-
47O marxismo e a "fundamentação das ciências humanas"Discurso 21 119-136. 1993.Investigando o projeto merleau-pontiano de fundamentação das ciências humanas, notadamente a sociologia e a antropologia, este artigo procura compreender as críticas de Merleau-Ponty à ontologia marxista (de forma genérica) em Les Aventures de la Dialectique, ressaltando a impossibilidade de descrição, desse ponto de vista, das características ontológicas dos fenômenos históricos nos termos de uma totalização dialética da história
-
33Linguagem e Experiência em Merleau-PontyDiscurso 29 175-208. 1998.O objetivo deste artigo é examinar as relações entre a linguagem e a experiência (a que ela se refere) em Merleau-Ponty. Tento examinar quais as críticas de Meleau-Ponty a uma série de teorias da linguagem que ele considera "naturalizantes". Em seguida, vejo como significações ideiais são possíveis "emergindo" da experiência sensível. Creio ser possível relacionar esses dois patamares mediante o conceito husserliano de Fundierung e a estrutura temporal desse conceito
-
28Correlation between plasticity and dislocation dissociation in ceramicsPhilosophical Magazine 93 (1-3): 121-136. 2013.
-
25Using the Spanish national identity card in social networksLogic Journal of the IGPL 28 (4): 519-530. 2020.The distinctive security features of the Spanish electronic national identity card, known as Documento Nacional de Identidad electrónico, allow us to propose the usage of this cryptographic smart card in an authentication framework that can be used during the registration and login phases of internet services where the validation of the user’s age and real identity are key elements, as it is the case for example of the so-called social networks. Using this mechanism with NFC-capable devices, the…Read more
-
21Small-angle neutron scattering study of the nano-sized features in an oxide dispersion-strengthened Fe12Cr alloyPhilosophical Magazine 95 (22): 2450-2465. 2015.
-
19Design and optimization of the input modules of a DPA toolboxLogic Journal of the IGPL 24 (1). 2016.
-
18Comparing low and medium cost computer-based technologies suitable for cryptographic attacksLogic Journal of the IGPL 27 (2): 177-188. 2019.
-
16Comparing low and medium cost computer-based technologies suitable for cryptographic attacksLogic Journal of the IGPL. forthcoming.
-
15Modification proposal for the reconciliation mechanism of the key exchange algorithm NewHopeLogic Journal of the IGPL 30 (6): 1028-1040. 2022.The latest advances in quantum computing forced the National Institute of Standards and Technology (NIST) to launch an initiative for selecting quantum-resistant cryptographic algorithms. One of the best-known proposals is NewHope, an algorithm that was initially designed as a key exchange algorithm. In its original design, NewHope presented a reconciliation mechanism that is complex and represents an entry barrier for potential implementers. This contribution presents equivalent schemes in one,…Read more
-
11Cinco nuevos fragmentos anónimos de Alberto de SajoniaBulletin de Philosophie Medievale 33 162-176. 1991.
-
9Correlation between yttrium segregation at the grain boundaries and the threshold stress for plasticity in yttria-stabilized tetragonal zirconia polycrystalsPhilosophical Magazine 83 (1): 93-108. 2003.Nowadays, the high-temperature plasticity of yttria-stabilized tetragonal zirconia polycrystals is successfully explained in terms of a threshold stress. Despite the fact that its existence is very well proved experimentally, the origin and nature of the threshold stress are still unexplained. This work develops a possible explanation for the threshold stress in YTZPs. The model developed in this paper is able to explain quantitatively the dependence of this threshold stress with temperature and…Read more
-
8Cybersecurity trends in Cooperative, Connected and Automated MobilityLogic Journal of the IGPL. forthcoming.Cooperative, connected and automated mobility technologies have the potential to revolutionize transportation systems and enhance safety, efficiency and sustainability. However, the increasing reliance on digital technologies also introduces new cybersecurity risks that can compromise the safety and privacy of passengers and the integrity of transportation systems. The purpose of this article is to examine the most important threats, vulnerabilities, risks and challenges related to automated mob…Read more
-
2Here, we report the genome sequence of a novel iflavirus strain recovered from the neotropical butterfly Heliconius erato. The coding DNA sequence of the iflavirus genome was 8,895 nucleotides in length, encoding a polyprotein that was 2,965 amino acids long.
-
University of São PauloDepartment of Philosophy, Languages and Literature, and Human SciencesResearcher
São Paulo, São Paulo, Brazil