University Press, 2007. Mind 119 (475): 814-19.
Recanati, F. 2007. Perspectival Thought. A Plea for (Moderate) Relativism . Oxford University Press.
Zeman, D. (ms.) Temporalism in an Extensional Framework. Retrievable at http://institutnicod.academia.edu/DanZeman/Drafts .
Wael S. El-Tohamy, Samar N. ABDEL-Baki, Nagwa E. Abdel-Aziz and Abdel-Aziz A. Khidr
(Ruda River, Poland). Ecol Chem Eng S. 2017;24(2):285-298. DOI: 10.1515/eces-2017-0020.
 Karbassi A, Nouri J, Mehrdadi N, Ayaz G. Flocculation of heavy metals during mixing of freshwater with Caspian Sea water. Environ Geol. 2008;53(8):1811-1816. DOI: 10.1007/s00254-007-0786-7.
 Najafpour S, Alkarkhi A, Kadir M, Najafpour GD. Evaluation of spatial and temporal variation in river water quality. Int J Environ Res. 2009;2(4):349-358. DOI: 10.1016/j.jenvman.2009.11.001.
 Wahaab RA, Badawy MI. Water quality assessment of the River Nile system: an
technology: the case of frost resistant potato for the Altiplano (Peru and Bolivia). Agricultural Systems 76(3): 895-911. doi: 10.1016/ S0308-521X(02)00081-1.
Holzkämper A., Calanca P., Fuhrer J., 2011. Analyzing climate effects on agriculture in time and space. 1st Conference on Spatial Statistics 2011 - Mapping Global Change 3: 58-62. doi: 10.1016/j.proenv.2011.02.011.
Holzkämper A., Fossati D., Hiltbrunner J., Fuhrer J., 2015. Spatial and temporal trends in agro-climatic limitations to production potentials for grain maize and winter
Mohammad Nazarifar, Mohammad Kanani and Rezvaneh Momeni
AHMAD, M. D. - MASIH, I. - TURRAL, H. 2004. Diagnostic analysis of spatial and temporal variations in crop water productivity: A field scale analysis of the rice-wheat cropping system of Punjab, Pakistan. In Journal of Applied Irrigation Science , vol. 39 , 2004, no. 1, pp. 43-63.
ALLEN, R. G. - PEREIRA, L. S. - RAES, D. - SMITH, M. 1998. Crop evapotranspiration: Guidelines for computing crop water requirements. Italy, Rome : Food and Agriculture Organization (FAO) press, 1998. 328 pp. ISBN 92
hierarchical Bayesian network. In: Proc. 19th Australian Joint Conf. on Artificial Intelligence, Hobart, Australia. pp. 1259-1264.
Thornton, J. R., Faichney, J., Blumenstein, M., Hine, T. (2008). Character recognition using hierarchical vector quantization and temporal pooling. In: Wobcke, W., Zhang, M. (eds.) Proc 21st Australasian Joint Conf. Artificial Intelligence , Vol. Lecture Notes in Computer Science. pp. 562-572.
Bobier, B. (2007). Hand-written digit recognition using Hierarchical Temporal Memory. http
al. 2012 ); only the debate of the “Zwischenstadt” or ‘in-between city’ has found some recognition in the international community since then ( Keil/Addie 2015 ).
Our approach is guided by three perspectives that have not been part of the standard repertoire of empirical suburban studies to date. Firstly, we pursue an analysis which is not predetermined by normative, and thus primarily negative, claims about suburbia. Secondly, besides spatial differentiation, this study focuses also on investigating the temporal variation in the development trajectory of
Kerstin Hürkamp, Nadine Zentner, Anne Reckerth, Stefan Weishaupt, Karl-Friedrich Wetzel, Jochen Tschiersch and Christine Stumpp
-VII Technical Documents in Hydrology N°83, IACS Contribution N°1, UNESCO-IHP, Paris, 81 p.
Hashimoto, S., Shiqiao, Z., Nakawo, M., Sakai, A., Ageta, Y., Ishikawa N., Narita, H., 2002. Isotope studies of inner snow layers in a temperate region. Hydrol. Process., 16, 2209-2220.
Holko, L., 1995. Stable environmental isotopes of 18O and 2H in hydrological research of mountainous catchment. J. Hydrol. Hydromech., 43, 249-274.
Holko, L., Danko, M., Dósa, Kostka, Z., Sanda, M., Pfister, L, Iffly, J.F., 2013. Spatial and temporal
Márton Horváth, Béla Solti, Imre Fatér, Tibor Juhász, László Haraszthy, Tamás Szitta, Zsuzsanna Ballók and Szilvia Pásztory-Kovács
., Kochert, M. N., Preston, C. R., Woodbridge, B., Williams, G. E., Keller, K. R. & Crandall, R. H. 2017. Spatial and temporal patterns in Golden Eagle diets in the Western United States, with implications for conservation Planning. – Journal of Raptor Research 51(3): 347–367. DOI: 10.3356/JRR-16-38.1
Belik, V., Galushin, V. & Bogomolov, D. 2002. Results of the Imperial Eagle (Aquila heliaca) project in Russia during 1996 and 1997. – Aquila 107–108: 177–181.
Bihari, Z. 2004. A hörcsög (Cricetus cricetus) magyarországi elterjedésének változása az elmúlt 50
Snežana Simović, Dejan Aleksic, Tatjana Boskovic Matic, Katarina Vesic, Slavco Toncev, Svetlana Miletic Drakulic and Gordana Tončev
Nis (Serbia). Clin Neurol Neurosurg. 2010; 112(6):485-9.
4. Lin HC, Lin SY, Lee HC, Hu CJ, Choy CS. Weekly pattern of stroke onset in an Asian country: a nationwide population-based study. Chronobiol Int. 2008; 25(5):788-99.
5. Kelly-Hayes M, Wolf PA, Kase CS, Brand FN, McGuirk JM, D’Agostino RB. Temporal patterns of stroke onset. The Framingham Study. Stroke. 1995 ; 26(8):1343-7.
6. Wang H, Sekine M, Chen X, Kagamimori S. A study of weekly and seasonal variation of stroke onset. Int J Biometeorol. 2002; 47
Ryan Wails, Yixin Sun, Aaron Johnson, Mung Chiang and Prateek Mittal
Many recent proposals for anonymous communication omit from their security analyses a consideration of the effects of time on important system components. In practice, many components of anonymity systems, such as the client location and network structure, exhibit changes and patterns over time. In this paper, we focus on the effect of such temporal dynamics on the security of anonymity networks. We present Tempest, a suite of novel attacks based on (1) client mobility, (2) usage patterns, and (3) changes in the underlying network routing. Using experimental analysis on real-world datasets, we demonstrate that these temporal attacks degrade user privacy across a wide range of anonymity networks, including deployed systems such as Tor; pathselection protocols for Tor such as DeNASA, TAPS, and Counter-RAPTOR; and network-layer anonymity protocols for Internet routing such as Dovetail and HORNET. The degradation is in some cases surprisingly severe. For example, a single host failure or network route change could quickly and with high certainty identify the client’s ISP to a malicious host or ISP. The adversary behind each attack is relatively weak – generally passive and in control of one network location or a small number of hosts. Our findings suggest that designers of anonymity systems should rigorously consider the impact of temporal dynamics when analyzing anonymity.