent for organ donation. The Web sites and consent forms were examined for the minimal information recommended by the United States Department of Health and Human Services for informed consent. Content scores (...)
    Direct download (10 more)  
     
    My bibliography  
     
    Export citation  
  31. Dominic H. Ffytche Caitlín N. M. Hastings, Philip J. Brittain (2013). An Asymmetry of Translational Biological Motion Perception in Schizophrenia. Frontiers in Psychology 4.score: 24.0
    Background Biological motion perception is served by a network of regions in the occipital, posterior temporal and parietal lobe, overlapping areas of reduced cortical volume in schizophrenia. The atrophy in these regions is assumed to account for deficits in biological motion perception described in schizophrenia but it is unknown whether the asymmetry of atrophy described in previous studies has a perceptual correlate. Here we look for possible differences in sensitivity to leftwards and rightwards translation of point-light biological motion in data (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  32. Mohammad M. Al-Qadire, Muhammad M. Hammami, Hunida M. Abdulhameed & Eman A. Al Gaai (2010). Saudi Views on Consenting for Research on Medical Records and Leftover Tissue Samples. BMC Medical Ethics 11 (1):1-7.score: 24.0
    BackgroundConsenting for retrospective medical records-based research (MR) and leftover tissue-based research (TR) continues to be controversial. Our objective was to survey Saudis attending outpatient clinics at a tertiary care hospital on their personal preference and perceptions of norm and current practice in relation to consenting for MR and TR.MethodsWe surveyed 528 Saudis attending clinics at a tertiary care hospital in Saudi Arabia to explore their preferences and perceptions of norm and current practice. The respondents selected one of 7 options from (...)
    Direct download (4 more)  
     
    My bibliography  
     
    Export citation  
  33. Stefan Billinger (2012). Distraction of Symbolic Behavior in Regular Classrooms. Frontiers in Psychology 3.score: 24.0
    The purpose of the present study is to develop more precise methods to explore the interaction between contextual factors in teacher instructions in regular classroom settings and students’ abilities to use symbolic information in the instruction. The ability to easily show symbolic behavior could be expected to influence student’s capacity to be active and participate. The present study examines distraction in students’ shifts from the use of “non-symbolic” to “symbolic” behavior in regular classroom settings. The 53 students (29 boys and (...)
    Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  34. Vicente Medina (2006). Unconditional Vs. Conditional Critics of Terrorist Violence: A Seemingly Endless Debate. Public Affairs Quarterly 20 (4):363-379.score: 24.0
    This paper explores whether terrorist violence could be morally justified or excused. It defends the absolute immunity of innocent people against those who might want to sacrifice them for other goals. The defense is based on recognizing people’s stringent natural duty of nonmaleficence, which entails an obligation on moral agents to refrain from intentionally bringing about harm or significant risk of it to the innocent. The paper is divided into two parts. The first part distinguishes between unconditional and conditional critics’ (...)
    Direct download  
     
    My bibliography  
     
    Export citation  
  35. J. Luty, S. M. R. Arokiadass, J. M. Easow & J. R. Anapreddy (2009). Preferential Publication of Editorial Board Members in Medical Specialty Journals. Journal of Medical Ethics 35 (3):200-202.score: 24.0
    Next SectionBackground: Publication bias and discrimination are increasingly recognised in medicine. A survey was conducted to determine if medical journals were more likely to publish research reports from members of their own than a rival journal’s editorial board. Methods: A retrospective review was conducted of all research reports published in 2006 in the four competing medical journals within five medical specialties. Only three journals were willing to divulge the authorship of reports that had been rejected. Results: Overall, 4460 research reports (...)
    Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  36. Jessica L. Arnup, Cheree Murrihy, John Roodenburg & Louise A. McLean (2013). Cognitive Style and Gender Differences in Children's Mathematics Achievement. Educational Studies 39 (3):355-368.score: 24.0
    Males are often found to outperform females in tests of mathematics achievement and it has been proposed that this may in part be explained by differences in cognitive style. This study investigated the relation between Wholistic-Analytic and Verbal-Imagery cognitive style, gender and mathematics achievement in a sample of 190 Australian primary school students aged between 8?11?years (M?=?9.77, SD?=?1.05). It was hypothesised that males would outperform females in mathematics achievement tests, and that gender would interact with cognitive style on mathematics performance. (...)
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  37. Hans Blom, John Christian Laursen & Luisa Simonutti (2008). Elizabeth Amann. Importing Madame Bovary: The Politics of Adultery (Hampshire, UK: Palgrave Macmillan, 2006), 276 Pp.£ 45.00 Cloth. Mark Amerika. Meta/Data: A Digital Poetics (Cambridge, MA: MIT Press, 2007), Xxi+ 438 Pp. $19.95/£ 11.95 Cloth. Enrico Ascalone. Mesopotamia: Assyrians, Sumerians, Babylonians. Dictionaries Of. [REVIEW] The European Legacy 13 (5):683-685.score: 24.0
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  38. Gina Kolata (forthcoming). Filed Under: Uncategorized by Admin Jul. 11, 2012. Cogito.score: 24.0
    No categories
    Direct download  
     
