• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1725
  • 231
  • 180
  • 123
  • 79
  • 74
  • 72
  • 40
  • 34
  • 29
  • 24
  • 22
  • 16
  • 15
  • 11
  • Tagged with
  • 3275
  • 904
  • 587
  • 521
  • 370
  • 367
  • 354
  • 333
  • 324
  • 300
  • 279
  • 242
  • 242
  • 235
  • 217
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
321

Balance delete : minimizing peer-to-peer delay after a node leaves the tree

O, Udomying Suntana 01 October 2002 (has links)
No description available.
322

Peer health educators' motives

Victor, Marcy 01 January 1999 (has links)
In this study, the motives that influence students to become peer educators are reported. Undergraduates from the University of Central Florida, University of South Florida, and University of Florida, who participate in a Peer Health Education program, were surveyed. Results show responses to personal experiences, personal expectations, self-efficacy, and altruistic and extrinsic motivations. According to the findings, there is a unique set of motivating factors common among the majority of college students who chose to become peer educators. This study supports findings on peer health educators' motives and extends research to cover program recruitment and training.
323

Peer-to-peer learning processes ¿ an Ecoversity case study

Hopkinson, Peter G., Miles, S., Hughes, P., Comerford Boyes, Louise January 2009 (has links)
No
324

The regulation of peer-to-peer lending platforms in the consumer credit market

Dierks, Annalena 20 September 2019 (has links)
Peer-to-Peer-Finanzierungen haben in den letzten Jahren nicht nur aufgrund ihres disruptiven Charakters, sondern auch aufgrund ihres raschen Wachstums und der wachsenden Bandbreite an Dienstleistungen zunehmend Beachtung gefunden. Peer-to-Peer Kreditplattformen versuchen, Banken zu umgehen, um Kreditnehmern eine Alternative und Anlegern eine neue Anlageklasse anzubieten - wird dies zu einem „Banking ohne Banken“ führen? Peer-to-Peer Betreiber müssen darauf achten, dass sie ihre Geschäfte gemäß den geltenden Gesetzen und Vorschriften planen und betreiben, auch wenn sie mit einer Bank zusammenarbeiten, die als Kreditgeber fungiert, da die Nichteinhaltung der geltenden Vorschriften unter anderem zivil- und strafrechtliche Sanktionen, Prozesskosten sowie nachteilige Publizität und im schlimmsten Fall die Beendigung des Geschäfts nach sich ziehen kann. Zusätzliche Schwierigkeiten ergeben sich aufgrund unterschiedlicher Vorschriften in den europäischen Ländern. Infolgedessen muss eine neue Beurteilung des rechtlichen Umfelds vorgenommen werden, bevor ein Peer-to-Peer Betreiber sein Geschäft auf andere Länder ausweiten kann, was häufig zu unterschiedlichen Konfigurationen und Geschäftsmodellen führt. In dieser Dissertation sollen die wichtigsten Bestimmungen für die Vergabe von Peer-to-Peer Krediten herausgearbeitet werden. Der Schwerpunkt liegt auf den rechtlichen Rahmenbedingungen für Peer-to-Peer Kredite in Deutschland, d.h. welche Vorschriften diese Plattformen erfüllen müssen, um ihr Geschäftsmodell zu betreiben, und/ oder welche Vorschriften und Lizenzanforderungen für diese Unternehmen gelten. Zunächst wird erklärt, was Peer-to-Peer Kredite sind, wie sie sich entwickelt haben und wie sie funktionieren. Die rechtlichen Rahmenbedingungen werden sowohl für Deutschland als auch für europäische Länder, nämlich das Vereinigte Königreich, Schweden und die Niederlande, im Vergleich untersucht. Anschließend wird untersucht, warum verschiedene europäische Länder unterschiedliche Regeln anwenden und ob es möglich wäre, solche Regelungen für Peer-to-Peer Kredite in ganz Europa zu harmonisieren und gleichzeitig sicherzustellen, dass die Hauptgründe der Länder erfüllt werden. / Peer-to-peer finance has received increasing attention over the last years, not only because of its disruptive nature, but also because of its rapid growth and expanding breadth of services. Peer-to-peer lending platforms try to circumvent banks to offer borrowers an alternative and investors a new asset class – will this lead to a “Banking without banks”. Peer-to-peer operators need to be careful to plan and operate their business in compliance with applicable laws and regulations, even if they cooperate with a non-affiliated bank that acts as lender of record, since failure to comply with applicable regulations can result in, among others, civil and criminal penalties, litigation expenses as well as adverse publicity and in the worst case the termination of the business. Additional difficulties arise due to different regulations across European countries. Consequently a new assessment of the legal environment needs to be made before a peer-to-peer operator can expand its business into other countries and often leads to differing setups and business models. The dissertation is intended to identify principal regulations that apply to peer-to-peer lending. The focus lies on the legal framework for peer-to-peer lending in Germany, i.e. which regulations such platforms have to comply with in order to operate their business model and/or which regulations are applicable to such businesses and which license requirements apply. First of all it will be explained what peer-to-peer lending is, how it evolved and how it works. The legal framework will be investigated with regards to Germany as well as European countries, namely the United Kingdom, Sweden and the Netherlands, in comparison. It will then be examined why different European countries apply different rules and whether it would be possible to harmonise such regulations for peer-to-peer lending across Europe whilst ensuring that the countries’ main rationales are fulfilled.
325

