Results for 'Achad Hash'erit'

80 found
Order:
  1.  62
    Article about the reception of the encyclical.Achad Hash'erit - 1993 - The Chesterton Review 19 (3):417-419.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2. Mengzi di zhi hui. Hash - 1980 - Taibei: fa xing suo Guo jia shu dian you xian gong si.
     
    Export citation  
     
    Bookmark  
  3. Ninjō to giri: hyūmanizumu no shōtai. Hash - 1978 - Tōkyō: Taimatsusha.
    No categories
     
    Export citation  
     
    Bookmark  
  4. A Recipe for Support Staff Professional Development.Vickie Hash - 2002 - Inquiry (ERIC) 7 (1):8-10.
     
    Export citation  
     
    Bookmark  
  5.  10
    Arts-based research across textual media in education: expanding visual epistemology.Jason D. DeHart & Peaches Hash (eds.) - 2023 - New York: Routledge.
    In company with its sister volume, Arts-Based Research Across Textual Media in Education explores arts-based approaches to research across media, including film and comics-related material, from a variety of geographic locations and across a range of sub-disciplines within the field of education. This first volume takes a textual focus, capturing process, poetic, and dramaturgical approaches. The authors aim to highlight some of the approaches that are not always centered in arts-based research. The contributors represent a variety of arts-based practices and (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  2
    Man and immortality.Adam Achad Sanders - 1956 - New York,: Pageant Press.
  7. Disjunctivism. HTML::Element=HASH(0x55e425c05ef8) - 2009 - Internet Encyclopedia of Philosophy.
    Disjunctivism, as a theory of visual experience, claims that the mental states involved in a “good case” experience of veridical perception and a “bad case” experience of hallucination differ, even in those cases in which the two experiences are indistinguishable for their subject. Consider the veridical perception of a bar stool and an indistinguishable hallucination; both of these experiences might be classed together as experiences (as) of a bar stool or experiences of seeming to see a bar stool. This might (...)
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  8.  11
    Hardening and microstructure evolution in proton-irradiated model and commercial pressure-vessel steels.G. S. Was *, M. Hash & R. G. Odette - 2005 - Philosophical Magazine 85 (4-7):703-722.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  9
    Hardening and microstructure evolution in proton-irradiated model and commercial pressure-vessel steels.G. S. Was, M. Hash & R. G. Odette - 2005 - Philosophical Magazine 85 (4-7):703-722.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10. Cryptographic hash functions based on ALife.Mark A. Bedau, Richard Crandall & Michael J. Raven - 2009 - Psipress.
    There is a long history of cryptographic hash functions, i.e. functions mapping variable-length strings to fixed-length strings, and such functions are also expected to enjoy certain security properties. Hash functions can be effected via modular arithmetic, permutation-based schemes, chaotic mixing, and so on. Herein we introduce the notion of an artificial-life (ALife) hash function (ALHF), whereby the requisite mixing action of a good hash function is accomplished via ALife rules that give rise to complex evolution of a given system. Various (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11. Approximate counting by hashing in bounded arithmetic.Emil Jeřábek - 2009 - Journal of Symbolic Logic 74 (3):829-860.
    We show how to formalize approximate counting via hash functions in subsystems of bounded arithmetic, using variants of the weak pigeonhole principle. We discuss several applications, including a proof of the tournament principle, and an improvement on the known relationship of the collapse of the bounded arithmetic hierarchy to the collapse of the polynomial-time hierarchy.
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  12.  26
    Senex erit puer.Frédéric Nef - 2007 - In Jean-Maurice Monnoyer (ed.), Metaphysics and Truthmakers. Pisctaway, NJ: Ontos Verlag. pp. 221-236.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  13. Hash runners and hellenistic philosophers.Richard DeWitt - 2007 - In Michael W. Austin (ed.), Running and Philosophy: A Marathon for the Mind. Wiley-Blackwell.
  14.  10
    Connectionist hashed associative memory.Ronald L. Greene - 1991 - Artificial Intelligence 48 (1):87-98.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  3
    HASH(0x55a475563790).Wayne Hugo - 2015 - Cape Town, South Africa: African Minds.
    All the schools of the world -- Unpacking classrooms -- How the 'brain' learns -- Charting the space between demons and angels -- History of the world in a child -- From one-world classroom to one learning sequence -- Conclusion, exercising the educational imagination.
    Direct download  
     
    Export citation  
     
    Bookmark  
  16.  8
    HASH (0xb7ee0818).C. Wild - 2008 - Poiesis and Praxis: International Journal of Ethics of Science and Technology Assessment 5 (1):1-14.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  17. Cryptographic hash functions from sequences of lifted Paley graphs.Serena Yuan - 2016 - In Delaram Kahrobaei, Bren Cavallo & David Garber (eds.), Algebra and computer science. Providence, Rhode Island: American Mathematical Society.
     
