The platform will undergo maintenance on Sep 14 at about 9:30 AM EST and will be unavailable for approximately 1 hour.
DOI: 10.17771/pucrio.acad.36507
|View full text |Cite
|
Sign up to set email alerts
|

Memory Matter(s): Assembling Memorials in Post-Genocide Rwanda

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 43 publications
0
3
0
Order By: Relevance
“…• Barreto's set, proposed by Barreto (2004), contains a total of 17 instances with 2 to 15 possible facility locations and 12 to 150 customers.…”
Section: Numerical Experiments and Resultsmentioning
confidence: 99%
“…• Barreto's set, proposed by Barreto (2004), contains a total of 17 instances with 2 to 15 possible facility locations and 12 to 150 customers.…”
Section: Numerical Experiments and Resultsmentioning
confidence: 99%
“…On the other hand, 3.3 μM Noc was reported to increase the stiffness of L929 . However, further studies have shown that depolymerization of microtubules with Noc induces the actin stress fibers formation through Rho signaling and causes cell contraction which augments cell stiffness. For further investigation, actin filaments are inhibited with Cyto-D. ,,, The VIPS of HT-29 treated with Cyto-D alone is significantly higher than that of live cells at 90 kHz but not at 120 kHz. On the other hand, the VIPS of HT-29 treated with Cyto-D and Noc is significantly higher than that of live HT-29 at both 90 kHz and 120 kHz.…”
Section: Discussionmentioning
confidence: 96%
“…A composite service (Casati, Sayal, & Shan, 2001) consists of a bundle of services that, together, provide service consumers with a composite functionality. There are standard languages to define composite services (e.g., BPEL4WS) (Alves et al, 2007); however, security aspects are not supported in a standard manner. The main purpose of STS-ml is to enable the specification of security and trustworthiness requirements for composite services.…”
Section: Case Study: Development Of a Tool-supported Security Modelin...mentioning
confidence: 99%