Empirical and Analytical Perspectives on the Robustness of Blockchain-related Peer-to-Peer Networks

Henningsen, Sebastian 14 April 2022 (has links)
Die Erfindung von Bitcoin hat ein großes Interesse an dezentralen Systemen geweckt. Eine häufige Zuschreibung an dezentrale Systeme ist dabei, dass eine Dezentralisierung automatisch zu einer höheren Sicherheit und Widerstandsfähigkeit gegenüber Angriffen führt. Diese Dissertation widmet sich dieser Zuschreibung, indem untersucht wird, ob dezentralisierte Anwendungen tatsächlich so robust sind. Dafür werden exemplarisch drei Systeme untersucht, die häufig als Komponenten in komplexen Blockchain-Anwendungen benutzt werden: Ethereum als Infrastruktur, IPFS zur verteilten Datenspeicherung und schließlich "Stablecoins" als Tokens mit Wertstabilität. Die Sicherheit und Robustheit dieser einzelnen Komponenten bestimmt maßgeblich die Sicherheit des Gesamtsystems in dem sie verwendet werden; darüber hinaus erlaubt der Fokus auf Komponenten Schlussfolgerungen über individuelle Anwendungen hinaus. Für die entsprechende Analyse bedient sich diese Arbeit einer empirisch motivierten, meist Netzwerklayer-basierten Perspektive -- angereichert mit einer ökonomischen im Kontext von Wertstabilen Tokens. Dieses empirische Verständnis ermöglicht es Aussagen über die inhärenten Eigenschaften der studierten Systeme zu treffen. Ein zentrales Ergebnis dieser Arbeit ist die Entdeckung und Demonstration einer "Eclipse-Attack" auf das Ethereum Overlay. Mittels eines solchen Angriffs kann ein Angreifer die Verbreitung von Transaktionen und Blöcken behindern und Netzwerkteilnehmer aus dem Overlay ausschließen. Des weiteren wird das IPFS-Netzwerk umfassend analysiert und kartografiert mithilfe (1) systematischer Crawls der DHT sowie (2) des Mitschneidens von Anfragenachrichten für Daten. Erkenntlich wird hierbei, dass die hybride Overlay-Struktur von IPFS Segen und Fluch zugleich ist, da das Gesamtsystem zwar robust gegen Angriffe ist, gleichzeitig aber eine umfassende Überwachung der Netzwerkteilnehmer ermöglicht wird. Im Rahmen der wertstabilen Kryptowährungen wird ein Klassifikations-Framework vorgestellt und auf aktuelle Entwicklungen im Gebiet der "Stablecoins" angewandt. Mit diesem Framework wird somit (1) der aktuelle Zustand der Stablecoin-Landschaft sortiert und (2) ein Mittel zur Verfügung gestellt, um auch zukünftige Designs einzuordnen und zu verstehen. / The inception of Bitcoin has sparked a large interest in decentralized systems. In particular, popular narratives imply that decentralization automatically leads to a high security and resilience against attacks, even against powerful adversaries. In this thesis, we investigate whether these ascriptions are appropriate and if decentralized applications are as robust as they are made out to be. To this end, we exemplarily analyze three widely-used systems that function as building blocks for blockchain applications: Ethereum as basic infrastructure, IPFS for distributed storage and lastly "stablecoins" as tokens with a stable value. As reoccurring building blocks for decentralized applications these examples significantly determine the security and resilience of the overall application. Furthermore, focusing on these building blocks allows us to look past individual applications and focus on inherent systemic properties. The analysis is driven by a strong empirical, mostly network-layer based perspective; enriched with an economic point of view in the context of monetary stabilization. The resulting practical understanding allows us to delve into the systems' inherent properties. The fundamental results of this thesis include the demonstration of a network-layer Eclipse attack on the Ethereum overlay which can be leveraged to impede the delivery of transaction and blocks with dire consequences for applications built on top of Ethereum. Furthermore, we extensively map the IPFS network through (1) systematic crawling of its DHT, as well as (2) monitoring content requests. We show that while IPFS' hybrid overlay structure renders it quite robust against attacks, this virtue of the overlay is simultaneously a curse, as it allows for extensive monitoring of participating peers and the data they request. Lastly, we exchange the network-layer perspective for a mostly economic one in the context of monetary stabilization. We present a classification framework to (1) map out the stablecoin landscape and (2) provide means to pigeon-hole future system designs. With our work we not only scrutinize ascriptions attributed to decentral technologies; we also reached out to IPFS and Ethereum developers to discuss results and remedy potential attack vectors.
326

