• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 441
  • 126
  • 39
  • 33
  • 9
  • 7
  • 5
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 698
  • 456
  • 170
  • 68
  • 61
  • 52
  • 51
  • 34
  • 34
  • 30
  • 28
  • 28
  • 28
  • 28
  • 27
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
521

Beaker-kulturernas ursprungs-ID

Fagerström, Christina January 2008 (has links)
This essay aims to investigate the use of an origin-ID within the Beaker Complex, as defined by John C. Barrett, seen through their different expressions of use in ceramic form and ornamentation, architecture and landscape through time and space with special emphasis on the late Neolihtics in the South of England. The analytic vehicle "the reinforcing circle" is used as a new diffusion model suggested by Stuart Needham, and the analytic tool "incubation" is used to structure the process the Beaker-cultures may have used to reach cultural hegemony. Id est, that the Beaker-cultures socially invites already existing cultures, offering within family and trading the results of new technolo­gies. And/or, occupy the space and use the authority needed by re-writing the narrative as seen in the grave use and grave deposits. The use of a Beaker origin-ID is identified as a peaceful strategy to successfully implement and fullfill a process towards cultural hegemony in areas in Europe where the Beaker cultures presence over time have been identified. / Uppsatsen är inte paginerad.
522

科学哲学から見た「知的設計」説

伊勢田, 哲治, Iseda, Tetsuji 11 1900 (has links)
No description available.
523

Die Rechtsprechung des Europäischen Gerichtshofs für Menschenrechte zum Verbot politischer Parteien /

Kontopodi, Katerina. January 2007 (has links) (PDF)
Freie Univ., Magisterarb.-2005--Berlin, 2004.
524

Finanzmanagement als Chance kirchlichen Lernens : betriebswirtschaftliche und praktisch-theologische Analysen zu neuen Steuerungsinstrumenten der evangelischen Kirchen in Baden-Württemberg /

Bassler, Karin. January 2006 (has links)
Univ., Diss. u.d.T.: Bassler, Karin: Finanzmanagement als Ort kirchlichen Lernens - Die neuen Finanzmanagementmethoden der evangelischen Landeskirchen in Baden-Württemberg aus betriebswirtschaftlicher und praktisch-theologischer Sicht--Göttingen, 2005.
525

United States Supreme Court und Bundesverfassungsgericht : die Bedeutung des United States Supreme Court für die Errichtung und Fortentwicklung des Bundesverfassungsgerichts = United States Supreme Court and Federal Constitutional Court of Germany /

Kau, Marcel. January 1900 (has links) (PDF)
Univ., Diss.--Konstanz, 2005. / Literaturverz. S. [499] - 524.
526

Der Kommissionspräsident als Oberhaupt der Europäischen Union : vom primus inter pares zur europäischen Leitfigur /

Staeglich, Simone. January 2007 (has links) (PDF)
Univ., Diss.--Hannover, 2006.
527

Die Rückkehr auf den Weltmarkt : die Internationalisierung der Bayer AG Leverkusen nach dem Zweiten Weltkrieg bis zum Jahre 1961 /

Kleedehn, Patrick. January 2007 (has links) (PDF)
Univ., Diss.--Bonn, 2006.
528

Die Anwendung der Vorschriften des Allgemeinen Landrechts für die Preußischen Staaten über die eheliche Gütergemeinschaft in der Praxis des Königlichen (Geheimen) Obertribunals in der Zeit von 1837 bis 1879 /

Schmüser, Simone Leona. January 2007 (has links) (PDF)
Univ., Diss.--Kiel, 2006.
529

Einfluss von empirischer Forschung und Rechnungslegungspraxis auf die internationalen Standardsetter : eine Untersuchung am Beispiel Performance-Reporting /

Weinreis, Markus. January 2009 (has links)
Zugl.: Bochum, Universiẗat, Diss., 2009.
530

Establishing security and privacy in WAVE-enabled vehicular ad hoc networks

Biswas, Subir 11 January 2013 (has links)
Security and privacy are among the growing concerns of a Vehicular Ad hoc Network (VANET) which requires a high degree of liability from its participants. In this dissertation, We address security, anonymity and privacy challenges of VANETs in the light of the IEEE standards for vehicular communications. VANET provides a variety of road-safety and other applications through wireless devices installed in vehicles and roadside infrastructure. A roadside infrastructure in VANET is generally public, and is prone to several different malicious attacks including node compromise, impersonation, and false message delivery attacks. Therefore, a user of a VANET must verify the integrity of a message that is delivered from a roadside infrastructure. On the other hand, a vehicle-originated message should be anonymous in order to ensure user-privacy in a VANET. However, a vehicle must not be able to take advantage of its anonymity for any misbehavior like sending false messages or malicious updates to other vehicles or a roadside infrastructure. We use proxy signature, identity-based signature, and elliptic curve cryptosystems to provide authentication for infrastructure generated messages, and anonymous authentication for vehicle originated messages. Authentication in a dense traffic condition is a challenge for a receiving entity as it incurs a processing delay at the receiving end. We address this issue with a dynamic approach that selectively verifies received messages based on a message's MAC-layer priority and a sender's information relevance. This approach makes a trade-off between priority and fairness in vehicular message authentication. We develop a network simulator to measure the impact of our authentication schemes over a WAVE protocol stack. Also, we investigate how some of the MAC-layer weaknesses may impair the security of a VANET. Our solutions are lightweight, bandwidth friendly and compatible to the current standards of vehicular communications.

Page generated in 0.022 seconds