• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 31
  • 13
  • 8
  • 6
  • 6
  • 5
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 96
  • 28
  • 26
  • 21
  • 13
  • 12
  • 10
  • 10
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Études longitudinales de l'influence modulatrice de l'engagement comportemental sur la production de faux souvenirs. / Longitudinal studies of the modulatory influence of behavioral commitment on the production of false memories

Boisseau, Baptiste 27 February 2019 (has links)
Cette thèse vise à évaluer l’influence de l’engagement pro-attitudinal sur la production de faux souvenirs selon la consistance des informations traitées. Deux outils pertinents ont été élaborés afin d’appréhender spécifiquement deux types de faux souvenirs : les illusions mnésiques associatives (Deese, 1959b ; Roediger & McDermott, 1995) et les distorsions mnésiques suscitées par désinformation (Loftus, Miller, & Burns, 1978). La première étude (n = 194) montre que l’engagement conduit à un accroissement de la production de faux souvenirs associatifs consistants. La seconde étude (n = 198) révèle que les sujets en proie à la radicalisation sociocognitive se montrent particulièrement sensibles à l’effet de désinformation lorsque le discours exposé est conforme à leur croyance. En revanche, lorsqu’il est inconsistant, aucun effet de désinformation n’émerge chez les participants engagés qui apparaissent même particulièrement habiles pour discriminer les informations ayant fait l’objet de suggestions. Au-delà de leurs performances mnésiques, ces groupes sont ceux qui témoignent des plus fortes modifications attitudinales explicites. Dans le cadre des deux paradigmes, les analyses de la détection du signal révèlent que l’engagement conduit à l’adoption d’un critère de réponse souple lorsque le processus décisionnel concerne des informations consistantes. En outre, les résultats des deux études suggèrent que la production accrue de faux souvenirs consistants persiste jusqu’à un an après l’engagement. Mis en relation, ces différents éléments permettent d’envisager la production de faux souvenirs consistants comme une mesure implicite possible de la radicalisation des attitudes et des croyances. / This thesis aims to evaluate the influence of the pro-attitudinal commitment on the production of false memories according to the consistency of the processed information. Two relevant tools have been developed to specifically study two types of false memories : associative illusions of memory (Deese, 1959b, Roediger & McDermott, 1995) and false memory induced by the misinformation paradigm (Loftus, Miller, & Burns, 1978). The first study (n = 194) shows that commitment leads to an increase in the production of consistent illusions of memory. The second study (n = 198) reveals that subjects experiencing sociocognitive radicalization are especially susceptible to the misinformation effect when the exposed speech is consistent with their beliefs. On the other hand, when it is inconsistent, no misinformation effect emerges for committed participants who appear even particularly able to discriminate the targeted informations by suggestions. Beyond their memory performance, those groups show the strongest explicit attitudinal modifications. In the both experimental situations, signal detection analyzes reveal that commitment leads to the adoption of a lenient response criterion when the decision-making process involves consistent informations. In addition, results from both studies suggest that the increased production of consistent false memories persists until one year after commitment. Taken together, these different elements allow to envisage the production of consistent false memories as a possible implicit measure of the radicalization of attitudes and beliefs.
2

Generation, Yes? Digital Rights Management and Licensing, from the Advent of the Web to the iPad

Ashtar, Reuven 03 December 2012 (has links)
The Article discusses digital-era courts’ distortion of (para)copyright principles, deeming it borne of jumbled underlying legislation and a misplaced predilection for adopting licensing terms—even at the expense of recognized use exceptions. Common law evolutionary principles, it is shown, have been abandoned just when they are most needed: the ethereal rightsholder-user balance is increasingly disturbed, and the incipient “generative consumer” is in thrall, not liberated. Finally, the Article puts forth a proposal for the reestablishment of the principle of substantially noninfringing use, showing it to be in the interests of innovation, democracy, and the greater public interest.
3

Generation, Yes? Digital Rights Management and Licensing, from the Advent of the Web to the iPad

Ashtar, Reuven 03 December 2012 (has links)
The Article discusses digital-era courts’ distortion of (para)copyright principles, deeming it borne of jumbled underlying legislation and a misplaced predilection for adopting licensing terms—even at the expense of recognized use exceptions. Common law evolutionary principles, it is shown, have been abandoned just when they are most needed: the ethereal rightsholder-user balance is increasingly disturbed, and the incipient “generative consumer” is in thrall, not liberated. Finally, the Article puts forth a proposal for the reestablishment of the principle of substantially noninfringing use, showing it to be in the interests of innovation, democracy, and the greater public interest.
4

Dynamic analysis and control system design of a deployable space robotic manipulator