The effects of postnatal depression on the social behaviour of children during the transition to schools entry

Sinclair, Dana Alexandra January 1994 (has links)
No description available.
327

The nature of the folding back phenomenon within the Pirie-Kieren theory for the growth of mathematical understanding and the associated implications for teachers and learners of mathematics

Martin, Lyndon C. January 1999 (has links)
No description available.
328

Trajectories of peer victimization in elementary school children and associated changes in mental health, social competence, and school climate

Sukhawathanakul, Paweena 27 January 2017 (has links)
Peer victimization among children is a major concern in our society as it is associated with a number of adjustment difficulties that manifest over time. Although peer victimization declines for most children during the elementary school years, research suggests that between 2-25% of children continue to report high-stable or increasing levels of peer victimization over time. However, little is known about the developmental changes that explain why children become locked into these high-risk groups. Using a longitudinal sample of children in grades 1-3 followed across 5 waves of assessments, this dissertation investigated how differences in the chronicity of children's peer victimization experiences relate to changes in their mental health (internalizing and externalizing symptoms), social competence (prosocial leadership and social responsibility), and experiences of school climate. Latent class analyses revealed that children follow 4 distinct trajectory groups of physical and relational peer victimization characterized by chronically high (ns = 102 & 199, physical and relational respectively), increasing (ns = 115 & 169), decreasing (ns = 466 & 174) or low stable (ns = 1260 & 1402) levels of physical and relational peer victimization across time. Findings from multilevel analyses showed that the peer victimization subgroups also varied in their longitudinal patterns of mental health, social competence and experiences of school climate after accounting for differences in sex, age, socioeconomic status, and prevention program participation. Children who had chronically high levels of peer victimization had higher mental health symptoms, lower levels of social competence and poorer experiences of school climate consistently over time compared to children in the low stable group. Children who reported increasing levels of peer victimization over time had slower rates of improvement in their social competence than children in the low stable group. Furthermore, children with increasing levels of peer victimization also had declining experiences of school climate over time compared to children in the low stable peer victimization group. The heterogeneity in children’s experiences of peer victimization suggest that programs need to tailor prevention efforts to the specific needs of at-risk children who adjust differently to their victimization experiences. / Graduate
329

CAUSES AND CONSEQUENCES OF PEER VICTIMIZATION AMONG ADOLESCENTS WITH AUTISM

Doyle, Sarah T 01 January 2016 (has links)
A significant, yet understudied issue that demands attention is the experience of peer victimization among adolescents with autism spectrum disorders (ASDs). Research indicates that youth with disabilities, including those with ASDs, are victimized more frequently as compared to their typically developing peers. However, little is known about the peer victimization experience for adolescents with ASDs beyond its frequency of occurrence. This study examined relations between peer victimization and individual, peer, and parent factors and outcomes including internalizing and externalizing symptoms among adolescents with ASDs. No significant indirect effects were found for peer victimization on relations between individual social-cognitive and emotion regulation factors and internalizing or externalizing symptoms. Moderating effects of peer (i.e., friendship companionship, closeness, and help) factors on relations between peer victimization and internalizing and externalizing symptoms were not supported. Significant direct effects were found as higher levels of friendship companionship and help were associated with lower levels of internalizing symptoms. Parental knowledge moderated the relations between both adolescent-reported and parent-reported peer victimization and internalizing but not externalizing symptoms. Study findings have implications for prevention and intervention efforts including adolescents with ASDs and directions for future research.
330

Právní otázky internetu v mezinárodním a vnitrostátním právu / Legal issues of the internet in international and national law

Miroš, Petr January 2010 (has links)
Legal issues of the Internet from the scope of international and national law Global internet network has changed the social, political and business life of most people in the World. Communication is much faster, the flow of information all around the World takes a few seconds. Exchange of political opinions, personal and business information, works protected by copyright and other information has become unstoppable. Members of the international community are trying to tackle this new challenge to their legal and political systems. This diploma thesis is describing some arreas of private law where Internet plays the most important role and has changed the scope and interpretation of many legal rules. The work is dividend into two main parts. The first one deals with general aspects of the Internet such as its history, architecture, different regulatory layers, the copyright law on-line, general legal issues arising from the Yahoo! case and its impact on political systems. The second part describes more specific areas mainly focused on the protection of personality and personal data in the on-line environment. To be more specific, there are chapters dealing with communication software, social networks, direct business and usage of the Internet for business reasons. Specific chapter is dedicated to...

Page generated in 0.036 seconds