• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 12
  • 9
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 39
  • 11
  • 10
  • 7
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Institutional critique : a philosophical investigation of its conditions and possibilities

Morariu, Vlad V. January 2014 (has links)
'Institutional critique' is a term that refers to a range of diverse artistic practices and discourses that emerged at the end of the 1960s and that continue in the present. In spite of their differences, they all share a concern with the institutional conditioning of artists and artworks. Various historicizations of institutional critique (Alberro and Stimson, 2009; Raunig and Ray, 2009; Welchman, 2006) concur that one could distinguish two 'phases': artists of the 1960s and 1970s allegedly investigated the possibilities of an escape towards an 'outside' of the art institution, whereas those of the 1990s analysed the ways in which the artistic subject reproduced the structures of the art institution. Since the beginning of the 2000s various artists and authors have revisited the histories and legacies of institutional critique. This growing interest was triggered by the perceived intensification of a process that began at the end of the 1960s; it refers to the recuperation and neutralization of artistic types of critique by what Boltanski and Chiapello (2005) have called the 'new spirit' of capitalism. In this context, the Austrian philosopher Gerald Raunig and the members of the European Institute for Progressive Cultural Policies have proposed the hypothesis that 'a new phase' of institutional critique was to emerge. However, this proposition was based less on empirical evidence, than on a 'political and theoretical necessity to be found in the logic of institutional critique' (Raunig, 2009, 3). This thesis is a response to this set of circumstances. By asking 'what are the conditions and possibilities of institutional critique?' it investigates the categories of institutional critique's logic. My main argument is that a 'phase change' of institutional critique could and should be understood through the apparatus of Derridean deconstruction. This implies a criticism of the idea that one needs to escape the art institution in order to respond to urgencies stemming from the social, economic, and political realms (Truth Is Concrete Platform, 2012). At the same time, I will also refute the idea that institutional critique is trapped in the art institution (Fraser, 2009a). Institutional critique works on the remainder and rest that necessarily escapes the instituting will and intention of defining and describing in an exhaustive manner the whatness of what (art) is (Boltanski, 2011). I show that between critique and the art institution there is an irreducible relation of symbiosis and cohabitation, and that the deconstructive logic of institutional critique allows it to be both partner and adversary, at the same time, of the art institution.
32

Devido processo legal na relação de emprego: contraditório e motivação - poder disciplinar e cessação do contrato de trabalho

Vale, Silvia Isabelle Ribeiro Teixeira do 10 September 2018 (has links)
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2018-10-22T12:32:43Z No. of bitstreams: 1 Silvia Isabelle Ribeiro Teixeira do Vale.pdf: 1379797 bytes, checksum: 3f582bb333035dabd730c3ea7c44065b (MD5) / Made available in DSpace on 2018-10-22T12:32:43Z (GMT). No. of bitstreams: 1 Silvia Isabelle Ribeiro Teixeira do Vale.pdf: 1379797 bytes, checksum: 3f582bb333035dabd730c3ea7c44065b (MD5) Previous issue date: 2018-09-10 / The main objective of this study is to analyze the principle of due process in its greatest potentiality, investigating how and to what extent this ancestral clause has effectiveness in the employment relationship, limiting the disciplinary labor power, by imposing a procedure for fair dismissals motive, in honor of the principles of the adversary and the ample defense. The Federal Constitution of 1988 is expressed by prohibiting arbitrary dismissal, considering it an unlawful act. However, in addition to the aforementioned protection, the principle of due process requires the employer to motivate the act of resignation, be it individual or collective, hence the new rule brought by Article 477-A of the Consolidation of Labor Laws is unconstitutional / O presente trabalho visa primordialmente analisar o princípio do devido processo legal em sua maior potencialidade, averiguando como e em que medida essa cláusula ancestral possui eficácia na relação de emprego, limitando o poder disciplinar laboral, ao impor uma procedimentalização para as despedidas por justo motivo, em homenagem aos princípios do contraditório e à ampla defesa. A Constituição Federal de 1988 é expressa ao proibir a despedida arbitrária, considerando-a ato antijurídico. Todavia, para além da proteção aludida, o princípio do devido processo legal impõe o dever de o empregador motivar o ato demissional, seja ele individual ou coletivo, razão pela qual a nova regra trazida pelo artigo 477-A da Consolidação das Leis do Trabalho é inconstitucional
33

Two-player interaction in quantum computing : cryptographic primitives & query complexity

