Thèses sur le sujet « DES identification »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleures thèses pour votre recherche sur le sujet « DES identification ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.
Pryke, Sean Patrick. « Multiple independent identification decisions, a method of calibrating eyewitness identifications ». Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/NQ63445.pdf.
Texte intégralBalaniuk, Remis. « Identification structurelle ». Phd thesis, Grenoble INPG, 1996. http://tel.archives-ouvertes.fr/tel-00004974.
Texte intégralWood, Nathan D. « Mystic Identifications : Reading Kenneth Burke and “Non-identification” through Asian American Rhetoric ». BYU ScholarsArchive, 2020. https://scholarsarchive.byu.edu/etd/8482.
Texte intégralBrunot, Mathieu. « Identification of rigid industrial robots - A system identification perspective ». Phd thesis, Toulouse, INPT, 2017. http://oatao.univ-toulouse.fr/20776/1/BRUNOT_Mathieu_20776.pdf.
Texte intégralAvanzi, Lorenzo <1975>. « Dual Identification : When Identification in Organizational Contexts Can Harm ». Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/1575/1/TESI_DOTTORATO_ULTIMA_CON_INDICEok.pdf.
Texte intégralAvanzi, Lorenzo <1975>. « Dual Identification : When Identification in Organizational Contexts Can Harm ». Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/1575/.
Texte intégralCoymak, Ahmet. « Associations Of Religious Identification, Secular Identification, Perceived Discrimination, And Political Trust With Ethnic And Societal (national) Identification ». Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610734/index.pdf.
Texte intégralstructure. Supporting hypothesis stemming from Social Identity Theory and Optimal Distinctiveness Theory, political trust and perceived discrimination have roles of mediation in the relationship ethnic and societal identification, by contrast with secular and religious identities in the relationship. Results were discussed for their implications to politic context of the Turkey.
Pozzulo, Joanna D. « Increasing the identification accuracy of child eyewitnesses with identification procedures ». Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0004/NQ27850.pdf.
Texte intégralPourmohammad-Namvar, Mehrzad. « Interaction entre identification et commande : identification pour la commande robuste ». Grenoble INPG, 2001. http://www.theses.fr/2001INPG0004.
Texte intégralXing, Shutao. « Structural Identification and Damage Identification using Output-Only Vibration Measurements ». DigitalCommons@USU, 2011. https://digitalcommons.usu.edu/etd/1067.
Texte intégralPrandina, Marco. « Spatial damping identification ». Thesis, University of Liverpool, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.533930.
Texte intégralZai, Salar. « Identification of micrococci ». Thesis, University of Bradford, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.292645.
Texte intégralNguyên, Thiên-Lôc 1978. « National identification systems ». Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/87367.
Texte intégralHlushchenko, V. O., I. I. Kolodochka et A. O. Miroshnychenko. « Identification of motion ». Thesis, Сумський державний університет, 2012. http://essuir.sumdu.edu.ua/handle/123456789/28692.
Texte intégralHlushchenko, V. O., I. I. Kolodochka et A. O. Miroshnychenko. « Identification of motion ». Thesis, Видавництво СумДУ, 2012. http://essuir.sumdu.edu.ua/handle/123456789/26037.
Texte intégralSinyanska, A., et A. Klushnik. « Presenting for identification ». Thesis, Видавництво СумДУ, 2012. http://essuir.sumdu.edu.ua/handle/123456789/26092.
Texte intégralZiegler, Edward H. « Nonlinear system identification / ». Online version of thesis, 1994. http://hdl.handle.net/1850/11583.
Texte intégralDwyer, Edward J. « Word Identification Strategies ». Digital Commons @ East Tennessee State University, 2018. https://dc.etsu.edu/etsu-works/3417.
Texte intégralDwyer, Edward J. « Word Identification Strategies ». Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etsu-works/3419.
Texte intégralMoody, Sarah Jean. « Automated Data Type Identification And Localization Using Statistical Analysis Data Identification ». DigitalCommons@USU, 2008. https://digitalcommons.usu.edu/etd/9.
Texte intégralToner-MacLean, Sally. « Emotional ramifications of adoption reunion : is there a predictable pattern of response ? » Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=78193.
