Loading...
  • 1995
  • Another criterion, used by Ken Wilber (1995), is an asymmetric relationship, where the lower holon is necessary for the existence of the higher, while the higher is not necessary for the lower. (integralworld.net)
  • study
  • The study defined a good relationship as one in which there were high levels of warmth and problem-solving and low levels of conflict and detachment. (eurekalert.org)
  • Adolescents who witnessed conflict between their parents had greater distressed responses to conflicts a year later, and greater distressed responses, in turn, predicted mental health problems in the teens in the subsequent year, the study found. (eurekalert.org)
  • Relationships with siblings protected teens whether we defined a good bond as one that included warmth and problem-solving skills or one that had low levels of destructive conflict or disengagement," explains Meredith Martin, assistant professor of psychology at the University of Nebraska-Lincoln, who coauthored the study. (eurekalert.org)
  • It's hard to argue that they keep you healthier, especially when you learn about an Australian study that found people with a large network of friends outlived those with the fewest by 22 percent. (healthywomen.org)
  • Kindergartners who experienced harsh parenting but also had developed close buddies were less likely at the end of the school year to exhibit behaviors such as defiance towards adults, rule breaking and angry outbursts than those who did not have warm relationships, according to the study published in Development and Psychopathology. (reuters.com)
  • The new study shows that "for kids who have parenting that is less than optimal, there are opportunities in both their friendships and relationships with teachers at school to get the support, engagement and reinforcement of their worth that may help blunt the negative impact of harsh parenting," said Patrick Tolan, the Charles S. Robb Professor in the Curry School of Education and Human Development at the University of Virginia. (reuters.com)
  • Our study assesses the extent to which a strong reputation and claims about social responsibility buffer firms from activist pressure. (ssrn.com)
  • In Study 1, I manipulated potential partner rejection and found that attachment anxiety, attachment avoidance, and rejection-salience interacted to influence intentions to engage in unprotected sex. (queensu.ca)
  • In Study 2, I manipulated general rejection-salience and asked women to indicate how many weeks into a relationship would be appropriate before switching from having protected to unprotected sex. (queensu.ca)
  • In Study 3, I manipulated general rejection-salience and asked women to report how many weeks into a relationship unprotected intercourse should occur. (queensu.ca)
  • Study 4 explored how the exposure to positive relationship thoughts may act to buffer the influence of rejection-salience on risky sexual tendencies among highly anxious women. (queensu.ca)
  • exposure
  • We found evidence of racial/ethnic and socioeconomic differences in model-based estimates of noise exposure throughout the United States. (nih.gov)
  • Anxiety
  • And, as it turns out, research is finding an "attitude of gratitude" to have a host of health benefits like sounder sleep, lower levels of anxiety, stress and depression and greater optimism about the future. (healthywomen.org)
  • Inconsistent with my predictions, as well as from the results of Studies 1 and 2, among women who were high in anxiety and low in avoidance, those in the rejection-salience condition reported that unprotected sex belonged later in a relationship timeline compared to those in the control condition. (queensu.ca)
  • ethnicity
  • We also evaluated the relationship between race/ethnicity and noise, stratified by levels of metropolitan area racial residential segregation, classified using a multigroup dissimilarity index. (nih.gov)
  • children's
  • Strengthening sibling relationships may not only directly foster children's psychological adjustment, but also offer new approaches to counteracting the risks associated with experiencing hostility and unresolved conflicts between parents. (eurekalert.org)
  • When the researchers analyzed ODD symptoms from a composite of parent, teacher and children's reports, they found harshly parented kids who were liked and accepted by their classmates had a 64 percent lower ODD symptom score than children who were not liked. (reuters.com)
  • help
  • Further research could yield insight into the VS as a moderator of depression risk as well as a target for treatment, and help to explain why some individuals are more resilient to the relationship between depression and poor sleep. (eurekalert.org)
  • We would be happy to help you find just the right piece of gear. (themusiczoo.com)
  • methods
  • Develop a better, more accurate understanding of the attack with in-depth definitions and expert opinions on how to stop buffer overflow attacks with several tools and methods, including manual system and application testing, memory leakage prevention and Web application vulnerability scanning. (techtarget.com)
  • As high activity of telomerase has been found in stem cells and cancer cells specifically, various methods have been developed for the evaluation of telomerase activity. (nih.gov)
  • Also, the relationship between different cell lysate concentrations and Total Product Generated (TPG) was investigated for the comparison with traditional methods (see Supplementary Fig. S2 online). (nih.gov)
  • examine
  • In this tip you will learn about two ways to review a program for buffer overflow, as well as how to examine a program's source code and file code to manually test for buffer overflows. (techtarget.com)
  • impact
  • Roubinov and her colleagues studied the impact of school-based relationships on 383 kindergartners from 29 classrooms in six public schools in the San Francisco Bay Area. (reuters.com)
