• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 74
  • 55
  • 28
  • 11
  • 11
  • 7
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 227
  • 36
  • 34
  • 29
  • 29
  • 25
  • 23
  • 20
  • 20
  • 20
  • 20
  • 19
  • 19
  • 18
  • 18
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Truth Commissions: Did the South African Truth and Reconciliation Commission serve the purpose for which it was established?

Abduroaf, Muneer January 2010 (has links)
<p>Since the 1980&rsquo / s, many dictatorships around the world have been replaced by new democracies. These old dictatorships were notorious for their human rights abuses. Many people were killed and tortured / and many others were disappeared. When the new governments came into power, they had to confront these injustices that were perpetrated under the predecessor regime. This was necessary to create a culture of human rights / promote a respect for the law and access to justice. Many confronted these injustices in different ways, some granted amnesty, some prosecuted and others instituted truth commissions. This research paper focuses on truth commissions. The research focuses particularly on the study of the South African Truth Commission. The mandate of the South African Truth Commission is analysed and the investigation into whether the commission served the purpose for which it had been established is discussed.</p>
92

The Need for Post-conflict Investigatory Mechanisms in the R2P Doctrine

Navaratnam, Kubes 12 January 2011 (has links)
In the wake of atrocities arising from internal armed conflicts in the 1990s, the International Commission on Intervention and State Sovereignty introduced the Responsibility to Protect doctrine (“R2P”) as a solution to reconcile the notion of state sovereignty with the need to protect citizens. The lack of available protection for internal armed conflicts and the subsequent evolution of the humanitarian intervention debate facilitated the unanimous acceptance of R2P’s fundamental principles by all UN member states. This paper examines the development of the R2P doctrine and its current status as customary law. By identifying its inadequacies, the paper raises questions of the doctrine’s viability in fulfilling the emerging norm of the collective responsibility to protect. In order to remedy these shortfalls and ensure the doctrine’s effectiveness, the paper argues the need to incorporate post-conflict investigatory mechanisms into the R2P.
93

The Need for Post-conflict Investigatory Mechanisms in the R2P Doctrine

Navaratnam, Kubes 12 January 2011 (has links)
In the wake of atrocities arising from internal armed conflicts in the 1990s, the International Commission on Intervention and State Sovereignty introduced the Responsibility to Protect doctrine (“R2P”) as a solution to reconcile the notion of state sovereignty with the need to protect citizens. The lack of available protection for internal armed conflicts and the subsequent evolution of the humanitarian intervention debate facilitated the unanimous acceptance of R2P’s fundamental principles by all UN member states. This paper examines the development of the R2P doctrine and its current status as customary law. By identifying its inadequacies, the paper raises questions of the doctrine’s viability in fulfilling the emerging norm of the collective responsibility to protect. In order to remedy these shortfalls and ensure the doctrine’s effectiveness, the paper argues the need to incorporate post-conflict investigatory mechanisms into the R2P.
94

Completeness of Fact Extractors and a New Approach to Extraction with Emphasis on the Refers-to Relation

Lin, Yuan 07 August 2008 (has links)
This thesis deals with fact extraction, which analyzes source code (and sometimes related artifacts) to produce extracted facts about the code. These facts may, for example, record where in the code variables are declared and where they are used, as well as related information. These extracted facts are typically used in software reverse engineering to reconstruct the design of the program. This thesis has two main parts, each of which deals with a formal approach to fact extraction. Part 1 of the thesis deals with the question: How can we demonstrate that a fact extractor actually does its job? That is, does the extractor produce the facts that it is supposed to produce? This thesis builds on the concept of semantic completeness of a fact extractor, as defined by Tom Dean et al, and further defines source, syntax and compiler completeness. One of the contributions of this thesis is to show that in particular important cases (when the extractor is deterministic and its front end is idempotent), there is an efficient algorithm to determine if the extractor is compiler complete. This result is surprising, considering that in general it is undecidable if two programs are semantically equivalent, and it would seem that source code and its corresponding extracted facts are each essentially programs that are to be proved to be equivalent or at least sufficiently similar. The larger part of the thesis, Part 2, presents Algebraic Refers-to Analysis (ARA), a new approach to fact extraction with emphasis on the Refers-to relation. ARA provides a framework for specifying fact extraction, based on a three-step pipeline: (1) basic (lexical and syntactic) extraction, (2) a normalization step and (3) a binding step. For practical programming languages, these three steps are repeated, in stages and phases, until the Refers-to relation is computed. During the writing of this thesis, ARA pipelines for C, Java, C++, Fortran, Pascal and Ada have been designed. A prototype fact extractor for the C language has been created. Validating ARA means to demonstrate that ARA pipelines satisfy the programming language standards such as ISO C++ standard. In other words, we show that ARA phases (stages and formulas) are correctly transcribed from the rules in the language standard. Comparing with the existing approaches such as Attribute Grammar, ARA has the following advantages. First, ARA formulas are concise, elegant and more importantly, insightful. As a result, we have some interesting discovery about the programming languages. Second, ARA is validated based on set theory and relational algebra, which is more reliable than exhaustive testing. Finally, ARA formulas are supported by existing software tools such as database management systems and relational calculators. Overall, the contributions of this thesis include 1) the invention of the concept of hierarchy of completeness and the automatic testing of completeness, 2) the use of the relational data model in fact extraction, 3) the invention of Algebraic Refers-to Relation Analysis (ARA) and 4) the discovery of some interesting facts of programming languages.
95

