906 resultados para Patrimonio editorial
Resumo:
Malone, C.A.T., S.K.F. Stoddart, and S. Kaner, Editorial. Antiquity, (Topics Include QAA issues, Wainwright’s retrospective, Sutton Hoo, York, Dimbleby, Cook).
Resumo:
Stoddart, S. and C. Malone, Editorial. Antiquity, 2001. 75(287): p. 1-10 (Topics Include British Museum great court, internet archaeology, Illicit Antiquities, McNeish).
Resumo:
Stoddart, S.and C. Malone, Editorial. Antiquity, (Topics Include Afghanistan, Malta and Iconoclasm, UNESCO, York, Philip Barker, James Deetz).
Resumo:
Stoddart, S.and C. Malone, Editorial. Antiquity, (Topics Include Media and Archaeology, Politics and Archaeology-heritage, Hope Taylor, Dating, Neolithisation).
Resumo:
Stoddart, S.and C. Malone, Editorial. Antiquity, (Topics Include cost, investment and value in archaeology and the public, Africa Special Section, Artefacts, Burgess and Robb replies, Rhys Jones)
Resumo:
Stoddart, S. and C. Malone, Celebrating Antiquity: introduction. Antiquity, 2002. 76(294): p. 1063-5.
Resumo:
Stoddart, S.and C. Malone., Editorial. Antiquity, (Topics Include Ancestors and the special issue on celebrating ancestors, conferences, Giot, RAE issues, Peter Reynolds).
Resumo:
Stoddart, S.and C. Malone Editorial. Antiquity, (Topics Include Archaeology in Ireland, General Heritage, Archaeology).
Resumo:
Stoddart, S.and C. Malone . Editorial. Antiquity, (Topics Include funding for archaeology, British Museum finances and heritage finances, conferences, Portugal, Coa and Palaeolithic matters, deep time, David Coombs).
Resumo:
Stoddart, S. and C. Malone, Editorial. Antiquity, (Topics Include retrospective of editing Antiquity).
Resumo:
In wireless networks, the broadcast nature of the propagation medium makes the communication process vulnerable to malicious nodes (e.g. eavesdroppers) which are in the coverage area of the transmission. Thus, security issues play a vital role in wireless systems. Traditionally, information security has been addressed in the upper layers (e.g. the network layer) through the design of cryptographic protocols. Cryptography-based security aims to design a protocol such that it is computationally prohibitive for the eavesdropper to decode the information. The idea behind this approach relies on the limited computational power of the eavesdroppers. However, with advances in emerging hardware technologies, achieving secure communications relying on protocol-based mechanisms alone become insufficient. Owing to this fact, a new paradigm of secure communications has been shifted to implement the security at the physical layer. The key principle behind this strategy is to exploit the spatial-temporal characteristics of the wireless channel to guarantee secure data transmission without the need of cryptographic protocols.