文章 — Recent
用 LaTeX 编写并由我们社区发布的论文、演示文稿、报告等。 在下面搜索或浏览。
![The Flyby Model of Chondrule Formation: an Investigation into the Viability ofGranoblastic Olivine Aggregates as Type I Chondrule Precursor Material](https://writelatex.s3.amazonaws.com/published_ver/6406.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240702T091931Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240702/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=db498ae82677cc148d90b573b90a307286687e7cbf5e3692c4c87dd151a7f820)
The Flyby Model of Chondrule Formation: an Investigation into the Viability ofGranoblastic Olivine Aggregates as Type I Chondrule Precursor Material
A look into the viability of GOAs as type I chondrule precursor material within the new heating parameters of the fly by model.
Ian K. Bania
![THE HISTORY OF MY LIFE](https://writelatex.s3.amazonaws.com/published_ver/1992.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240702T091931Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240702/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=80b8b25ab56725350db1710ea61072cc1461919517f700dcc52ebf6475fe95bc)
THE HISTORY OF MY LIFE
It was 7-7-1993 when i was born,it was luckly to be born a baby boy,my mum was very happy.It was in the Iringa regional hospital.
godfrey mtega
![Kaynat Jameel's CV](https://writelatex.s3.amazonaws.com/published_ver/9362.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240702T091931Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240702/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=a7d98ddf34b19d00760479d7308a7d50039ab1f9aebeecb1324bf9be85675ca3)
Kaynat Jameel's CV
Kaynat Jameel's CV, created with this CV template
kaynat jameel
![Martina Lucía Velarde's CV](https://writelatex.s3.amazonaws.com/published_ver/3687.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240702T091931Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240702/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=2181368d1bba6c5d58a2887d1c2bf8615dede708ec554814bc277112ef4d5a0c)
Martina Lucía Velarde's CV
Martina Lucía Velarde's CV
martina
![Dissertation SCRATCH](https://writelatex.s3.amazonaws.com/published_ver/5235.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240702T091931Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240702/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=9dac4cd135f5b8a42df5c056ab4630e1a2664a88281ac804170febc82201d7b6)
Dissertation SCRATCH
Excerpt from main dissertation
Michelle Baltazar
![1ère série: Cicada 3301](https://writelatex.s3.amazonaws.com/published_ver/11576.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240702T091931Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240702/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=13d58b646fed73cfc7a468baeb71db1d3ca2e077d75d23770d800e5f3efaaee2)
1ère série: Cicada 3301
Purely for school purpose.
Lazare NOGRETTE
![Toric varieties I](https://writelatex.s3.amazonaws.com/published_ver/2767.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240702T091931Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240702/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=e08e441b102716b31e2bb957b4acb75187580de124235b1a57d13cc1069ed763)
Toric varieties I
The lecture notes are based on Tom Coates' lecture on toric varieties. A few references:
M. Audin, Toric actions on symplectic manifolds
W. Fulton, Toric varieties
Cox-Schenck-Little, Toric varieties
liyang
![Actividad Extra Distribución Agave.](https://writelatex.s3.amazonaws.com/published_ver/2766.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240702T091931Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240702/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=1578206b4c248f62766db5b18e070ed5b6cc89cc5f1cf2763be83344713a339e)
Actividad Extra Distribución Agave.
Computo Forense Agave
Mariana
![Privacy Enhancement Technologies: A software engineering approach for PET](https://writelatex.s3.amazonaws.com/published_ver/3705.jpeg?X-Amz-Expires=14400&X-Amz-Date=20240702T091931Z&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAWJBOALPNFPV7PVH5/20240702/us-east-1/s3/aws4_request&X-Amz-SignedHeaders=host&X-Amz-Signature=dfb462e75e03946c98ec3357623bfce30bc9ca7ed56bb51f3c892140f80c1588)
Privacy Enhancement Technologies: A software engineering approach for PET
Privacy is an increasingly important subject for organizations. Nowadays, organizations (unknowingly) process vast amounts of personal data of their customers in numerous different information systems. There are strict legislations regarding the processing of personal data, and from mid-2016, these legislations will only get more strict with the introduction of the General Data Protection Regulation in the European Union. In an approach to ensure compliance with these legislations, different techniques such Privacy Enhancing Technologies, Privacy-by-Design and Privacy Design Strategies were introduced in the past decades. However, these techniques tend to be defined in such a high-level of abstraction that they are hard to use in practice. This paper discusses and explains various software techniques which can help to design information systems that can better protect the privacy of their users. Next, these techniques are combined as a solution named Privacy Management System. This system is able to ensure and enforce full data processing transparency of an organization and should close the gap between the privacy legislations and software development.
Mike de Roode