Spelling suggestions: "subject:"bellman"" "subject:"hellman""
1 |
Lillian Hellmann [i.e. Hellman] eine Analyse und Würdigung ihrer Dramen.Triesch, Manfred, January 1964 (has links)
Inaug.-Diss.--Frankfurt am Main. / Vita. Bibliography: p. 186-191.
|
2 |
Benjamin Another part of the forest /Walton, Jonathan Alan. January 1900 (has links)
Thesis (M.F.A.)--West Virginia University, 2008. / Title from document title page. Document formatted into pages; contains iv, 14 p. Includes abstract. Includes bibliographical references (p. 14).
|
3 |
The evolving process of scenic design in Lillian Hellman's Another part of the forestWeisse, Mary Taber. January 2008 (has links)
Thesis (M.F.A.)--West Virginia University, 2008. / Title from document title page. Document formatted into pages; contains v, 52 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 34).
|
4 |
Regina Hubbard a part in the forest the creation on a southern belle /Skinner, Liza. January 1900 (has links)
Thesis (M.F.A.)--West Virginia University, 2008. / Title from document title page. Document formatted into pages; contains iv, 24 p. Includes abstract. Includes bibliographical references (p. 24).
|
5 |
The third 'I' creating of the fictional history of Marcus Hubbard /Pawlowski, Alexander. January 1900 (has links)
Thesis (M.F.A.)--West Virginia University, 2008. / Title from document title page. Document formatted into pages; contains iv, 32 p. Includes abstract. Includes bibliographical references (p. 32).
|
6 |
Introduktion till krypteringsmetoderna RSA och Merkle-HellmanEhsas, Nadja January 2011 (has links)
No description available.
|
7 |
From the forest to the RoseCarey, Veronda G. January 1900 (has links)
Thesis (M.F.A.)--West Virginia University, 2008. / Title from document title page. Document formatted into pages; contains iii, 23 p. Includes abstract. Includes bibliographical references (p. 23).
|
8 |
THE CHILDREN'S HOUR: SEEING BEYOND THE ADORABLEJosef, Lauren Ramsey 01 August 2015 (has links)
This paper covers an analysis of The Children’s Hour by Lillian Hellman and my costume design process from beginning to end for the production at Southern Illinois University in May of 2015. The first chapter is my proposal for the costume design as well as a thorough play analysis and Lillian Hellman’s background. Chapter two covers my design process, and discoveries made through the design meeting process. The production is discussed in Chapter three when my designs were realized, and Chapter five is a reflection on the entire process after the show closed. The subsequent appendices include additional renderings and photographs to further enhance my written analysis.
|
9 |
The Self-Characterization of Lillian Hellman in The Little Foxes and Another Part of the ForestVickery, Melissa J. 08 1900 (has links)
This study analyzed the personalities and actions of Regina, Birdie, Alexandra, and Lavinia from Lillian Hellman's The Little Foxes and Another Part of the Forest. The analysis was focused on the relationship between the life and personality of Lillian Hellman and each of the characters. The method of character analysis that was used was that described by David Grote in Script Analysis, but the effect of cultural history on the characters and on Lillian Hellman was examined as well. It was discovered that Lillian Hellman had infused the characters with many aspects her own personality. In the case of Regina and Lavinia, Hellman also used the characterizations to sort out her mixed feelings toward her parents.
|
10 |
Generalizations of the Diffie-Hellman protocol : exposition and implementationVan der Berg, J.S. 21 April 2008 (has links)
A generalisation of the Diffie-Hellman protocol is studied in this dissertation. In the generalisation polynomials are used to reduce the representation size of a public key and linear shift registers for more efficient computations. These changes are important for the implementation of the protocol in con- strained environments. The security of the Diffie-Hellman protocol and its generalisation is based on the same computations problems. Lastly three examples of the generalisation and their implementation are discussed. For two of the protocols, models are given to predict the execution time and it is determined how well these model predictions are. / Dissertation (MSc (Applied Mathematics))--University of Pretoria, 2007. / Mathematics and Applied Mathematics / MSc / unrestricted
|
Page generated in 0.0496 seconds