Search results for "BERT"
showing 10 items of 1789 documents
Web apocalittici e Social integrati
2015
La nota dicotomia individuata da Eco, 50 anni dopo il suo celebre saggio, individuata nelle dinamiche di relazione in rete
Le contrôle d'Internet : l'avers et le revers : Regards sur la société de l'information en Chine
2006
Electronic poetry : understanding poetry in the digital environment
2011
Vai pelkkää retoriikkaa? 11, Uusia kaikuja, välähdyksiä ja heijastuksia : poimintoja poliittisen ajattelun ja kielen muutoksista
2009
Citizens’ Cybersecurity Behavior: Some Major Challenges
2022
Citizens’ cybersecurity behaviors are an important concern in the modern age. This work discusses the challenges of studying citizen cybersecurity behaviors and the directions for future research. peerReviewed
La fisionomia del testamento tra volontà negativa e traduzione in regola successoria
2020
Sullo sfondo del rapporto tra la libertà testamentaria e le sue costrizioni, il saggio ricerca un nuovo punto di equilibrio tra la volontà ablativa del testatore, che ha rivitalizzato la riflessione scientifica sul contenuto negativo del testamento e, segnatamente, sulla clausola meramente diseredativa, e l’effettiva possibilità di tradurre in regola successoria una volontà testamentaria esplicita o implicita che sia stata ragione di frode per i creditori del legittimario leso o pretermesso.
Economía social de mercado y libre competencia en Colombia
2017
La pretensión de la tesis doctoral es analizar el sistema de Economía Social de Mercado —materialmente reconocido por la Constitución colombiana—y el derecho a la libre competencia económica como principio rector y derecho colectivo. La ordenación de la economía en las disposiciones constitucionales ha estado ligada a la historia del constitucionalismo. El tránsito de una Constitución programática a una de tipo normativo supuso analizar con mayor detenimiento la necesidad y conveniencia de incluir en aquella un conjunto de principios y pautas que dotaran a los ciudadanos y las autoridades del poder político de un marco normativo que permita armonizar los objetivos del Estado con el devenir …
The Hermitian part of a Rickart involution ring, I
2014
Rickart *-rings may be considered as a certain abstraction of the rings B(H) of bounded linear operators of a Hilbert space H. In 2006, S. Gudder introduced and studied a certain ordering (called the logical order) of self-adjoint Hilbert space operators; the set S(H) of these operators, which is a partial ring, may be called the Hermitian part of B(H). The new order has been further investigated also by other authors. In this first part of the paper, an abstract analogue of the logical order is studied on certain partial rings that approximate the Hermitian part of general *-rings; the special case of Rickart *-rings is postponed to the next part.
HALE-IoT: HArdening LEgacy Internet-of-Things devices by retrofitting defensive firmware modifications and implants
2022
Internet-Of-Things (IoT) devices and their firmware are notorious for their lifelong vulnerabilities. As device infection increases, vendors also fail to release patches at a competitive pace. Despite security in IoT being an active area of research, prior work has mainly focused on vulnerability detection and exploitation, threat modelling, and protocol security. However, these methods are ineffective in preventing attacks against legacy and End-Of-Life devices that are already vulnerable. Current research mainly focuses on implementing and demonstrating the potential of malicious modifications. Hardening emerges as an effective solution to provide IoT devices with an additional layer of d…
Esineiden Internet – nykyajan ja tulevaisuuden ongelmia sekä ratkaisuja kyberturvallisuuden näkökulmasta
2017
Kyberturvallisuus on hyvin tärkeä osa nykyaikaista yhteiskuntaa, sillä suuri osa toiminnastamme, esimerkiksi monissa palveluissa asiointi, tapahtuu Internetin tai muun verkoston kautta. Esineiden Internet on seuraava askel digitaaliselle yhteiskunnalle, jossa perinteisten tietokoneiden lisäksi myös muutkin arkipäiväiset laitteet yhdistetään verkkoon. Esineiden Internet kuitenkin eroa perinteisestä Internetistä monessa mielessä, ja näin ollen sen myöskin sen turvallisuuden toteuttamisessa eivät kaikki perinteiset ratkaisut toimi samalla tavalla. Tämän tutkielman tarkoituksena on käydä läpi Esineiden Internetin kyberturvallisuuden, ja jossain määrin fyysinen turvallisuuden, tilannetta tällä h…