    Export citation  
     
    Bookmark  
  18. Color representations as hash values.Justin C. Fisher - 2005
    The goal of this paper is to answer the following question: When we have mental states that represent certain things as being colored, what properties are our mental states representing these things as having?
     
    Export citation  
     
    Bookmark  
  19.  7
    Ut pictura poesis non erit: Denis Diderots Kunstbegriff: mit einem Exkurs zu J.B.S. Chardin.Hubertus Kohle - 1989 - New York: G. Olms.
  20.  15
    (Nec) molestum erit mutuari?Christian Rollinger - 2019 - Hermes 147 (4):423.
    This paper posits that a change of mentality and of economic preferences among the higher orders of Roman society occurred in Late Republican and Early Imperial Rome, in so far as the practice of receiving and giving loans and credit was concerned. The political changes that swept the Late Republic and that saw the establishment of the Principate by Augustus decisively influenced the financial strategies and deportment of the nobility. The customary and largely horizontal practice of loan-giving among the elite (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21. Sefer Sheʼerit Yiśraʼel: be-ʻinyene halakhah, agadah ṿe-hashḳafah... ; Ḳunṭres Me-ʻemeḳ ha-bakha.Israel Schepansky - 1997 - Brooklyn, N.Y. (2220 Avenue L, Brooklyn 11210): Y. Sh. Shtsipansḳi. Edited by Israel Schepansky.
     
    Export citation  
     
    Bookmark  
  22.  12
    A Data Preservation Method Based on Blockchain and Multidimensional Hash for Digital Forensics.Gongzheng Liu, Jingsha He & Xinggang Xuan - 2021 - Complexity 2021:1-12.
    Since digital forensics becomes more and more popular, more and more attention has been paid to the originality and validity of data, and data preservation technology emerges as the times require. However, the current data preservation models and technologies are only the combination of cryptography technology, and there is a risk of being attacked and cracked. And in the process of data preservation, human participation is also needed, which may lead to data tampering. To solve problems given, this paper presents (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23. Shem u-sheʹerit.Efrayim Simḥah Rozenfeld (ed.) - 1974
     
    Export citation  
     
    Bookmark  
  24. Sefer Sheʼerit Menaḥem: maʼamarim: meyusad ʻal maʼamre ḥazal ṿe-divre rabotenu ha-ḳedoshim.Samuel Jacob Rubinstein - 2011 - Bene Beraḳ: Mekhon "Limud agadah".
     
    Export citation  
     
    Bookmark  
  25.  34
    Design of a New Distributed NoSQL Database with Distributed Hash Tables.Agustín San Román Guzmán, Diego Valdeolmillos, Alberto Rivas, Angélica González Arrieta & Pablo Chamoso - 2022 - Logic Journal of the IGPL 30 (4):566-577.
    Databases play a fundamental role in today’s world, being used by most companies, especially those that offer services through the Internet. Today there is a wide variety of database models, each adapted for use according to the specific requirements of each application. Traditionally, the relational models with centralized architectures have been used mostly due to their simplicity and general-purpose query language, which made relational systems suitable for almost any application. However, with the growth of the Internet in recent decades, both (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  26.  11
    La Science et La V\’erite.Jacques Lacan - 1966 - Cahiers Pour L’Analyse 1.
    Direct download  
     
    Export citation  
     
    Bookmark   5 citations  
  27.  18
    A Critical Edition of the “Ĥāshıya ‘alā Muqaddımāt al-Arba‘a” of Muśliĥu’d-Dīn al-Kastalī and an Analytical Interpretation of the Work.Mustafa Bilal ÖZTÜRK - 2020 - Kader 18 (2):666-724.
    The text of “The Four Premises” (Muqaddimāt al-Arba‘a), which began with Sadr al-Sharī‘ah (d. 747/1346), centralizes on the actions of human beings by connecting it with the problem of good and evil in the field of kalām, Islamic philosophy and logic, and fıqh. It was also commented in with incisive and critical footness by Sa‘d al-Dīn al-Taftāzānī (d. 791/1390). In Ĥāshiya ‘alā Muqaddimāt al-Arba‘a, al-Kastalī (d. 901/1496) discusses the two main issues. One of them is good/husn-evil/qubh, the other is human (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28. De la recherche de la v\’erité.Nicolas Malebranche - 1674 - Pralard.
    No categories
     
