• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 41
  • 15
  • 5
  • 4
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 96
  • 13
  • 12
  • 12
  • 12
  • 9
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Le besoin de mentir : aspects cliniques et enjeux théoriques / The need to lie : clinical aspects end theoretical issues

Chapellon, Sébastien 08 November 2013 (has links)
Cette recherche s’attache à saisir les logiques inconscientes qui président au besoin de mentir. Elle s’intéresse au type de vulnérabilité psychique que le sujet contre-investit ainsi qu’à la nature de la communication inconsciente qu’il instaure avec ceux qu’il trompe. Après avoir recensé les différentes approches métapsychologiques existantes, les fonctions psychiques du mensonge sont explorées en regard de son rôle au cours du développement de l’enfant. Ensuite, l’examen de cas d’adultes rencontrés dans un dispositif d’accueil pour personnes en errance permet d’expliquer comment les sujets se défendent d’un vécu d’empiètement et le font vivre à ceux qu’ils trompent. Enfin, des exemples d’adolescents, observés dans le contexte de la protection de l’enfance contribuent à l’analyse des dynamiques intersubjectives impulsées par cet acte-parlé. L’ensemble de cette thèse démontre que malgré la difficulté que cette configuration clinique pose à l’observation, sa prise en compte permet de saisir la manière avec laquelle le sujet exprime une souffrance autrement indicible. / This research tries to understand the unconscious logics that preside over the need to lie. It analyses the type of psychological vulnerability a subject counter-invests as well as the origin of the unconscious communication he establishes with those he misleads. After having drawn up an inventory of the existing metapsychological approaches, the author examines the psychological functions of lying by taking into account its role during the development of the child. Then the examination of some adult cases that occurred in a homeless resource center will explain how, some subjects protect themselves from a harassment victim background and have others live the same experience with their lies. Finally, the author examines how cases of teenagers observed within the framework of childhood protection contribute to the analysis of the intersubjective dynamics impulsed by this acte-parlé. This work demonstrates that even though this clinical configuration is difficult to observe, if the psychologist would take it into account, it could help him understand how a patient expresses a pain that he could not tell by other means.
92

Towards Novelty-Resilient AI: Learning in the Open World

Trevor A Bonjour (18423153) 22 April 2024 (has links)
<p dir="ltr">Current artificial intelligence (AI) systems are proficient at tasks in a closed-world setting where the rules are often rigid. However, in real-world applications, the environment is usually open and dynamic. In this work, we investigate the effects of such dynamic environments on AI systems and develop ways to mitigate those effects. Central to our exploration is the concept of \textit{novelties}. Novelties encompass structural changes, unanticipated events, and environmental shifts that can confound traditional AI systems. We categorize novelties based on their representation, anticipation, and impact on agents, laying the groundwork for systematic detection and adaptation strategies. We explore novelties in the context of stochastic games. Decision-making in stochastic games exercises many aspects of the same reasoning capabilities needed by AI agents acting in the real world. A multi-agent stochastic game allows for infinitely many ways to introduce novelty. We propose an extension of the deep reinforcement learning (DRL) paradigm to develop agents that can detect and adapt to novelties in these environments. To address the sample efficiency challenge in DRL, we introduce a hybrid approach that combines fixed-policy methods with traditional DRL techniques, offering enhanced performance in complex decision-making tasks. We present a novel method for detecting anticipated novelties in multi-agent games, leveraging information theory to discern patterns indicative of collusion among players. Finally, we introduce DABLER, a pioneering deep reinforcement learning architecture that dynamically adapts to changing environmental conditions through broad learning approaches and environment recognition. Our findings underscore the importance of developing AI systems equipped to navigate the uncertainties of the open world, offering promising pathways for advancing AI research and application in real-world settings.</p>
93

The exploration of appraising internal controls to detect procurement fraud during the tender stage at mines

Venter, Jan Willem Nicolaas 02 1900 (has links)
Text in English / Procurement fraud is an enormous problem and the South African news is perforated with reports of this illicit act. Procurement fraud occurs in all the phases of the procurement cycle, but this illicit act is mostly committed during the tender phase. Business does not see procurement fraud as a crime and therefor this crime is committed due to non-existent internal controls and processes to assess the adequacy of these controls. The purpose of the research was to highlight that procurement fraud occurs when internal controls are being bypassed or if an entity has an ineffective internal control system. The researcher studied the appraising of internal controls to understand the role it plays in detecting, preventing and investigating procurement fraud, specifically during the tender phase. The research design utilised was a qualitative research approach and an empirical design plan or strategy, to obtain the information. The researcher opted for this design to obtain information from literature and information from individuals in appraising internal controls. This ensured a comprehensive data gathering process. The goal of this research was to provide practical recommendations to assist investigators in private and public sectors with investigations into procurement fraud during a tender. / Police Practice / M. Tech. (Forensic Investigation)
94