  • access
  • You will also receive best practices on how to prevent memory leakage, as well as buffer overflow attacks that can allow hackers access to systems or result in application or system crashes or data security breaches. (techtarget.com)
  • Forest
  • ITAGAR, June 29: The All Pakke-Kessang Puerang Dissing-Passo Seijosa Students' Union (APPDSSU) has demanded the state government to immediately revoke the order of declaring Buffer Zone at Seijosa Dissing-Passo and Pakke-Kessang circles saying that it will suppress human Rights and violate the Schedule Tribes and Other Traditiol Forest Dwellers Act 2006. (sentinelassam.com)
  • In a representation to Principal Chief Conservator of Forest on Tuesday, the union pointed out that the Buffer Zone had been notified arbitrarily at Seijosa, Dissing-Passo and Pakke-kessang circles because the concerned department did not follow up the norms of Wildlife Protection Act 1972 as amended in 2006. (sentinelassam.com)
  • areas
  • The department has notified Buffer Zone / Eco-Sensitive Zone adjacent to Pakke Tiger Reserve without consulting with the gram sabha not the department constitute an expert committee for the purpose before declaring the areas as buffer zone," the union said in its representation. (sentinelassam.com)
  • Claims
  • The entire process was led by Pakke Wildlife Sanctuary DFO through hide and seek policy," the union alleged adding, there is zero settlement of claims and objections process and most of the local residents of the concerned area stand against buffer zone because many livelihood or modern technology developmental activities are being stranded in the said area. (sentinelassam.com)
  • data
  • Buffer overflow exploits and vulnerabilities can lead to serious harm to corporate Web applications, as well as embarrassing and costly data security breaches and system compromises. (techtarget.com)
  • Recordation of the job monitored and any errors found can be made in any convenient data base, including a printer, a voice signal or simply the display. (google.com)
  • Using data on corporate boycotts, we find that corporate attempts to create a reputable, socially responsible image actually make firms more vulnerable to being targeted by activists. (ssrn.com)
  • zone
  • It said the declaration was made with support from a few vested interest GBs and PRIs without knowing the norms and guidelines of Buffer Zone. (sentinelassam.com)
  • program
  • The buffer allocated to a program requiring a use of a buffer is monitored so that a reallocation is performed when the buffer count becomes smaller than a predetermined threshold value. (google.com)
  • 4. The buffer reallocation system as claimed in claim 1, wherein said buffer acquisition history storing means stores, with respect to each of predetermined categories, the maximum buffer count acquired by said program requiring a use of a buffer. (google.com)
  • 5. The buffer reallocation system as claimed in claim 4, wherein said buffer acquisition history storing means stores the maximum count of buffers acquired by said program and stores corresponding time information indicating a time at which buffers are acquired. (google.com)
  • order
  • In order to detect vulnerabilities and exploits, and ultimately prevent your organization from falling victim to a buffer overflow attack, you must first develop an accurate understanding of what the attack is and how it works . (techtarget.com)
  • different
  • 6 ] treated cells with different alkylating agents, ionizing radiation (IR), and peroxide, and found a variety of upregulated genes that had not previously been implicated in DNA repair. (biomedcentral.com)
  • research
  • Research has found that poor sleep is associated with depression in some but not all individuals, suggesting that other factors may moderate this relationship. (eurekalert.org)
  • The cyclical behaviour of European bank capital buffers ," Research Discussion Papers 17/2006, Bank of Finland. (repec.org)
  • The Cyclical Behaviour of European Bank Capital Buffers ," SIFR Research Report Series 56, Institute for Financial Research. (repec.org)
  • Journal
  • The cyclical behaviour of European bank capital buffers ," Journal of Banking & Finance , Elsevier, vol. 32(8), pages 1440-1451, August. (repec.org)
  • The Relationship between Capital and Earnings in Banking ," Journal of Money, Credit and Banking , Blackwell Publishing, vol. 27(2), pages 432-456, May. (repec.org)
  • financial
  • The Relationship Between Capital and Earnings in Banking ," Center for Financial Institutions Working Papers 94-17, Wharton School Center for Financial Institutions, University of Pennsylvania. (repec.org)
  • keep
  • This tip offers an in-depth definition of a buffer overflow attack and provides advice and best practices on how to thwart such an attack and keep your organization safe. (techtarget.com)
  • cause
  • Buffer overflows and memory leaks can cause serious harm to Web applications and lead to security breaches and system compromises. (techtarget.com)
  • lower
  • The most commonly used criterion is emergence, the manifestation of new properties in a holon not found in lower holons. (integralworld.net)
  • major
  • We've located guitars for Slash, sold guitars for Steve Miller, held performances by major artists like Steve Vai, built thousands of customer relationships, and helped countless enthusiasts find just the right instrument. (themusiczoo.com)
  • overall
  • Add to Stack PricePlow's Stack feature helps you find our best overall deal for all products you add across dozens of our partner stores. (priceplow.com)
  • function
  • 6. The buffer reallocation system as claimed in claim 5, wherein said buffer acquisition history means obtains the history of buffer acquisition by using a clock/calendar function. (google.com)