Romero, Ignacio January 2001 (has links)
This thesis presents a dynamic analysis and a control system for a flexible space manipulator, the Deployable Robotic Manipulator or DRM, which has a deployable/retractable link. The link extends (or retracts) from the containing slewing link of the manipulator to change the DRM's length and hence its workspace. This makes the system dynamics time varying and therefore any control strategy has to adapt to this fact. The aim of the control system developed is to slew the manipulator through a predetermined angle given a maximum angular acceleration, to reduce flexural vibrations of the manipulator and to have a certain degree of robustness, all of this while carrying a payload and while the length of the manipulator is changing. The control system consists of a slewing motor that rotates the manipulator using the open-loop assumed torque method and two reaction wheel actuators, one at the base and one at the tip of the manipulator, which are driven by a closed-loop damping control law. Two closed-loop control laws are developed, a linear control law and a Lyapunov based control law. The linear control law is based on collocated output feedback. The Lyapunov control law is developed for each of the actuators using Lyapunov stability theory to produce vibration control that can achieve the objectives stated above for different payloads, while the manipulator is rotating and deploying or retracting. The response of the system is investigated by computer simulation for two-dimensional vibrations of the deployable manipulator. Both the linear and Lyapunov based feedback control laws are found to eliminate vibrations for a range of payloads, and to increase the robustness of the slewing mechanism to deal with uncertain payload characteristics.
5

Musikwebben : Ett alternativ till illegal fildelning? / Musikwebben : An alternative to illegal file sharing?

Knutsson, Niklas January 2007 (has links)
The purpose of this thesis is to examine a new music downloading service called Musikwebben, which is now available in many Swedish libraries. It focuses on the differences and similarities between this service and illegal music sharing services. The question is raised, whether the appeal of Musikwebben is high enough for it to be able to “recruit” users from similar, illegal services. To answer this question, a qualitative content analysis is used, to explore various views on what legal downloading services have to offer and how these differ to illegal alternatives. The focus here lies mainly on the technical differences of the music files and how these may affect fair use and personal use. In addition, the musical content of Musikwebben is compared to the content of a leading illegal file sharing service. Logically, the more variety of music the service has to offer, the more appealing it would be to users. The result of this thesis shows that the music files being offered by Musikwebben are protected by a technology called DRM (Digital Rights Management). This is used to prevent illegal use of the files, mainly copying and sharing, but it also prevents other uses, which falls under both fair use and personal use. Consequently, illegal file sharing services, which are DRM free, are technologically superior and should therefore be more appealing to users. The results also show that the illegal services have a wider spectrum of music to offer, which of course would also be more user appealing. / Uppsatsnivå: C
6

Video na WEBu

Skořepa, Jakub January 2007 (has links)
Práce shrnuje problematiku digitálního videa na WEBu a nastiňuje možnosti využití videa, jako velice účinného způsobu přenosu informací po internetu. Dále práce identifikuje způsoby využití digitálního videa v praxi a pro jednotlivé způsoby použití stanovuje doporučení týkající se konkrétních charakteristik digitálního videa. Vyjadřuje se také k budoucím trendům v oblasti digitálního videa na WEBu. Pro porozumění závěrečných kapitol jsou nejdříve rozebrány obecné principy digitálního videa. Proto se v první části práce zaměřuje na digitální video obecně a s ním spojené pojmy. Poté jsou rozebírány způsoby získávání záznamů pro internetové použití. Následuje souhrn možných využití videa na webu. V další části jsou rozebrány nejpoužívanější formáty a s nimi spojené používané algoritmy komprese. Celá jedna kapitola je věnovaná problematice řízení digitálních práv ? DRM. Poté se podíváme na platformy pro běžné přehrávání po internetu využívající streaming videa, jakožto velice perspektivní technologie. Následně jsou zmíněny některé aspekty distribuce digitálního videa a je analyzován stav internetových videopůjčoven v ČR. Práce dále identifikuje požadavky jednotlivých způsobů použití a je navrženo řešení se zohledněním celé problematiky, tzn. jaký formát a jaké nastavení na které platformě použít. V závěru je zhodnocena celá problematika a shrnuty stěžejní body práce. Nakonec jsou identifikovány trendy v oblasti digitálního videa a je předpovězen vývoj dané problematiky.
7

REAP : Et system for rettighetsstyring i digitale bibliotek

Vestavik, Øyvind January 2002 (has links)
<p>Denne hovedfagsoppgaven tar sikte på å vise at digitale bibliotek kan publisere intellektuelle arbeider i Internet i overenstemmelse med opphavsretten. Den foreslår en arkitektur/et paradigme for å behandle rettigheter ved publikasjon gjennom Digitale Bibliotek som innebærer digital rettighetshåndtering. Gjennom en analyse av opphavsrettslovgivning og internasjonale avtaler, digitale biblioteks behov og standarder og system for digitale rettighetshåndtering under utvikling fastlegges premissene for en slik arkitektur. Basert på denne analysen foreslås en arkitektur/paradigme for et system for digital rettighetsbehandling for digitale bibliotek. Som del av</p><p>denne oppgaven har det blitt implementert en prototype av et slikt system,og dette systemet er dokumentert i denne oppgaven.</p> / <p>This master thesis is aimed at demonstrating that intellectual property can be published in the Internet by digital libraries in accordance with copyright laws. It proposes an architecture/paradigm for managing rights when publishing information through Digital Libraries involving digital rights management. Through an analysis of copyright laws and international treaties, the needs of Digital Libraries and evolving standards and systems for Digital Rights Management the foundations for a such an architecture are identified. Based on this analysis an architecture/paradigm for a system for digital rights management in digital libraries is proposed. As part of this work a prototype of such a system has been implemented and is documented in this paper.</p>
8