    Export citation  
     
    Bookmark   2 citations  
  29.  15
    Possibilités et limites de l’accès scientifique à la v érité.Paul Chauchard - 1964 - Actes du XIIe Congrès des Sociétés de Philosophie de Langue Française 1:81-84.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  30. Teʼoryah shel ha-milḥamah: yetsivut ha-maʻarekhet u-tefuḳot ṭeriṭoriʼaliyot = Theory of war: system stability and territorial outcomes.Ofer Israeli - 2017 - Tel Aviv: Resling.
    No categories
     
    Export citation  
     
    Bookmark  
  31.  97
    Justin Fisher's 'color representations as hash values'.Benj Hellie - manuscript
    Justin makes a novel case, based on reflection on the “telos” of color vision, for a dispositional theory of colors. Justin’s case is highly suggestive, and comes tantalizingly close to resolving the debate in the metaphysics of color. But I have a few questions which I would like to see answered before I am converted.
    Direct download  
     
    Export citation  
     
    Bookmark  
  32. Bishārat: khudā bih zādgāhash ba̲z mīʹgardad.Hūshang Muʻīnʹzādah - 2005 - France: Āz̲arakhsh.
    No categories
     
    Export citation  
     
    Bookmark  
  33. Meaningful electronic signatures based on an automatic indexing method.Maxime Wack, Ahmed Nait-Sidi-Moh, Sid Lamrous & Nathanael Cottin - 2006 - Artificial Intelligence and Law 14 (3):161-175.
    Legal information certification and secured storage combined with documents electronic signature are of great interest when digital documents security and conservation are in concern. Therefore, these new and evolving technologies offer powerful abilities, such as identification, authentication and certification. The latter contribute to increase the global security of legal digital archives conservation and access. However, currently used cryptographic and hash coding concepts cannot intrinsically enclose cognitive information about both the signer and the signed content. Indeed, an evolution of these technologies (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  34. Algorithmic content moderation: Technical and political challenges in the automation of platform governance.Christian Katzenbach, Reuben Binns & Robert Gorwa - 2020 - Big Data and Society 7 (1):1–15.
    As government pressure on major technology companies builds, both firms and legislators are searching for technical solutions to difficult platform governance puzzles such as hate speech and misinformation. Automated hash-matching and predictive machine learning tools – what we define here as algorithmic moderation systems – are increasingly being deployed to conduct content moderation at scale by major platforms for user-generated content such as Facebook, YouTube and Twitter. This article provides an accessible technical primer on how algorithmic moderation works; examines some (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   21 citations  
  35.  16
    Facial Expression Recognition Using Kernel Entropy Component Analysis Network and DAGSVM.Xiangmin Chen, Li Ke, Qiang Du, Jinghui Li & Xiaodi Ding - 2021 - Complexity 2021:1-12.
    Facial expression recognition plays a significant part in artificial intelligence and computer vision. However, most of facial expression recognition methods have not obtained satisfactory results based on low-level features. The existed methods used in facial expression recognition encountered the major issues of linear inseparability, large computational burden, and data redundancy. To obtain satisfactory results, we propose an innovative deep learning model using the kernel entropy component analysis network and directed acyclic graph support vector machine. We use the KECANet in the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  36.  71
    Hume Contra Spinoza?Wim Klever - 1990 - Hume Studies 16 (2):89-105.
    In lieu of an abstract, here is a brief excerpt of the content:Hume Contra Spinoza? Wim Klever In Book 1 ofthe TreatiseofHumanNature1 Spinoza enjoys thehonour ofbeing the only figure from the history of philosophy and science to be explicitly and extensively discussed by Hume. This honour is, however, a dubious one as the treatment he gets is not so friendly. The passage (T 232-51) is full of insults and denunciations: Spinoza is referred to as "that famous atheist" (T 241), and (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  37.  24
    An optimization of color halftone visual cryptography scheme based on Bat algorithm.Salama A. Mostafa, Ihsan Salman & Firas Mohammed Aswad - 2021 - Journal of Intelligent Systems 30 (1):816-835.
    Visual cryptography is a cryptographic technique that allows visual information to be encrypted so that the human optical system can perform the decryption without any cryptographic computation. The halftone visual cryptography scheme (HVCS) is a type of visual cryptography (VC) that encodes the secret image into halftone images to produce secure and meaningful shares. However, the HVC scheme has many unsolved problems, such as pixel expansion, low contrast, cross-interference problem, and difficulty in managing share images. This article aims to enhance (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  38.  29
    Ethical Reasoning in Action: Validity Evidence for the Ethical Reasoning Identification Test.Kristen Smith, Keston Fulcher & Elizabeth Hawk Sanchez - 2017 - Journal of Business Ethics 144 (2):417-436.
    Professionals in business and law, healthcare providers, educators, policymakers, consumers, and higher education practitioners value ethical reasoning skills. Because of this, we concentrated campus-wide reaccreditation efforts to help students actively engage in ER. In doing so, we re-conceptualized the ER process, implemented campus-wide ER interventions designed to be experienced by all undergraduate students, and created the ethical reasoning identification test to measure students’ ability to engage in a foundational step in the ER process. Using factor analysis, we demonstrated internal validity (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  39. Internalism about reasons: sad but true?Kate Manne - 2014 - Philosophical Studies 167 (1):89-117.
    Internalists about reasons following Bernard Williams claim that an agent’s normative reasons for action are constrained in some interesting way by her desires or motivations. In this paper, I offer a new argument for such a position—although one that resonates, I believe, with certain key elements of Williams’ original view. I initially draw on P.F. Strawson’s famous distinction between the interpersonal and the objective stances that we can take to other people, from the second-person point of view. I suggest that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   63 citations  
  40.  50
    (1 other version)Humean Reductionism about Laws of Nature.Ned Hall - 2015 - In Barry Loewer & Jonathan Schaffer (eds.), A companion to David Lewis. Chichester, West Sussex ;: Wiley-Blackwell. pp. 262–277.
    This chapter investigates the prospects for an important position that falls under the "mere patterns" approach: what, for reasons that will emerge, the author calls"Humean reductionism" about laws of nature, a view championed perhaps most prominently by David Lewis. He reviews some of the most interesting arguments against this position from the literature, and adds some of his own that, he thinks, are more effective. The chapter considers how the best system account (BSA) would apply to the Newtonian particle world. (...)
    Direct download  
     
