Search Results

There are 10354 results for: content related to: FROM THE ENEMY'S POINT OF VIEW: Violence, Empathy, and the Ethnography of Fakes

  1. Fake source-based source location privacy in wireless sensor networks

    Concurrency and Computation: Practice and Experience

    Volume 27, Issue 12, 25 August 2015, Pages: 2999–3020, Arshad Jhumka, Matthew Bradbury and Matthew Leeke

    Article first published online : 1 APR 2014, DOI: 10.1002/cpe.3242

  2. Post-Conflict Ambon: Forced Migration and the Ethno-Territorial Effects of Customary Tenure

    Development and Change

    Volume 41, Issue 3, May 2010, Pages: 401–419, Jeroen Adam

    Article first published online : 25 JUN 2010, DOI: 10.1111/j.1467-7660.2010.01645.x

  3. The Influence of Paratext on Narrative Persuasion: Fact, Fiction, or Fake?

    Human Communication Research

    Volume 38, Issue 4, October 2012, Pages: 459–484, Markus Appel and Barbara Malečkar

    Article first published online : 5 SEP 2012, DOI: 10.1111/j.1468-2958.2012.01432.x

  4. PRAW—A PRivAcy model for the Web

    Journal of the American Society for Information Science and Technology

    Volume 56, Issue 2, 15 January 2005, Pages: 159–172, Bracha Shapira, Yuval Elovici, Adlay Meshiach and Tsvi Kuflik

    Article first published online : 5 NOV 2004, DOI: 10.1002/asi.20107

  5. Profiling social networks to provide useful and privacy-preserving web search

    Journal of the Association for Information Science and Technology

    Volume 65, Issue 12, December 2014, Pages: 2444–2458, Alexandre Viejo and David Sánchez

    Article first published online : 12 MAY 2014, DOI: 10.1002/asi.23144

  6. OPTIMAL ENFORCEMENT AND ANTI-COPYING STRATEGIES TO COUNTER COPYRIGHT INFRINGEMENT

    Japanese Economic Review

    Volume 59, Issue 4, December 2008, Pages: 519–535, DYUTI S. BANERJEE, TANMOYEE BANERJEE (CHATTERJEE) and AJITAVA RAYCHAUDHURI

    Article first published online : 5 JUN 2008, DOI: 10.1111/j.1468-5876.2008.00424.x

  7. Rethinking fakes, authenticating selves

    Journal of the Royal Anthropological Institute

    Volume 18, Issue 4, December 2012, Pages: 846–863, Magdalena Crăciun

    Article first published online : 5 NOV 2012, DOI: 10.1111/j.1467-9655.2012.01795.x

  8. The Intellectual Roots of Islamic Radicalism in Indonesia: Ja‘far Umar Thalib of Laskar Jihad (Jihad Fighters) and His Educational Background

    The Muslim World

    Volume 95, Issue 1, January 2005, Pages: 81–120, Muḣammad Sirozi

    Article first published online : 1 FEB 2005, DOI: 10.1111/j.1478-1913.2005.00080.x

  9. TOGBAD—an approach to detect routing attacks in tactical environments

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 793–806, Elmar Gerhards-Padilla, Nils Aschenbruck and Peter Martini

    Article first published online : 13 JAN 2010, DOI: 10.1002/sec.185

  10. Sorcery, corruption, and the dangers of democracy in Indonesia

    Journal of the Royal Anthropological Institute

    Volume 12, Issue 2, June 2006, Pages: 413–431, Nils Bubandt

    Article first published online : 26 MAY 2006, DOI: 10.1111/j.1467-9655.2006.00298.x

  11. Toward an Integrated Model of Applicant Faking Behavior

    Journal of Applied Social Psychology

    Volume 36, Issue 4, April 2006, Pages: 979–1016, Lynn A. McFarland and Ann Marie Ryan

    Article first published online : 12 APR 2006, DOI: 10.1111/j.0021-9029.2006.00052.x

  12. Source—destination obfuscation in wireless ad hocnetworks

    Security and Communication Networks

    Volume 4, Issue 8, August 2011, Pages: 888–901, Thaier Hayajneh, Razvi Doomun, Prashant Krishnamurthy and David Tipper

    Article first published online : 15 JUL 2010, DOI: 10.1002/sec.220

  13. Analysis of the effect of InfoRanking on content pollution in peer-to-peer systems

    Security and Communication Networks

    Volume 7, Issue 4, April 2014, Pages: 700–713, P. Zhang, N. Fotiou, B. E. Helvik, G. F. Marias and G. C. Polyzos

    Article first published online : 28 JUN 2013, DOI: 10.1002/sec.773

  14. You have free access to this content
    Fake antimalarials in Southeast Asia are a major impediment to malaria control: multinational cross-sectional survey on the prevalence of fake antimalarials

    Tropical Medicine & International Health

    Volume 9, Issue 12, December 2004, Pages: 1241–1246, A. M. Dondorp, P. N. Newton, M. Mayxay, W. Van Damme, F. M. Smithuis, S. Yeung, A. Petit, A. J. Lynam, A. Johnson, T. T. Hien, R. McGready, J. J. Farrar, S. Looareesuwan, N. P. J. Day, M. D. Green and N. J. White

    Article first published online : 9 DEC 2004, DOI: 10.1111/j.1365-3156.2004.01342.x

  15. Do Applicants Fake Their Personality Questionnaire Responses and How Successful are Their Attempts? A Case of Military Pilot Cadet Selection

    International Journal of Selection and Assessment

    Volume 20, Issue 2, June 2012, Pages: 229–241, Zvonimir Galić, Željko Jerneić and Maja Parmač Kovačić

    Article first published online : 17 MAY 2012, DOI: 10.1111/j.1468-2389.2012.00595.x

  16. They Don't Do It Often, But They Do It Well: Exploring the relationship between applicant mental abilities and faking

    International Journal of Selection and Assessment

    Volume 17, Issue 3, September 2009, Pages: 271–281, Julia Levashina, Frederick P. Morgeson and Michael A. Campion

    Article first published online : 6 AUG 2009, DOI: 10.1111/j.1468-2389.2009.00469.x

  17. ISINA: INTEGRAL Source Identification Network Algorithm

    Monthly Notices of the Royal Astronomical Society

    Volume 390, Issue 4, November 2008, Pages: 1339–1348, S. Scaringi, A. J. Bird, D. J. Clark, A. J. Dean, A. B. Hill, V. A. McBride and S. E. Shaw

    Article first published online : 13 OCT 2008, DOI: 10.1111/j.1365-2966.2008.13765.x

  18. You have free access to this content
    THE ECONOMICS OF FAKING ECSTASY

    Economic Inquiry

    Volume 50, Issue 1, January 2012, Pages: 277–285, HUGO M. MIALON

    Article first published online : 26 APR 2011, DOI: 10.1111/j.1465-7295.2011.00379.x

  19. Designing robust routing protocols to protect base stations in wireless sensor networks

    Wireless Communications and Mobile Computing

    Volume 14, Issue 17, 10 December 2014, Pages: 1613–1626, Juan Chen, Hongli Zhang, Xiaojiang Du, Binxing Fang and Liu Yan

    Article first published online : 3 OCT 2012, DOI: 10.1002/wcm.2300

  20. Biogeology of Wallacea: geotectonic models, areas of endemism, and natural biogeographical units

    Biological Journal of the Linnean Society

    Volume 101, Issue 1, September 2010, Pages: 193–212, BERNARD MICHAUX

    Article first published online : 24 AUG 2010, DOI: 10.1111/j.1095-8312.2010.01473.x