Magnin, Loick 05 December 2011 (has links) (PDF)
This dissertation studies two different aspects of two-player interaction in the model of quantum communication and quantum computation.First, we study two cryptographic primitives, that are used as basic blocks to construct sophisticated cryptographic protocols between two players, e.g. identification protocols. The first primitive is ''quantum bit commitment''. This primitive cannot be done in an unconditionally secure way. However, security can be obtained by restraining the power of the two players. We study this primitive when the two players can only create quantum Gaussian states and perform Gaussian operations. These operations are a subset of what is allowed by quantum physics, and plays a central role in quantum optics. Hence, it is an accurate model of communication through optical fibers. We show that unfortunately this restriction does not allow secure bit commitment. The proof of this result is based on the notion of ''intrinsic purification'' that we introduce to circumvent the use of Uhlman's theorem when the quantum states are Gaussian. We then examine a weaker primitive, ''quantum weak coin flipping'', in the standard model of quantum computation. Mochon has showed that there exists such a protocol with arbitrarily small bias. We give a clear and meaningful interpretation of his proof. That allows us to present a drastically shorter and simplified proof.The second part of the dissertation deals with different methods of proving lower bounds on the quantum query complexity. This is a very important model in quantum complexity in which numerous results have been proved. In this model, an algorithm has restricted access to the input: it can only query individual bits. We consider a generalization of the standard model, where an algorithm does not compute a classical function, but generates a quantum state. This generalization allows us to compare the strength of the different methods used to prove lower bounds in this model. We first prove that the ''multiplicative adversary method'' is stronger than the ''additive adversary method''. We then show a reduction from the ''polynomial method'' to the multiplicative adversary method. Hence, we prove that the multiplicative adversary method is the strongest one. Adversary methods are usually difficult to use since they involve the computation of norms of matrices with very large size. We show how studying the symmetries of a problem can largely simplify these computations. Last, using these principles we prove the tight lower bound of the INDEX-ERASURE problem. This a quantum state generation problem that has links with the famous GRAPH-ISOMORPHISM problem.
34

Improvement and partial simulation of King & Saia’s expected-polynomial-time Byzantine agreement algorithm

Kimmett, Ben 16 June 2020 (has links)
We present a partial implementation of King and Saia 2016’s expected polyno- mial time byzantine agreement algorithm, which which greatly speeds up Bracha’s Byzantine agreement algorithm by introducing a shared coin flip subroutine and a method for detecting adversarially controlled nodes. In addition to implementing the King-Saia algorithm, we detail a new version of the “blackboard” abstraction used to implement the shared coin flip, which improves the subroutine’s resilience from t < n/4 to t < n/3 and leads to an improvement of the resilience of the King-Saia Byzantine agreement algorithm overall. We test the King-Saia algorithm, and detail a series of adversarial attacks against it; we also create a Monte Carlo simulation to further test one particular attack’s level of success at biasing the shared coin flip / Graduate
35

A efetividade dos princípios constitucionais do contraditório e da ampla defesa no inquérito civil

