793 resultados para Peronist Feminine Party
Resumo:
El símbolo E/840/Rev.1 corresponde a la edición bilingüe inglés/francés publicada en 1953
Resumo:
Pós-graduação em Ciências Sociais - FFC
Resumo:
Informa acerca de las conclusiones y propuestas del Grupo de Trabajo encargado de revisar el protocolo de comercializacion agricola (AMP)
Resumo:
The process of knowledge representation as well as its procedures or tools and its products are not neutral in terms of values; instead they imply moral values. In this context, bias in representation related to prejudice and discrimination, to gender issues, to dicotomic categorization in classification systems or in thesauri and to lack of cultural warrant may arise. Concerning the problem of bias in indexing languages, starting from the initial theoretical reflexions of Brey (1999), Berman (1993), Olson (1998; 2002), Lopez-Huertas Perez & Torres Ramirez (2005), Guimaraes (2006), Hjorland (2008) and Milani et al. (2009), the proposal is to present a preliminary categorization aiming at facilitating the identification of bias concerning feminine issues in indexing languages, to offer a contribution to the theoretical universe of the specific questions of knowledge organization and to present a theme to be discussed by educators and professionals in the areas of cataloging, classification and indexing. If in a society which intends to be politically correct, social attitudes towards stigmatized citizens should be modified, then, the universe of indexing languages, taken as tools of knowledge representation, is a fertile field to sow this reflexion.
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
Resumo:
Pós-graduação em Letras - IBILCE
Resumo:
Three-party password-authenticated key exchange (3PAKE) protocols allow entities to negotiate a secret session key with the aid of a trusted server with whom they share a human-memorable password. Recently, Lou and Huang proposed a simple 3PAKE protocol based on elliptic curve cryptography, which is claimed to be secure and to provide superior efficiency when compared with similar-purpose solutions. In this paper, however, we show that the solution is vulnerable to key-compromise impersonation and offline password guessing attacks from system insiders or outsiders, which indicates that the empirical approach used to evaluate the scheme's security is flawed. These results highlight the need of employing provable security approaches when designing and analyzing PAKE schemes. Copyright (c) 2011 John Wiley & Sons, Ltd.
Resumo:
Research on congressional parties assumes, but has not directly shown, that party size affects individual members' calculations. Drawing on a key case from the nineteenth-century House the secession-driven Republican hegemony of 1861 this article explores the hypothesis that party voting not only declines but also becomes more strongly linked to constituency factors as relative party size increases. The analysis reveals that the jump in party size coincides with (1) a decrease in party voting among individual continuing members, (2) a strengthening association between some constituency factors and party voting, and (3) patterns of decline in individual party voting that are explained in part by constituency measures.