Association de la norme technique à l'innovation. Étude de droit de la propriété intellectuelle et de droit de la concurrence / Association of the technical standard and innovation covered by intellectual property rights

Soltmann, Wladimir 02 December 2015 (has links)
La norme technique exige parfois de lui associer des innovations faisant l’objet de droits privatifs, au bénéfice de la réalisation de sa mission. De prime abord, la propriété intellectuelle apparaît comme étant un élément perturbateur, impliquant désormais d’examiner l’ « économie » de la norme au moment de son élaboration et de son utilisation et non plus uniquement la technique. Pour éviter la corruption de la norme par des droits privatifs trop contraignants, les organismes de normalisation exigent que seuls les droits privatifs « essentiels » soient associés à la norme. Les critères de l’adhérence réciproque de la norme et de l’innovation structurant leur association, justifient au nom de son « utilité sociale », une adaptation réciproque des régimes juridiques attachés à ses deux composantes. Ainsi l’ « utilité sociale » incarnée par la norme technique impose une adaptation du régime des droits de propriété intellectuelle. Symétriquement, l’innovation « essentielle » à la norme suppose une adaptation du régime de la norme technique à la propriété intellectuelle. Cela donne naissance à deux régimes juridiques substantiellement interpénétrés et structurellement interdépendants. D’une part, les droits privatifs étant « essentiels » à la norme, peuvent être considérés comme des « infrastructures essentielles », justifiant une érosion systémique de leur portée dans le cadre de leur association à la norme. Dans le cadre de l’application de règles de concurrence, cette érosion résulte d’une approche ex post à laquelle se conjugue une approche ex ante, conceptualisée par les conditions FRAND. D’autre part, l’association s’évalue également à l’aune de la propriété privée. Il apparaît que la norme technique devrait être considérée comme étant une chose commune imposant d’aménager, au bénéfice de ses utilisateurs, un accès et une utilisation libre. Cela suppose d’envisager alors l’émergence d’un droit d’utilisation de l’innovation associée à la norme technique. / Technical standards may sometimes be associated to innovations covered by proprietary rights. In this case, intellectual property appears to embody a quite disturbing component within the partnership between standardization and innovation. We are thus led to analyse the association economy ; it must be construed as of the creation and the use of the standard rather than to insist on its sole technical aspects. In order to avoid the corruption of the standard by over-restrictive IP rights, standard-setting-organizations require that only "essential" proprietary rights can be associated to a technical standard. Economical and technical criterias of the mutual adherence of the technical standard and the owned innovation – structuring their association – justify in the name of its "social utility", a mutual adaptation of their legal regimes. Therefore, the technical standard’s "social utility" requires an adaptation of the IP rights legal regime. Symmetrically, the essential innovation, included in the standard, requires its fitting to the technical standards legal regime. This results in the rise of two regimes naturally interpenetrated, and structurally interdependent. On the one hand, IP rights "essential" to the standard, can be considered as "essential facilities", justifying a systematic erosion of their spectrum. As part of competition rules implementation, this erosion results from an ex post approach as well as an ex ante approach conceptualized by FRAND terms. On the other hand, the association is also evaluated through the private property perspective. It appears that the technical standard should be considered as a "common", assuming a free access and a free use. It contributes to create a right of use of the owned innovations integrated in technical standard.
95