Jorge, André Guilherme Lemos 10 October 2007 (has links)
Made available in DSpace on 2016-04-26T20:25:57Z (GMT). No. of bitstreams: 1 Andre Guilherme Lemos Jorge.pdf: 517315 bytes, checksum: 4a4d0a0917509a5848d9dcdc92707c0c (MD5) Previous issue date: 2007-10-10 / The objective of the following essay is to demonstrate how the constitutional principles of the rights to contest and of legal defense should be applied to the acts within the public prosecution. This kind of process is based in inquiring examination, which requires secrecy. To support the adversary practice here would, therefore, be an incongruent statement. After studying the evolution of the study of legal principles, we traced an epistemological division, to present the value and the reach of the laws constitutionally originated as fundamental rights. Now, appears the conflict between national security, represented by the secret investigation, against the due process of law, guarantied as an individual liberty. As an immediate consequence of the due process of law, we find the right to contest and the right of legal defense, concluding that the State of Law will only achieve its plenitude when all aspects of legitimate defense become effectively guarantied. Intending to penetrate profoundly within the inquisition instrument, centered as object of this essay; we drove through the roads traced by experts in Public Law, in innumerous attempts to define the series of acts and facts bonded in the heart of the Public Administration. The administrative process is a conquest of conceptual revolution, aroused after many debates, mainly when we determined the exact limits between the State functions. The Public District Attorney Office, once born to cohibit arbitrary acts, originated from the concentration of inquisitor and decision making powers in the hands of the sovereign one, now tends to insert itself in this power concentrating position. One of its most powerful instruments, the public prosecution, attributes to each member of the D.A. Office a compound of immense investigatory powers, a fact that per se, is enough to embrace the present theory. The conclusion arrived, giving prestige to modern public process policies and demanding the effectiveness of constitutional principles, lines itself in a parallel position to the world search for the materialization of human rights / O presente trabalho tem por finalidade demonstrar que os princípios constitucionais do contraditório e da ampla defesa devem ser aplicados aos atos que se encadeiam durante o curso do inquérito civil. Buscou-se em toda a dissertação demonstrar a incongruência presente na afirmação de que, por ser inquisitorial o processo, inexistiria espaço para a concretização de diversos aspectos da contrariedade. A partir do estudo da evolução da principiologia, foi traçado um corte epistemológico, para enfim apresentar o valor e o alcance das normas erigidas constitucionalmente como direitos fundamentais. Surge o embate entre a segurança social, representada pela inquisitoriedade pura e, de outro lado, o devido processo legal, assegurador da liberdade individual. Como decorrência imediata do devido processo legal, encontram-se o contraditório e a ampla defesa, pelo que a conclusão será que o Estado de Direito somente atingirá sua plenitude quando se garantir a efetividade plena a todos os aspectos da defesa. A fim de adentrar em definitivo no instrumento inquisitorial objeto do trabalho, serão percorridos os caminhos traçados pelos administrativistas, nas inúmeras tentativas de definir a sucessão de atos e fatos ocorridos no seio da Administração Pública. O processo administrativo é uma conquista da evolução conceitual, após infindáveis debates, sobretudo quando delimitamos o exato limite entre as funções do Estado. A instituição do Ministério Público, nascida para coibir arbitrariedades advindas da concentração de poderes investigatórios e decisórios nas mãos do soberano, acaba por se inserir no espectro das atividades estatais. Um de seus instrumentos mais poderosos, o inquérito civil, atribui a cada membro do parquet, uma gama imensa de poderes investigatórios, fato que, por si só, seria suficiente para embasar a presença da defesa. A conclusão a que se chega, ao prestigiar a moderna processualística administrativa e exigir a efetividade dos princípios constitucionais, alinha-se à busca mundial pela concretização dos direitos humanos
36

Decisão monocrática e agravo interno: lesão ao devido processo legal?

Almeida Filho, Agostinho Teixeira de January 2010 (has links)
Submitted by Pedro Mizukami (pedro.mizukami@fgv.br) on 2011-08-17T20:57:51Z No. of bitstreams: 1 DMPPJ - AGOSTINHO TEIXEIRA DE ALMEIDA FILHO.pdf: 589195 bytes, checksum: 1790025fb2fdaf4044dbb92314c6c229 (MD5) / Approved for entry into archive by Pedro Mizukami (pedro.mizukami@fgv.br) on 2011-08-19T17:44:43Z (GMT) No. of bitstreams: 1 DMPPJ - AGOSTINHO TEIXEIRA DE ALMEIDA FILHO.pdf: 589195 bytes, checksum: 1790025fb2fdaf4044dbb92314c6c229 (MD5) / Made available in DSpace on 2011-09-02T18:44:10Z (GMT). No. of bitstreams: 1 DMPPJ - AGOSTINHO TEIXEIRA DE ALMEIDA FILHO.pdf: 589195 bytes, checksum: 1790025fb2fdaf4044dbb92314c6c229 (MD5) Previous issue date: 2010 / Esta dissertação tem por objetivo analisar os institutos da decisão monocrática e do agravo interno, sob o prisma de metodologia empírica que busca priorizar a realidade pragmática da aplicação do artigo 557 do Código de Processo Civil. Enfocou-se o instituto da decisão monocrática no contexto das minirreformas processuais brasileiras, que tiveram como alicerce o princípio da efetividade processual. Esse princípio pressupõe a duração razoável do processo, garantida na Constituição Federal Brasileira. A partir da constitucionalidade desse princípio, defendeu-se a constitucionalidade do artigo 557 do Código de Processo Civil, que não pode ser considerado abstratamente inconstitucional. Demonstrou-se que a aplicabilidade do artigo 557 pode ser inconstitucional se não atender à técnica da ponderação de valores, que garante a interpretação conforme a Constituição. Analisou-se o agravo interno, sob a premissa do valor da celeridade em cotejo com o devido processo legal, que permeou a subsequente análise do procedimento desta espécie de agravo. Após uma reflexão sobre os institutos da decisão monocrática e do agravo interno, aliada ao exame dos princípios do devido processo legal, ampla defesa, contraditório e motivação das decisões judiciais, passou-se ao exame empírico desses institutos jurídicos. Nessa análise, foram coletados e examinados dados estatísticos, que confirmaram – e, assim, possibilitaram a conclusão da dissertação – a constitucionalidade do artigo 557 e a importância de sua interpretação conforme os referidos princípios constitucionais. / This dissertation has the purpose to analise the institutes of the single verdict and the internal appeal, according to empirical methodology that focus the pragmatic reality of the 557 th. dispositive of Code of Civil Procedure`s enforcement. This dissertation focused the institute of the single verdict in the context of the reformation of the Brazilian Code of Civil Procedure, which had as foundation the principle of procedure efectiveness. This principle presupposes a reasonable duration of the suit, secured by the Brazilian Federal Constitution. From the constitutionality of this principal, this dissertation defended the constitutionality of the 557 th. dispositive of Code of Civil Procedure, which can`t be considered abstractedly unconstitutional. This dissertation proved that the enforcement of the 557 th. dispositive could be unconstitutional if doesn`t suit the technique of the weighing of values, which secures the interpretation according to the Brazilian Federal Constitution. This dissertation analised the internal appeal, under the presupposition of the value of the reasonable duration of the suit in comparison with the due process of law, which motivate the following analysis of the internal appeal proceeding. After a reflection of single verdict and the internal appeal institutes, also with the analysis of due process of law, legal defense, adversary system and the motivation of the judgement, this dissertation analised the empirical enforcement of these institutes. In this analysis, estatistic data have been collected, which corroborate – and, therefore, enabled the conclusion of the dissertation – the constitutionality of the 557 th. dispositive of Code of Civil Procedure and the consideration of its interpretation according to the mentioned constitucional principles.
37