Putnam's Moral Realism

Persson, Björn January 2013 (has links)
Moral realism is the view that there are such things as moral facts. Moral realists have attempted to combat the skeptical problem of relativism, which is that the truth of an ethical value judgment is often, or always, subjective, that is, relative to the parties it involves. This essay presents, discusses, and criticizes Hilary Putnam’s attempt at maintaining moral realism while at the same time maintaining a degree of epistemological relativism. Putnam’s positive account originates in moral epistemology, at the heart of which lies truth, as idealized rational acceptability or truth under ideal conditions. The bridge between moral epistemology and normative ethics stems from Putnam’s disintegration of facts and values. His theory is finalized in the construction of a normative moral theory, in which the central notion is incessant self-criticism in order to maintain rationality. After presenting Putnam’s core thesis, the criticism raised by Richard Rorty, is deliberated upon. Rorty is critical of Putnam’s attempt at holding on to objectivity, because he does not understand how objective knowledge can be both relative to a conceptual scheme, and at the same time objective. The conclusion is that Putnam is unable to maintain his notion of truth as idealized rational acceptability and is forced into epistemological relativism. Putnam’s normative ethics has characteristics in common with virtue ethics, and is of much interest regardless of whether it can be grounded epistemologically or not.
96

Completeness of Fact Extractors and a New Approach to Extraction with Emphasis on the Refers-to Relation

Lin, Yuan 07 August 2008 (has links)
This thesis deals with fact extraction, which analyzes source code (and sometimes related artifacts) to produce extracted facts about the code. These facts may, for example, record where in the code variables are declared and where they are used, as well as related information. These extracted facts are typically used in software reverse engineering to reconstruct the design of the program. This thesis has two main parts, each of which deals with a formal approach to fact extraction. Part 1 of the thesis deals with the question: How can we demonstrate that a fact extractor actually does its job? That is, does the extractor produce the facts that it is supposed to produce? This thesis builds on the concept of semantic completeness of a fact extractor, as defined by Tom Dean et al, and further defines source, syntax and compiler completeness. One of the contributions of this thesis is to show that in particular important cases (when the extractor is deterministic and its front end is idempotent), there is an efficient algorithm to determine if the extractor is compiler complete. This result is surprising, considering that in general it is undecidable if two programs are semantically equivalent, and it would seem that source code and its corresponding extracted facts are each essentially programs that are to be proved to be equivalent or at least sufficiently similar. The larger part of the thesis, Part 2, presents Algebraic Refers-to Analysis (ARA), a new approach to fact extraction with emphasis on the Refers-to relation. ARA provides a framework for specifying fact extraction, based on a three-step pipeline: (1) basic (lexical and syntactic) extraction, (2) a normalization step and (3) a binding step. For practical programming languages, these three steps are repeated, in stages and phases, until the Refers-to relation is computed. During the writing of this thesis, ARA pipelines for C, Java, C++, Fortran, Pascal and Ada have been designed. A prototype fact extractor for the C language has been created. Validating ARA means to demonstrate that ARA pipelines satisfy the programming language standards such as ISO C++ standard. In other words, we show that ARA phases (stages and formulas) are correctly transcribed from the rules in the language standard. Comparing with the existing approaches such as Attribute Grammar, ARA has the following advantages. First, ARA formulas are concise, elegant and more importantly, insightful. As a result, we have some interesting discovery about the programming languages. Second, ARA is validated based on set theory and relational algebra, which is more reliable than exhaustive testing. Finally, ARA formulas are supported by existing software tools such as database management systems and relational calculators. Overall, the contributions of this thesis include 1) the invention of the concept of hierarchy of completeness and the automatic testing of completeness, 2) the use of the relational data model in fact extraction, 3) the invention of Algebraic Refers-to Relation Analysis (ARA) and 4) the discovery of some interesting facts of programming languages.
97