Essays in Economic Design

von Negenborn, Colin 04 March 2020 (has links)
Diese Dissertation befasst sich in drei voneinander unabhängigen Kapiteln mit dem Forschungsfeld des ökonomischen Designs. Das "Design" von Situationen wirtschaftlicher Interaktion hat zum Ziel, den Verlauf und das Ergebnis der jeweiligen Interaktion zu steuern. In dieser Arbeit werden mathematisch-theoretische "Designs" zum einen formal entwickelt und diese zum anderen durch politische oder soziale Institutionen realisiert. Das erste Kapitel thematisiert die Implementierung von Sozialwahlfunktionen in einem kollusiven Umfeld. Es wird gezeigt, wie die gezielte Schaffung von asymmetrischer Information zwischen den kolludierenden Parteien deren Koordination erschweren und die Implementierung erleichtern kann. Im zweiten Kapitel wird dieser Ansatz im Kontext der Bestechlichkeit bei Finanzaudits angewendet. Korruption kann verhindert werden, wenn der bestechliche Akteure eine Warnung über anstehende Kontrollen erhält, nicht jedoch der bestechende Akteur. Das dritte Kapitel wiederum untersucht "Design" in Form von Markt- und Wettbewerbsregulierung. Eine Beschränkung des Wettbewerbs - durch eine Begrenzung der Zahl miteinander konkurrierender Firmen - kann entgegen der ökonomischen Intuition wohlfahrtsoptimierend sein. / This thesis contributes to the field of economic design in three independent chapters. Taking the perspective of a "designer", it derives formal solutions in the framework of economic theory and suggests political as well as social institutions to put these solutions to practice. The first chapter employs mechanism design to mitigate the problem of collusion. It shows how the implementation of social choice functions can be achieved by introducing asymmetric information into a system prone to collusion. In the second chapter, this methodology is applied to the context of corruption in auditing. Bribery is impeded by selectively warning one - and only one - of the corruptive parties about upcoming inspections. Finally, the third chapter studies market regulation as a means of "design". Contrary to economic intuition, it may be beneficial in terms of welfare to limit competition by restricting the number of firms allowed to enter a market.
96

Support consumers' rights in DRM : a secure and fair solution to digital license reselling over the Internet

Gaber, Tarek January 2012 (has links)
Consumers of digital contents are empowered with numerous technologies allowing them to produce perfect copies of these contents and distribute them around the world with little or no cost. To prevent illegal copying and distribution, a technology called Digital Rights Management (DRM) is developed. With this technology, consumers are allowed to access digital contents only if they have purchased the corresponding licenses from license issuers. The problem, however, is that those consumers are not allowed to resell their own licenses- a restriction that goes against the first-sale doctrine. Enabling a consumer to buy a digital license directly from another consumer and allowing the two consumers to fairly exchange the license for a payment are still an open issue in DRM research area. This thesis investigates existing security solutions for achieving digital license reselling and analyses their strengths and weaknesses. The thesis then proposes a novel Reselling Deal Signing (RDS) protocol to achieve fairness in a license reselling. The idea of the protocol is to integrate the features of the concurrent signature scheme with functionalities of a License Issuer (LI). The security properties of this protocol is informally analysed and then formally verified using ATL logic and the model checker MOCHA. To assess its performance, a prototype of the RDS protocol has been developed and a comparison with related protocols has been conducted. The thesis also introduces two novel digital tokens a Reselling Permission (RP) token and a Multiple Reselling Permission (MRP) token. The RP and MRP tokens are used to show whether a given license is single and multiple resalable, respectively. Moreover, the thesis proposes two novel methods supporting fair and secure digital license reselling. The first method is the Reselling Deal (RD) method which allows a license to be resold once. This method makes use of the existing distribution infrastructure, RP, License Revocation List (LRL), and three protocols: RDS protocol RD Activation (RDA) protocol, and RD Completion (RDC) protocol. The second method is a Multiple License Reselling (MLR) method enabling one license to be resold N times by N consumers. The thesis presents two variants of the MLR method: RRP-MR (Repeated RP-based Multi-Reselling) and HC-MR (Hash Chain-based Multi-Reselling). The RRP-MR method is designed such that a buyer can choose to either continue or stop a multi-reselling of a license. Like the RD method, the RRP-MR method makes use of RP, LI, LRL, and the RDS, RDA, and RDC protocols to achieve fair and secure reselling. The HC-MR method allows multiple resellings while keeping the overhead on LI at a minimum level and enable a buyer to check how many times a license can be further resold. To do so, the HC-MR utilises MRP and the hash chain cryptographic primitive along with LRL, LI and the RDS, RDA and RDC protocols. The analysis and the evaluation of these three methods have been conducted. While supporting the license reselling, the two methods are designed to prevent a reseller from (1) continuing using a resold license, (2) reselling a non-resalable license, and (3) reselling one license a unauthorised number of times. In addition, they enable content owners of resold contents to trace a buyer who has violated any of the usage rights of a license bought from a reseller. Moreover, the methods enable a buyer to verify whether a license he is about to buy is legitimate for re-sale. Furthermore, the two methods support market power where a reseller can maximise his profit and a buyer can minimise his cost in a reselling process. In comparison with related works, our solution does not make use of any trusted hardware device, thus it is more cost-effective, while satisfying the interests of both resellers and buyers, and protecting the content owner's rights.

Page generated in 0.3272 seconds