Pohledávky věřitelů v insolvenčním řízení / Creditors’ claims in Insolvency proceeding

Metzová, Nika January 2011 (has links)
This diploma thesis with the titled Creditors' claims in Insolvency proceeding deals with the possibility of setting up the claims of creditors in case that the court declared the debtor insolvent and was therefore initiated insolvency proceeding according to the Act no. 182/2006 Col., on Insolvency and Its Resolution (Insolvency Act). The introduction of the thesis also pays attention to other possibilities of enforcing and lodging the claims whether in extrajudicial proceedings or in proceedings before the court by filing an action against the debtor or in proceedings before the court or arbitration and subsequent recovery options of enforceable claims. The main aim of this thesis is to present a detailed analysis of the process of submission of claims in insolvency proceedings from the moment of initiation of the proceeding through submission of the claims to the insolvency court to their reviewing and their possible denial (together with adversary disputes) or their finding and final satisfaction. The chapter that describes the different types of claims is also closely related to the process of submitting, reviewing and satisfaction of claims as the type of the claim may determine whole process of its submission and satisfaction in the insolvency proceeding. Last chapters describe the satisfaction of admitted claims depending to the chosen method of the insolvency resolution and the destiny of unsatisfied of claims when the insolvency proceeding is over. At the end of the thesis is a practical example that should illustrate the procedure of filling the Claim submission form, including all elements of formal and content requirements.
38

Two-player interaction in quantum computing : cryptographic primitives & query complexity / Interaction à deux joueurs en informatique quantique : primitives cryptographiques et complexité en requêtes

