Search

Results: 78851
How to sabotage a secret society. The demise of Carl Friedrich Bahrdt’s German union in 1789
AV McKenzie-McHarg
Mar 17, 2017
In 1789 in Leipzig a slim pamphlet of 128 pages appeared that sent shock waves through the German republic of letters. The pamphlet, bearing the title Mehr Noten als Text (More Notes than Text), was an ‘exposure’ whose most...
Published by:
From Tone to Tune—Carl Stumpf and the Violin
Julia Kursell
Mar 03, 2020
This article investigates the work of philosopher and experimental psychologist Carl Stumpf with a focus on embedding his scientific perspective in a practice of musicianship. Stumpf wrote in an autobiographical essay from 1924...
Published by:
Structual Visualization of Cytoskeletal Force Tranduction
Ayala Carl
Jan 01, 0001
Cells adhere to their surroundings, mechanically interfacing their intracellular actin cytoskeletons with their local extracellular environments. This enables contractile forces generated by myosin motors to mediate transduction...
Published by: Rockefeller University
Skinny Dip: Carl Hiassen, Detective Fiction and the Murder of the Florida Everglades
Carl Hiaasen's 2004 novel, Skinny Dip, reworks the typical structures and tropes of detective fiction to argue that the most significant "murder" in this text is the large-scale destruction of the Florida Everglades. Using farce...
Published by: Winthrop University
Institute to University
A Seventy-Fifth Anniversary Colloquium, June 8, 1976 The publication of this volume was made possible by a gift from Mr. And Mrs. Carl H. Pforzheimer, Jr.
To Carl Schmitt, Letters and Reflections, by Jacob Taubes, translated by Keith Tribe, with an Introduction by Mike Grimshaw, New York: Columbia University Press, 120 pp., Hardcover, $26.00/£22.00, ISBN: 9780231154123, Publication Date
Samuel Garrett Zeitlin
Jun 28, 2021
As a young boy in the 1930s, Jacob Taubes (1923-1987) and his family left Austria for Switzerland to escape Nazism. In Switzerland, Taubes received both ordination as a rabbi and a classical education in philosophy (culminating...
Published by:
A geometry generation framework for contoured endwalls
The mainstream, or primary, flow in a gas turbine annulus is characteristically two-dimensional over the mid-span region of the blading, where the radial flow is almost negligible. Contrastingly, the flow in the endwall and tip...
Published by:
A geometry generation framework for contoured endwalls
The mainstream, or primary, flow in a gas turbine annulus is characteristically two-dimensional over the mid-span region of the blading, where the radial flow is almost negligible. Contrastingly, the flow in the endwall and tip...
Published by:
The Future of Biomedical Research and Education
Four Talks on the Occasion of the Installation of Dr. Joshua Lederberg as President of The Rockefeller University, October 16, 1978 This publication has been aided by a grant from The Carl and Lily Pforzheimer Foundation, Inc.
Achieving robustness to aleatoric uncertainty with heteroscedastic Bayesian optimisation
Abstract: Bayesian optimisation is a sample-efficient search methodology that holds great promise for accelerating drug and materials discovery programs. A frequently-overlooked modelling consideration in Bayesian optimisation...
Published by:
HTAP With Reactive Streaming ETL
In database management systems (DBMSs), query workloads can be classified as online transactional processing (OLTP) or online analytical processing (OLAP). These often run within separate DBMSs. In hybrid transactional and...
Depression amongst interns working in a tertiary care teaching Hospital in Maharashtra
Background: Internship is a crucial stage of medical school regarding student stress which can affect the patient care negatively. Retrieving knowledge about presence of depression is therefore important in itself and if found...
Published by: IJHS Medical Association
A Model of Cloud Forensic Application With Assurance of Cloud Log
The key concepts of digital forensic investigation in cloud computing are examination and investigation. Cybercriminals target cloud-based web applications due to presence of vulnerabilities. Forensic investigation is a complex...

|<

<

1

2

3

4

5

>

>|