WebKnox: Web Knowledge Extraction

Urbansky, David 21 August 2009 (has links) (PDF)
This thesis focuses on entity and fact extraction from the web. Different knowledge representations and techniques for information extraction are discussed before the design for a knowledge extraction system, called WebKnox, is introduced. The main contribution of this thesis is the trust ranking of extracted facts with a self-supervised learning loop and the extraction system with its composition of known and refined extraction algorithms. The used techniques show an improvement in precision and recall in most of the matters for entity and fact extractions compared to the chosen baseline approaches.
98

Att prata i politik : En diskurspsykologisk undersökning av positionering i kommunfullmäktige

Forss, Henrik, Asteberg, David January 2015 (has links)
Lokal politik har en viktig roll i samhället och dess faktakonstruktion kan ha en påverkan på individen. Lokalpolitikern konstruerar i sina anföranden beskrivningar av verkligheten som görs trovärdiga genom retoriskt arbete. Arbetet använder en diskurspsykologisk metod för att undersöka kommunpolitikers anförande i debatten rörande kommunens styrdokument, Inriktning, verksamhet och ekonomi (förkortat IVE) för åren 2015 till 2018. Studien kommer fram till att problem och lösningar görs till fakta genom användandet av offensiv och defensiv retorik. I konstruerandet av problemet finns också ett konstruerande av en politisk motståndare som föranlett problemet. Producerandet görs trovärdigt genom retoriska resurser som främst är av offensiv karaktär. I konstruerandet av lösningar positionerar kommunpolitiker sig nära lösningen och som kapabla och ansvarsfulla aktörer. I producerandet nyttjas retoriska resurser som främst är av defensiv karaktär. / Local government has an important role in society and their facts construction can have an impact on the individual citizen. In their speeches, local politicians construct descriptions of reality that are made credible by their rhetorical work. This study utilizes a discourse psychological method to investigate municipal politicians’ speech in the debate on the municipal policy regarding Orientation, Services and Economics (abbreviated IVE) for the years of 2015 throughout 2018. The study concludes that problems and solutions become facts through utilization of offensive and defensive rhetorical techniques. In the construction of the problem there is also a construction of the political opponent that has prompted the problem. The production is made credible through rhetorical resources of primarily offensive characteristics. In constructing the solution the municipal politicians position themselves close to the solution and as capable and responsible actors. In the production they use rhetorical resources that are mainly in defensive form.
99

Structural investigation of the histone chaperone complex FACT using genetically encoded crosslinkers in Saccharomyces cerevisiae

Hoffmann, Christian 01 December 2014 (has links)
No description available.
100

INDEPENDENCE IN FACT AND IN APPEARANCE : A STUDY OF REGULATORY DEMANDS AS MADE EVIDENT THROUGH PRACTICE

Benjaminsson, Erik, Doherty, Leo January 2012 (has links)
Purpose – The purpose of this paper is to get an increased insight on a governmental regulator's view on independence in a Swedish context, with the aim to contribute to the research regarding auditor independence. Design/methodology/approach – The research is in the form of a quantitative study examining the Swedish Supervisory Board of Public Accountant’s disciplinary rulings from the years 2004-2010. Findings – The study concludes that the SSBPA view independence in fact as one, if not the most, important attribute for an auditor, while independence in appearance is on the other side of the spectrum, being one of the least vital. Originality/Value – The findings of this paper show that the SSBPA’s view on auditor independence is in stark contrast to the propositions made by the European Commission and SOX, as they are more focused on mitigating issues related to independence in appearance. Keywords – Auditor independence; Independence in Appearance; Independence in Fact; Practical Definition; Quality affecting Issues; Non-Quality affecting Issues; Regulatory Oversight; Disciplinary RulingsPaper Type – Research paper

Page generated in 0.0294 seconds