    Export citation  
     
    Bookmark   42 citations  
  41.  13
    The Philosophy of Modern Song by Bob Dylan (review).Peter Cheyne - 2024 - Philosophy and Literature 48 (1):254-257.
    In lieu of an abstract, here is a brief excerpt of the content:Reviewed by:The Philosophy of Modern Song by Bob DylanPeter CheyneThe Philosophy of Modern Song, Bob Dylan; 422 pp. New York: Simon and Schuster, 2022.Bob Dylan, like Dante's Virgil, takes us on an odyssey through sixty-six levels, not of the Underworld but of Songworld, in The Philosophy of Modern Song. With playful prose rhythms measured for pleasure and effect, these vistas are almost all seen through second-person portrayals. His gorgeous (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  24
    Stripping the Roman Ladies: Ovid's Rites and Readers.Ioannis Ziogas - 2014 - Classical Quarterly 64 (2):735-744.
    Ovid's disclaimers in theArs Amatorianeed to be read in this context. My main argument is that, in his disclaimers, Ovid is rendering his female readership socially unrecognizable, rather than excluding respectable virgins andmatronaefrom his audience.Ars1.31–4, Ovid's programmatic statement about his work's target audience, is a case in point. A closer look at the passage shows that he does not necessarily warn off Roman wives and marriageable girls:este procul, uittae tenues, insigne pudoris,quaeque tegis medios instita longa pedes:nos Venerem tutam concessaque furta (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  43.  23
    Cicero's Silva(a Note on Ad Atticum 12.15).Brian Walters - 2013 - Classical Quarterly 63 (1):426-430.
    In mid-February 45b.c.e., in a tragedy that was to plunge the orator into seemingly irreparable despair, Cicero's beloved daughter Tullia died. She had given birth nearly a month before and at first seemed to be doing well. Soon, however, her health gave out and Cicero took her to his Tusculan villa to recover. In the end, there was little that could be done. After her funeral, Cicero stayed for about three weeks with Atticus in Rome, but the constant stream of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  34
    Anonymus: Defensorium Ockham Ms. Romae, bibl. Angelica 1017 ff. 21r-36r. Anonymus - 1994 - Franciscan Studies 54 (1):111-122.
    In lieu of an abstract, here is a brief excerpt of the content:Anonymus Defensorium Ockham Ms. Romae, bibl. Angelica 1017 ff. 21r-36r Conspectus siglorum: = addendum censeo [....] = delendum censeo«..» = litterae illegibiles factae sive propter codicis corruptionem deperditae [[..]] = scriptor delevit Y.../ = in margine sive supra lineam inserta (?) = lectio incerta t...-t = corrupta esse videntur I22rl = incipit pagina 22 recto codicis«cCapitulum 15. De novem praedicamentis denominativis> Praedicamenta (adn. in mg.: Capitulo 15) alia a (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  17
    Caveat Emptor Doesn’t Cut It.Rachel Cooper - 2013 - Voices in Bioethics 2013.
    We live in the era of Facebook, Fitbit, and Skype. As such, it would be unreasonable to expect that the healthcare industry would not see the same kind of globalization as do our social spheres and consumer activities. Indeed, the explosion of information technology, the ease of transcontinental travel, and the emergence of a more globally aware citizenry allows for scientific collaboration that has had many positive effects on global health. However, the economic and structural disparities between systems of healthcare (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  46.  8
