Mostrando 3,441 - 3,460 Resultados de 3,895 Para Buscar '"The Exploited"', tiempo de consulta: 0.13s Limitar resultados
  1. 3441
    por Mehmet Murat PAYAM, Nurullah SELÇUK
    Publicado 2019
    ... and groups, exploitation and gender-based violence, physical harm and psychosocial distress. Finally...
    Enlace del recurso
    article
  2. 3442
    por V. A. Smirnov
    Publicado 2015
    ... of the following hypothesis: the exploitation of the "Russian threat" concept by political elites of the Baltic...
    Enlace del recurso
    article
  3. 3443
    por Vonani F. Bila
    Publicado 2021
    ... the issues of labour exploitation, cultural and historical marginalisation. Through the song Ku Hluvukile eka...
    Enlace del recurso
    article
  4. 3444
  5. 3445
  6. 3446
    ... compact, less redundant representation, exploiting the abundance of cliques and bicliques as elementary...
    Enlace del recurso
    article
  7. 3447
    por F.Gül KOÇSOY
    Publicado 2019
    ... embodied by such disturbing components as the blurring of black/mulatto lines, the exploitation...
    Enlace del recurso
    article
  8. 3448
    por Sarah Barrow
    Publicado 2012
    ... for the development of a more powerful set of images of Mexican Americans, exploiting the very tool of communication...
    Enlace del recurso
    article
  9. 3449
    ... exploit silencing to regulate host gene expression or to control the level of their accumulation and thus...
    Enlace del recurso
    article
  10. 3450
    ... exploitation, as is perhaps indicated by its Holocene ca. 30-fold population decline, approximately 3,500 years...
    Enlace del recurso
    article
  11. 3451
    ... is obtained by applying EKF to exploit shear wave propagation at each spatial point. Afterward...
    Enlace del recurso
    article
  12. 3452
    ... to exploit M cells to inject the host; and, finally, how this knowledge is used to specifically "target...
    Enlace del recurso
    article
  13. 3453
    ... side-channel trace in a largely automated fashion. The method exploits meta information about...
    Enlace del recurso
    article
  14. 3454
    ...-off for the lattice attack). Finally, we use our technique to obtain an improved exploitation...
    Enlace del recurso
    article
  15. 3455
    ... components. SuperflexPy is a Python package, enabling modelers to exploit the full potential of the framework...
    Enlace del recurso
    article
  16. 3456
  17. 3457
    ... by exploiting the multi-tube arrangement of a CTR for actuation of the different tool-set units. As a result...
    Enlace del recurso
    article
  18. 3458
    por Xinyu Li, Xiaoguang Gao, Chenfeng Wang
    Publicado 2021
    ... divergence at the beginning of the training may ruin the training result. To exploit fully the advantages...
    Enlace del recurso
    article
  19. 3459
    ... an informational cost prevents highly sophisticated ToM phenotypes to fully exploit less sophisticated ones (in a...
    Enlace del recurso
    article
  20. 3460
    ... how firefighters in extreme weather conditions exploit previous fire scars as firefighting...
    Enlace del recurso
    article