Magnin, Loïck 05 December 2011 (has links)
Cette thèse étudie deux aspects d'interaction entre deux joueurs dans le modèle du calcul et de la communication quantique.Premièrement, elle étudie deux primitives cryptographiques quantiques, des briques de base pour construire des protocoles cryptographiques complexes entre deux joueurs, comme par exemple un protocole d'identification. La première primitive est la ``mise en gage quantique". Cette primitive ne peut pas être réalisée de manière inconditionnellement sûre, mais il possible d'avoir une sécurité lorsque les deux parties sont soumis à certaines contraintes additionnelles. Nous étudions cette primitive dans le cas où les deux joueurs sont limités à l'utilisation d'états et d'opération gaussiennes, un sous-ensemble de la physique quantique central en optique, donc parfaitement adapté pour la communication via fibres optiques. Nous montrons que cette restriction ne permet malheureusement pas la réalisation de la mise en gage sûre. Pour parvenir à ce résultat, nous introduisons la notion de purification intrinsèque, qui permet de contourner l'utilisation du théorème de Uhlman, en particulier dans le cas gaussien. Nous examinons ensuite une primitive cryptographique plus faible, le ``tirage faible à pile ou face'', dans le modèle standard du calcul quantique. Carlos Mochon a donné une preuve d'existence d'un tel protocole avec un biais arbitrairement petit. Nous donnons une interprétation claire de sa preuve, ce qui nous permet de la simplifier et de la raccourcir grandement.La seconde partie de cette thèse concerne l'étude de méthodes pour prouver des bornes inférieures dans le modèle de la complexité en requête. Il s'agit d'un modèle de complexité central en calcul quantique dans lequel de nombreux résultats majeurs ont été obtenus. Dans ce modèle, un algorithme ne peut accéder à l'entrée uniquement en effectuant des requêtes sur chacun des bits de l'entrée. Nous considérons une extension de ce modèle dans lequel un algorithme ne calcule pas une fonction, mais doit générer un état quantique. Cette généralisation nous permet de comparer les différentes méthodes pour prouver des bornes inférieures dans ce modèle. Nous montrons d'abord que la méthode par adversaire ``multiplicative" est plus forte que la méthode ``additive". Nous montrons ensuite une réduction de la méthode polynomiale à la méthode multiplicative, ce qui permet de conclure à la supériorité de la méthode par adversaire multiplicative sur toutes les autres méthodes. Les méthodes par adversaires sont en revanche souvent difficiles à utiliser car elles nécessite le calcul de normes de matrices de très grandes tailles. Nous montrons comment l'étude des symétries d'un problème simplifie grandement ces calculs. Enfin, nous appliquons ces formules pour prouver la borne inférieure optimale du problème INDEX-ERASURE un problème de génération d'état quantique lié au célèbre problème GRAPH-ISOMORPHISM. / This dissertation studies two different aspects of two-player interaction in the model of quantum communication and quantum computation.First, we study two cryptographic primitives, that are used as basic blocks to construct sophisticated cryptographic protocols between two players, e.g. identification protocols. The first primitive is ``quantum bit commitment''. This primitive cannot be done in an unconditionally secure way. However, security can be obtained by restraining the power of the two players. We study this primitive when the two players can only create quantum Gaussian states and perform Gaussian operations. These operations are a subset of what is allowed by quantum physics, and plays a central role in quantum optics. Hence, it is an accurate model of communication through optical fibers. We show that unfortunately this restriction does not allow secure bit commitment. The proof of this result is based on the notion of ``intrinsic purification'' that we introduce to circumvent the use of Uhlman's theorem when the quantum states are Gaussian. We then examine a weaker primitive, ``quantum weak coin flipping'', in the standard model of quantum computation. Mochon has showed that there exists such a protocol with arbitrarily small bias. We give a clear and meaningful interpretation of his proof. That allows us to present a drastically shorter and simplified proof.The second part of the dissertation deals with different methods of proving lower bounds on the quantum query complexity. This is a very important model in quantum complexity in which numerous results have been proved. In this model, an algorithm has restricted access to the input: it can only query individual bits. We consider a generalization of the standard model, where an algorithm does not compute a classical function, but generates a quantum state. This generalization allows us to compare the strength of the different methods used to prove lower bounds in this model. We first prove that the ``multiplicative adversary method'' is stronger than the ``additive adversary method''. We then show a reduction from the ``polynomial method'' to the multiplicative adversary method. Hence, we prove that the multiplicative adversary method is the strongest one. Adversary methods are usually difficult to use since they involve the computation of norms of matrices with very large size. We show how studying the symmetries of a problem can largely simplify these computations. Last, using these principles we prove the tight lower bound of the INDEX-ERASURE problem. This a quantum state generation problem that has links with the famous GRAPH-ISOMORPHISM problem.
39

L'aveu dans les traditions occidentales accusatoire et inquisitoire : une brève histoire de l'aveu en droit pénal

Stylios, Alexandre 07 1900 (has links)
Cette thèse trace l’évolution de l’aveu dans les traditions pénales accusatoire et inquisitoire dans le cadre d’une démarche historique allant de l’antiquité à nos jours. Elle révèle que l’aveu a toujours constitué le point de tension des enjeux de vérité et de justice de la procédure pénale et explique comment l’aveu, influencé et transformé par la religion, est devenu un moyen de preuve indépendant dans les traditions accusatoire et inquisitoire en tant que récit de vérité permettant certes d’identifier le coupable mais aussi de l’analyser. / This thesis analyses confession in Western legal traditions through a historical approach starting in antiquity. Through the study of English, French and Canadian law, it shows how the suspect’s statements have been apprehend by the accusatorial and inquisitorial systems of criminal justice, revealing that confession has always constituted and still constitutes to this day the cornerstone of truth and justice in criminal procedure. It also explains how confession, influenced and transformed by religion, has become an independent means of proof in both systems as a way to both identify and understand the guilty.

Page generated in 0.056 seconds