    “We Need to Cut the Neck!”: Confronting Psychological and Moral Distress during Emergency Cricothyrotomy.Stephanie Cooper - 2013 - Narrative Inquiry in Bioethics 3 (2):5-9.
    In lieu of an abstract, here is a brief excerpt of the content:“We Need to Cut the Neck!”Confronting Psychological and Moral Distress during Emergency Cricothyrotomy1Stephanie CooperEnoughYou didn’t die in the ER, but rather, began your inexorable demise. The last, first, and only words I ever heard you utter was the weak mewl “tight, tight” as the blood pressure cuff constricted your left arm. You were 98–years–old, bed–bound, at the end. Your world was already partitioning itself from us, your brain tunneling (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  20
    Operation Arbitration: Privatizing Medical Malpractice Claims.Myriam Gilles - 2014 - Theoretical Inquiries in Law 15 (2):671-696.
    Binding arbitration is generally less available in tort suits than in contract suits because most tort plaintiffs do not have a pre-dispute contract with the defendant, and are unlikely to consent to arbitration after the occurrence of an unforeseen injury. But the Federal Arbitration Act applies to all “contract[s] evincing a transaction involving commerce,” including contracts for healthcare and medical services. Given the broad trend towards arbitration in nearly every other business-to-consumer industry, coupled with some rollbacks in tort reform measures (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  89
    When Ideas Matter: The Moral Philosophy of Fontenelle.Gregory Matthew Adkins - 2000 - Journal of the History of Ideas 61 (3):433-452.
    In lieu of an abstract, here is a brief excerpt of the content:Journal of the History of Ideas 61.3 (2000) 433-452 [Access article in PDF] When Ideas Matter: The Moral Philosophy of Fontenelle Gregory Matthew Adkins Introduction There has been a recent trend in the historiography of seventeenth- and eighteenth-century intellectual culture to analyze that culture from a sociological perspective. This perspective, a necessary corrective to a pure history of ideas, takes knowledge as a socially constructed phenomenon and thus subject (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  49.  37
    The Lex Mamilia Roscia Pedvcaea Alliena Fabia.E. G. Hardy - 1925 - Classical Quarterly 19 (3-4):185-.
    I prefix to this paper for convenience of reference the three extant chapters of the law: K.L. III. Quae colonia hac lege deducta quodue municipium praefectura forum conciliabulum constitutum erit, qui ager intra fines eorum erit, qui termini in eo agro statuti erunt, quo in loco terminus non stabit, in eo loco is, cuius is ager erit, terminum restituendum curato, uti quod recte factum esse uolet: idque magistratus, qui in ea colonia municipio praefectura foro conciliabulo iure dicundo praeerit, facito ut (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  50.  21
    Approximate counting and NP search problems.Leszek Aleksander Kołodziejczyk & Neil Thapen - 2022 - Journal of Mathematical Logic 22 (3).
    Journal of Mathematical Logic, Volume 22, Issue 03, December 2022. We study a new class of NP search problems, those which can be proved total using standard combinatorial reasoning based on approximate counting. Our model for this kind of reasoning is the bounded arithmetic theory [math] of [E. Jeřábek, Approximate counting by hashing in bounded arithmetic, J. Symb. Log. 74(3) (2009) 829–860]. In particular, the Ramsey and weak pigeonhole search problems lie in the new class. We give a purely computational (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 80