• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 485
  • 241
  • 118
  • 63
  • 57
  • 30
  • 29
  • 20
  • 14
  • 11
  • 9
  • 8
  • 6
  • 6
  • 5
  • Tagged with
  • 1258
  • 294
  • 270
  • 140
  • 99
  • 96
  • 91
  • 90
  • 88
  • 86
  • 85
  • 80
  • 76
  • 75
  • 70
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.

Economic man : the last man standing /

Eriksson, Lina. January 2005 (has links) (PDF)
Univ., Diss.--Göteborg, 2005.

The free will problem : from source to solution

Holcomb, Nathan A. January 2003 (has links)
No description available.

Stoizismus und rational-emotive Verhaltenstherapie (REVT) antike Lebensführung und moderne Psychotherapie im Vergleich

Hoellen, Burkhard January 1986 (has links)
Zugl.: Kaiserslautern, Univ., Diss., 1986 u.d.T.: Hoellen, Burkhard: Stoizismus und rational-emotive Therapie (RET)

Rational Secret Sharing with and without Synchronous Broadcast, Conspicuous Secrets, Malicious Players and Unbounded Opponents

Gidney, Craig 22 March 2012 (has links)
In secret sharing we are asked to split a secret into several shares in such a way that a minimum number of shares is necessary and sufficient to reconstruct the secret. Rational secret sharing considers secret sharing in the context of adversarial players who want to learn the secret but, secondarily, want to prevent other players from learning the secret. We present protocols, and bounds on the effectiveness of any protocol, for recombining secret shares in the presence of players who do not want others to learn the secret (rationality), may not want to learn the secret themselves (maliciousness), may be colluding, may have unbounded computational capacity, may be able to synchronize sends (asynchronous/synchronous broadcast), and/or may be able to recognize the secret independently (conspicuousness). We propose four protocols and analyze their security against players and coalitions who are each rational or malicious. We also prove three results that show protocols using only asynchronous broadcast are less secure than what can be achieved by protocols using synchronous broadcast.

Bestimmungsgründe individuellen Wahlverhaltens heute - Synopse und Integration

Paul, Mario. January 2009 (has links)
Chemnitz, Techn. Univ., Magisterarb., [2006].

Rational distances to the corners of the unit square

Moreno Martinez, Victor Manuel. January 1900 (has links)
Thesis (M.A.)--California State University Channel Islands, 2008. / Submitted in partial fulfillment of the requirements for the degree of Masters Of Science in Mathematics. Title from PDF t.p. (viewed October 25, 2009).

Elementary students' use of relationships and physical models to understand order and equivalence of rational numbers

Wenrick, Melanie Renee, January 2003 (has links) (PDF)
Thesis (Ph. D.)--University of Texas at Austin, 2003. / Vita. Includes bibliographical references. Available also from UMI Company.

Handlungstheorie zwischen Kommunitarismus und Rational Choice

Lambert, Klaus Dieter. Unknown Date (has links)
Universiẗat, Diss., 2000--Mannheim.

The comparative effects of RET styles upon subjects matched or unmatched with therapists high in cognitive differentiation

Erickson, Lee David. January 1982 (has links)
Thesis (Ph. D.)--Western Conservative Baptist Seminary, 1982. / Includes bibliographical references (leaves 171-178).

Monopole metrics and rational functions

Bielawski, Roger January 1993 (has links)

Page generated in 0.0844 seconds