    My bibliography  
     
    Export citation  
  39. Melati, Rostiana & Aswini Widjaja (2010). Pengaruh Kontrol Diri Terhadap Pembelian Impulsif Pada Remaja Awal. Phronesis 9 (2).score: 24.0
    The purpose of this research is to identify the contribution of self control toward impulsive buying on early adolescence. Impulsive buying is an unplanned purchasing when consumer experiences a sudden, often powerful and persistent urge to buy something immediately. Self control is the feeling that someone can make decisions and take effective action to achieve desirable outcomes and avoid undesirable ones. Respondents of this research consists of 200 early adolescence with 78 male and 122 female. Those sampling obtained by non-probability (...)
    Direct download (2 more)  
     
    My bibliography  
     
    Export citation  
  40. Jim Vernon (2013). Why We Fight: Hegel's 'Struggle to the Death' Revisited. Cosmos and History: The Journal of Natural and Social Philosophy 9 (2):178-197.score: 24.0
    My goal in this paper is to counter an increasingly common interpretation of the most famous moment in Hegel's thought - the struggle for recognition. Specifically, through a close reading of the movement from self-conscious desire to the moment of struggle, I seek to refute three key claims: a) that self-consciousness finds itself, qua determining center, challenged by another desire, b) that self-consciousness responds to this challenge by seeking to somehow subjugate the other as determining desire, and c) that self-consciousness (...)
    Direct download  
     
    My bibliography  
     
    Export citation  
  41. Samuel Vriezen (2012). The Poetry of Jeroen Mettes. Continent 2 (1):22-28.score: 24.0
    continent. 2.1 (2012): 22–28. Jeroen Mettes burst onto the Dutch poetry scene twice. First, in 2005, when he became a strong presence on the nascent Dutch poetry blogosphere overnight as he embarked on his critical project Dichtersalfabet (Poet’s Alphabet). And again in 2011, when to great critical acclaim (and some bafflement) his complete writings were published – almost five years after his far too early death. 2005 was the year in which Dutch poetry blogging exploded. That year saw the foundation (...)
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  42. Stefan Billinger & Torsten Norlander (2011). Symbolic Behavior in Regular Classrooms: A Specification of Symbolic and Non-Symbolic Behavior. Frontiers in Psychology 2:122.score: 24.0
    Students’ capabilities to use symbolic information in classroom setting could be expected to influence their possibilities to be active and participating. The development of strategies for teachers to compensate for reduced capability need specific operational definition of symbolic behavior. Fifty-three students, aged 11 to 13 years old, 29 boys and 24 girls, from three classes in the same Swedish compulsory regular school participated in the current study. After a short training sequence 25 students (47%) were defined as showing symbolic behavior (...)
    Direct download (7 more)  
     
    My bibliography  
     
    Export citation  
  43. Piotr Brykczyński (2005). Kazimierza Twardowskiego koncepcja wytworów czynności. Filozofia Nauki 2.score: 24.0
    The aim of the paper is to provide a presentation and evaluation of Kazimierz Twardowski's conception, the subject matter and contents of which is delimited, roughly by (Twardowski 1965a). Since there is no separate problematization of the notion of action in Twardowski, it is maintained that the conception in question should be characterized rather as a conception of "products of actions" (hence the term "Twardowski's conception of products of actions") and not as a conception of "actions and products" - contrary (...)
    No categories
    Translate to English
    |
     
