• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 339
  • 98
  • 82
  • 40
  • 26
  • 26
  • 13
  • 12
  • 11
  • 10
  • 10
  • 10
  • 5
  • 3
  • 3
  • Tagged with
  • 784
  • 139
  • 124
  • 75
  • 75
  • 64
  • 63
  • 60
  • 60
  • 59
  • 58
  • 55
  • 52
  • 46
  • 44
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Predicting strength of consensus in small groups /

Brubaker, Dale M. January 1991 (has links)
Thesis (M.S.)--Virginia Polytechnic Institute and State University, 1991. / Vita. Abstract. Includes bibliographical references (leaves 56-59). Also available via the Internet.
22

The effects of an expert on the small-group consensus process /

Polk, John W. January 1991 (has links)
Thesis (M.S.)--Virginia Polytechnic Institute and State University, 1991. / Vita. Abstract. Includes bibliographical references (leaves 86-90). Also available via the Internet.
23

A study of consensus in institutional representation in a midwestern suburban community college

Thorderson, John Richard. McGrath, J. H. January 1974 (has links)
Thesis (Ed. D.)--Illinois State University, 1974. / Title from title page screen, viewed Nov. 2, 2004. Dissertation Committee: J.H. McGrath (chair), Gene A. Budig, Clinton R. Bunke, Clifford H. Edwards, Eugene D. Fitzpatrick. Includes bibliographical references (leaves 121-128) and abstract. Also available in print.
24

Consensus building in planning in Hong Kong : a case study of Southeast Kowloon development /

Lai, Wing-pang. January 2002 (has links)
Thesis (M. Sc.)--University of Hong Kong, 2002. / Includes bibliographical references (leaves 147-156).
25

Consensus building in planning in Hong Kong a case study of Southeast Kowloon development /

Lai, Wing-pang. January 2002 (has links)
Thesis (M.Sc.)--University of Hong Kong, 2002. / Includes bibliographical references (leaves 147-156) Also available in print.
26

Der Philosoph und die Vielen : die Bedeutung des Gegensatzes der unphilosophischen Menge zu den Philosophen (und das Problem des argumentum e consensu omnium) im philosophischen Denken der Griechen bis auf Aristoteles /

Voigtländer, Hanns-Dieter. January 1980 (has links)
Texte remanié de: Habilitationschrift--Frankfurt-am-Main--Philosophie, 1974-1975. / Bibliogr. p. 641-657. Index.
27

Scientific citizenship : extending public participation in scientific decision making

Finney, Colin Michael January 1999 (has links)
No description available.
28

Towards a consensus of opinion

Genest, Christian January 1983 (has links)
This thesis addresses the problem of combining the prior density functions, f[sub=1],…,f[subn], of n individuals. In the first of two parts, various systems of axioms are developed which characterize successively the linear opinion pool, A(f[sub=1],...,f[sub=n]) = Σ[sup=n; sub= i=1] w[sub=i] f[sub=i] , and the logarithmic opinion pool, G(f[sub=1],…,f[sub=n]) = π[sup=n; sub= i=1] f[sup=α(i); sub=i] / ʃ π[sup=n; sub= i=1] dμ. It is first shown that A is the only pooling operator, T(f[sub=1],…,f[sub=n]), which is expressible as T(f[sub=1],…,f[sub=n]) (θ) = H(f[sub=1](θ),...,f[sub=n](θ), θ) for some function H which is continuous in its first n variables and satisfies H(0,...,0,θ) = 0 for μ- almost all θ. The regularity condition on H may be dispensed with if H does not depend on θ. This result leads to an impossibility theorem involving Madansky's axiom of External Bayesianity. Other consequences of this axiom of group rationality are also examined in some detail and yield a characterization of G as the only Externally Bayesian pooling operator of the form T(f[sub=1],…,f[sub=n])(θ) = H(f[sub=1],(θ),...,f[sub=n](θ))/ ʃH(f[sub=1],…,f[sub=n])dμ for some H:(0, ∞) —>(0, ∞). To prove this n result, it is necessary to introduce a "richness" condition on the underlying space of events, (θ,μ). Next, each opinion f[sub=i] is regarded as containing some "information" about θ and we look for a pooling operator whose expected information content is a maximum. The operator so obtained depends on the definition which is chosen; for example, Kullback-Leibler's definition entails the linear opinion pool, A. In the second part of the dissertation, it is argued that the domain of pooling operators should extend beyond densities. The notion of propensity function is introduced and examples are given which motivate this generalization; these include the well-known problem of combining P-values. A theorem of Aczel is adapted to derive a large class of pooling formulas which encompasses both A and G. A final characterization of G is given via the interpretation of betting odds, and the parallel between our approach and Nash's solution to the "bargaining problem" is discussed. / Science, Faculty of / Mathematics, Department of / Graduate
29

A Comparison of Three Group Decision-Making Strategies and Their Effects on the Group Decision-Making Process

Robertson, David Whittaker 26 April 2002 (has links)
The objective of this experiment was to compare three group decision-making strategies and their effects on the group decision-making process. Two of the strategies, Dialectical Inquiry and Devil's Advocacy, were structured while the control condition, Unstructured Consensus Seeking, was non-directed, thus unstructured. The following dependent variables were measured: (a) decision quality, (b) cognitive conflict, (c) affective conflict, and (d) decision commitment. Seventy-two undergraduate participants were randomly assigned across 3 conditions into groups of 6 to solve an interactive group decision task. Thirty-six trained observers were randomly assigned across the same conditions to observe intra-group cognitive and affective conflict and to assess how well the undergraduate participants implemented the structured approaches. The unit of comparison was groups (n = 12). The results of this study were analyzed using analysis of variance and no statistical difference was found between the treatment groups on any of the four dependent variables measured. Cognitive conflict levels and commitment to the decision, while not statistically significant, were higher in the two structured conditions compared to the unstructured control condition. A discussion of these results along with directions for future research is provided. / Ph. D.
30