REAP : Et system for rettighetsstyring i digitale bibliotek

Vestavik, Øyvind January 2002 (has links)
Denne hovedfagsoppgaven tar sikte på å vise at digitale bibliotek kan publisere intellektuelle arbeider i Internet i overenstemmelse med opphavsretten. Den foreslår en arkitektur/et paradigme for å behandle rettigheter ved publikasjon gjennom Digitale Bibliotek som innebærer digital rettighetshåndtering. Gjennom en analyse av opphavsrettslovgivning og internasjonale avtaler, digitale biblioteks behov og standarder og system for digitale rettighetshåndtering under utvikling fastlegges premissene for en slik arkitektur. Basert på denne analysen foreslås en arkitektur/paradigme for et system for digital rettighetsbehandling for digitale bibliotek. Som del av denne oppgaven har det blitt implementert en prototype av et slikt system,og dette systemet er dokumentert i denne oppgaven. / This master thesis is aimed at demonstrating that intellectual property can be published in the Internet by digital libraries in accordance with copyright laws. It proposes an architecture/paradigm for managing rights when publishing information through Digital Libraries involving digital rights management. Through an analysis of copyright laws and international treaties, the needs of Digital Libraries and evolving standards and systems for Digital Rights Management the foundations for a such an architecture are identified. Based on this analysis an architecture/paradigm for a system for digital rights management in digital libraries is proposed. As part of this work a prototype of such a system has been implemented and is documented in this paper.
9

Digital Rights Management and Code Obfuscation

Sethi, Amit January 2004 (has links)
Digital Rights Management (DRM) involves retaining control over digital information, even after it has been made public. Preventing illegal file sharing on the Internet, which is a topic that has recently received a large amount of media attention, is just one instance where DRM is needed. In this thesis, we attempt to create formal definitions for DRM. Currently, there is a lack of such formal definitions, which is one reason why DRM schemes have achieved little success. We will also examine two DRM schemes that can be cracked easily: Microsoft DRM 2. 0, and the Content Scrambling System. We then discuss the reasons why DRM schemes have been unsuccessful so far, and why a good DRM scheme must incorporate secure hardware, secure software, and an efficient legal system. We also briefly discuss several issues related to DRM, such as privacy. Code Obfuscation involves hiding a program's implementation details from an adversary. One application of code obfuscation involves hiding cryptographic keys in encryption and decryption programs for a cryptosystem. Code obfuscation is directly applicable to DRM schemes, where the adversary has access to a program that contains secret information. For example, a music player may contain a secret key that it uses to decrypt content. The secret key must be hidden from the adversary, since otherwise, he/she could use the key to write his/her own decryption program, and distribute it to circumvent the DRM scheme. We discuss the proof from Barak et al that shows that code obfuscation is impossible in general. This, however, does not mean that code obfuscation cannot be achieved in specific cases. We will examine an obfuscated version of the Data Encryption Standard, and discuss the circumstances under which it is insecure. We also examine a toy example of a block cipher called <i>Simple Block Cipher (SBC)</i>, and apply obfuscation techniques to SBC to hide the secret key, and then attempt to obtain the secret key.
10

Digital Rights Management and Code Obfuscation

Sethi, Amit January 2004 (has links)
Digital Rights Management (DRM) involves retaining control over digital information, even after it has been made public. Preventing illegal file sharing on the Internet, which is a topic that has recently received a large amount of media attention, is just one instance where DRM is needed. In this thesis, we attempt to create formal definitions for DRM. Currently, there is a lack of such formal definitions, which is one reason why DRM schemes have achieved little success. We will also examine two DRM schemes that can be cracked easily: Microsoft DRM 2. 0, and the Content Scrambling System. We then discuss the reasons why DRM schemes have been unsuccessful so far, and why a good DRM scheme must incorporate secure hardware, secure software, and an efficient legal system. We also briefly discuss several issues related to DRM, such as privacy. Code Obfuscation involves hiding a program's implementation details from an adversary. One application of code obfuscation involves hiding cryptographic keys in encryption and decryption programs for a cryptosystem. Code obfuscation is directly applicable to DRM schemes, where the adversary has access to a program that contains secret information. For example, a music player may contain a secret key that it uses to decrypt content. The secret key must be hidden from the adversary, since otherwise, he/she could use the key to write his/her own decryption program, and distribute it to circumvent the DRM scheme. We discuss the proof from Barak et al that shows that code obfuscation is impossible in general. This, however, does not mean that code obfuscation cannot be achieved in specific cases. We will examine an obfuscated version of the Data Encryption Standard, and discuss the circumstances under which it is insecure. We also examine a toy example of a block cipher called <i>Simple Block Cipher (SBC)</i>, and apply obfuscation techniques to SBC to hide the secret key, and then attempt to obtain the secret key.

Page generated in 0.0359 seconds