    My bibliography  
     
    Export citation  
  44. Tom Rockmore (2006). On War, Politics and Capitalism After 9/11. Theoria 53 (110):74-96.score: 22.0
    9/11 represents less a tear in the fabric of history, or a break with the past, than an inflection in ongoing historical processes, such as the continued expansion of capitalism that at some recent time has supposedly attained a level of globalization. This paper considers the relation of war and politics with respect to three instances arising in the wake of 9/11, including the war in Afghanistan, the war in Iraq, and finally the global war on terror (GWT). I argue (...)
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  45. Stella Gaon (2008). When Was 9/11? Philosophy and the Terror of Futurity. Philosophy and Social Criticism 34 (4):339-356.score: 22.0
    This article offers a close reading of Derrida's response to the events of 11 September 2001, in the interview he conducted immediately afterwards with Giovanna Borradori in the text Philosophy in a Time of Terror (2003). I argue that this text is significantly different from previous philosophical responses to horrific political events (such as those by Walter Benjamin, Theodor Adorno and Hannah Arendt) insofar as it invites us to contest radically the assumption that philosophy's role is to envision and to (...)
    Direct download (8 more)  
     
    My bibliography  
     
    Export citation  
  46. Edward F. Murphy Jr, John D. Gordon & Aleta Mullen (2004). A Preliminary Study Exploring the Value Changes Taking Place in the United States Since the September 11, 2001 Terrorist Attack on the World Trade Center in New York. [REVIEW] Journal of Business Ethics 50 (1):81 - 96.score: 22.0
    This study was a preliminary exploration of the value changes taking place in the United States since the September 11, 2001 terrorist attack on the World Trade Center in New York, which was a significant emotional event or cultural upheaval. Rokeach told us that "a person's total value system may undergo change as a result of socialization, therapy, or cultural upheaval..." (Rokeach, The Nature of Human Values, 1973, p. 37). The researchers explored the value changes of 500 aviation industry employees (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  47. Edward F. Murphy, John D. Gordon & Aleta Mullen (2004). A Preliminary Study Exploring the Value Changes Taking Place in the United States Since the September 11, 2001 Terrorist Attack on the World Trade Center in New York. [REVIEW] Journal of Business Ethics 50 (1):81 - 96.score: 22.0
    This study was a preliminary exploration of the value changes taking place in the United States since the September 11, 2001 terrorist attack on the World Trade Center in New York, which was a significant emotional event or cultural upheaval. Rokeach told us that a person's total value system may undergo change as a result of socialization, therapy, or cultural upheaval . . . (Rokeach, The Nature of Human Values, 1973, p. 37). The researchers explored the value changes of 500 (...)
    Direct download (6 more)  
     
    My bibliography  
     
    Export citation  
  48. Edward F. Murphy, Mark D. Woodhull, Bert Post, Carolyn Murphy-Post, William Teeple & Kent Anderson (2006). 9/11 Impact on Teenage Values. Journal of Business Ethics 69 (4):399 - 421.score: 22.0
    Did the September 11, 2001 terrorist attacks on the U.S. cause the values of teenagers in the U.S. to change? Did their previously important self-esteem and self-actualization values become less important and their survival and safety values become more important? Changes in the values of teenagers are important for practitioners, managers, marketers, and researchers to understand because high school students are our current and future employees, managers, and customers, and research has shown that values impact work and consumer-related attitudes and (...)
    Direct download (5 more)  
     
    My bibliography  
     
    Export citation  
  49. Sandra Winn, Debi Roker & John Coleman (1995). Knowledge About Puberty and Sexual Development in 11‐16 Year‐Olds: Implications for Health and Sex Education in Schools. Educational Studies 21 (2):187-201.score: 22.0
    Summary Knowledge is an important but largely neglected variable in sex education research. This study aimed to develop a measure to assess young people's knowledge about puberty and sexual development, and to examine knowledge in relation to age, gender and school. The main results of the study were that knowledge increased more between age 11/12 and 13/14 than between 13/14 and 15/16, girls knew more than boys at every age, and there were few differences in knowledge between the four schools (...)
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
  50. Peter Blatchford (1992). Children's Attitudes to Work at 11 Years. Educational Studies 18 (1):107-118.score: 22.0
    Summary This paper reports on individual interviews with 175 children, from 33 inner London junior schools, at 11 years of age. The children were part of a large?scale longitudinal study of educational progress based at the Thomas Coram Research Unit, and were also interviewed at 7 years. Children were heavily aware of the importance of school work, which figured prominently in views on the best and worst things about school. Only 17% were not looking forward to secondary school. They were (...)
    No categories
    Direct download (3 more)  
     
    My bibliography  
     
    Export citation  
1 — 50 / 1000