Blockchain and Distributed Consensus: From Security Analysis to Novel Applications

Xiao, Yang 13 May 2022 (has links)
Blockchain, the technology behind cryptocurrency, enables decentralized and distrustful parties to maintain a unique and consistent transaction history through consensus, without involving a central authority. The decentralization, transparency, and consensus-driven security promised by blockchain are unprecedented and can potentially enable a wide range of new applications that prevail in the decentralized zero-trust model. While blockchain represents a secure-by-design approach to building zero-trust applications, there still exist outstanding security bottlenecks that hinder the technology's wider adoption, represented by the following two challenges: (1) blockchain as a distributed networked system is multi-layered in nature which has complex security implications that are not yet fully understood or addressed; (2) when we use blockchain to construct new applications, especially those previously implemented in the centralized manner, there often lack effective paradigms to customize and augment blockchain's security offerings to realize domain-specific security goals. In this work, we provide answers to the above two challenges in two coordinated efforts. In the first effort, we target the fundamental security issues caused by blockchain's multi-layered nature and the consumption of external data. Existing analyses on blockchain consensus security overlooked an important cross-layer factor---the heterogeneity of the P2P network's connectivity. We first provide a comprehensive review on notable blockchain consensus protocols and their security properties. Then we focus one class of consensus protocol---the popular Nakamoto consensus---for which we propose a new analytical model from the networking perspective that quantifies the impact of heterogeneous network connectivity on key consensus security metrics, providing insights on the actual "51% attack" threshold (safety) and mining revenue distribution (fairness). The external data truthfulness challenge is another fundamental challenge concerning the decentralized applications running on top of blockchain. The validity of external data is key to the system's operational security but is out of the jurisdiction of blockchain consensus. We propose DecenTruth, a system that combines a data mining technique called truth discovery and Byzantine fault-tolerant consensus to enable decentralized nodes to collectively extract truthful information from data submitted by untrusted external sources. In the second effort, we harness the security offerings of blockchain's smart contract functionality along with external security tools to enable two domain-specific applications---data usage control and decentralized spectrum access system. First, we use blockchain to tackle a long-standing privacy challenge of data misuse. Individual data owners often lose control on how their data can be used once sharing the data with another party, epitomized by the Facebook-Cambridge Analytica data scandal. We propose PrivacyGuard, a security platform that combines blockchain smart contract and hardware trusted execution environment (TEE) to enable individual data owner's fine-grained control over the usage (e.g., which operation, who can use on what condition/price) of their private data. A core technical innovation of PrivacyGuard is the TEE-based execution and result commitment protocol, which extends blockchain's zero-trust security to the off-chain physical domain. Second, we employ blockchain to address the potential security and performance issues facing dynamic spectrum sharing in the 5G or next-G wireless networks. The current spectrum access system (SAS) designated by the FCC follows a centralized server-client service model which is vulnerable to single-point failures of SAS service providers and also lacks an efficient, automated inter-SAS synchronization mechanism. In response, we propose a blockchain-based decentralized SAS architecture dubbed BD-SAS to provide SAS service efficiently to spectrum users and enable automated inter-SAS synchronization, without assuming trust on individual SAS service providers. We hope this work can provide new insights into blockchain's fundamental security and applicability to new security domains. / Doctor of Philosophy / Blockchain, the technology behind cryptocurrency, enables decentralized and distrustful parties to maintain a unique and consistent transaction history through consensus, without involving a central authority. The decentralization, transparency, and consensus-driven security promised by blockchain are unprecedented and can potentially enable zero-trust applications in a wide range of domains. While blockchain's secure-by-design vision is truly inspiring, there still remain outstanding security challenges that hinder the technology's wider adoption. They originate from the blockchain system's complex multi-layer nature and the lack of effective paradigms to customize blockchain for domain-specific applications. In this work, we provide answers to the above two challenges in two coordinated efforts. In the first effort, we target the fundamental security issues caused by blockchain's multi-layered nature and the consumption of external data. We first provide a comprehensive review on existing notable consensus protocols and their security issues. Then we propose a new analytical model from a novel networking perspective that quantifies the impact of heterogeneous network connectivity on key consensus security metrics. Then we address the external data truthfulness challenge concerning the decentralized applications running on top of blockchain which consume the real-world data, by proposing DecenTruth, a system that combines data mining and consensus to allow decentralized blockchain nodes to collectively extract truthful information from untrusted external sources. In the second effort, we harness the security offerings of blockchain's smart contract functionality along with external security tools to enable two domain-specific applications. First, eyeing on our society's data misuse challenge where data owners often lose control on how their data can be used once sharing the data with another party, we propose PrivacyGuard, a security platform that combines blockchain smart contract and hardware security tools to give individual data owner's fine-grained control over the usage over their private data. Second, targeting the lack of a fault-tolerant spectrum access system in the domain of wireless networking, we propose a blockchain-based decentralized spectrum access system dubbed BD-SAS to provide spectrum management service efficiently to users without assuming trust on individual SAS service providers. We hope this work can provide new insights into blockchain's fundamental security and applicability to new security domains.

Page generated in 0.051 seconds