Texte intégral何耀祥 et Yiu-cheung Timothy Ho. « Biotyping in Penicillium marneffei ». Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2000. http://hub.hku.hk/bib/B31969732.
Texte intégralSmith, Shelley Elizabeth. « How Does Sport Team Identification Compare to Identification with Other Social Institutions ? » TopSCHOLAR®, 2009. http://digitalcommons.wku.edu/theses/122.
Texte intégralChoi, Eric M. « The modeling and system identification of the Dynamics Identification and Control Experiment ». Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp04/mq29363.pdf.
Texte intégralCampos, Maria João Magalhães Pereira. « Identity in eHealth - from the reality of physical identification to digital identification ». Master's thesis, Faculdade de Medicina da Universidade do Porto, 2010. http://hdl.handle.net/10216/62148.
Texte intégralMustard, H. L. « Identification with stigmatised groups : does group identification lead to poor self-esteem ? » Thesis, University College London (University of London), 2013. http://discovery.ucl.ac.uk/1407498/.
Texte intégralCampos, Maria João Magalhães Pereira. « Identity in eHealth - from the reality of physical identification to digital identification ». Dissertação, Faculdade de Medicina da Universidade do Porto, 2010. http://hdl.handle.net/10216/62148.
Texte intégralLittle, Jane Kathryn. « The acquisition of gender stereotype component links ». Thesis, University of British Columbia, 1988. http://hdl.handle.net/2429/28105.
Texte intégralEducation, Faculty of
Educational and Counselling Psychology, and Special Education (ECPS), Department of
Graduate
Estrada, Luis M. « Party identification in Mexico / ». Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC IP addresses, 2005. http://wwwlib.umi.com/cr/ucsd/fullcit?p3185927.
Texte intégralHelt, Michael F. « Vegetation identification with Lidar ». Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FHelt.pdf.
Texte intégralJohnson, Richard. « Frequency domain structural identification ». Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA312408.
Texte intégralBäumer, Lars. « Identification in prediction theory ». [S.l. : s.n.], 2000. http://deposit.ddb.de/cgi-bin/dokserv?idn=959725504.
Texte intégralEllmauthaler, Andreas, et Eric Wernsperger. « Biometric Identification of Mice ». Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-1135.
Texte intégralThe identification of laboratory mice has been an important issue in pharmaceutical applications ever since tests have been performed on animals. As biometric identification has become an increasingly important issue over the past decade, attempts are underway to replace traditional identification methods, which are mostly invasive and limited in code space. This thesis discusses a project that aims at identifying mice by biometrically examining the blood vessel patterns in their ears.
In the proposed algorithm, firstly, the blood vessel structure within the obtained images got enhanced before segmenting the image in blood vessel and non-blood vessel portions. In the next step a sufficient amount of unique feature points got extracted from the segmented image. The obtained feature points were afterwards used for the actual identification procedure.
Out of 20 mice, 18 could be identified successfully using the proposed algorithm.
Brusewitz, Oskar. « Identification : Problem or opportunity ? » Thesis, Högskolan i Halmstad, Sektionen för lärarutbildning (LUT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-19905.
Texte intégralZhao, Hongdu. « Identification of redundant faults ». Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0012/MQ28468.pdf.
Texte intégralMao, Qian. « Clusters Identification : Asymmetrical Case ». Thesis, Uppsala universitet, Informationssystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-208328.
Texte intégralWangpattanasirikul, Suthipong. « Port-based system identification ». Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/39769.
Texte intégralKim, Brian A. (Brian Andrew) 1979. « Multi-source human identification ». Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/29662.
Texte intégralIncludes bibliographical references (p. 59-60).
In this thesis, a multi-source system for human identification is developed. The system uses three sources: face classifier, height classifier, and color classifier. In the process of developing this system, classifier combination and the integration of classifer outputs over sequences of data points were studied in detail. The method of classifier combination used relies on weighing classifiers based on the Maximum Likelihood estimation of class probabilities. The integration of classifer outputs, which is termed "temporal integration" in this thesis, has been developed to take advantage of the information implicitly contained in data correlated through time. In all experiments performed, temporal integration has improved classification, up to 40% in some cases. Meanwhile, the method of temporally integrating the outputs of multiple classifiers fused using our classifier weighting method outperforms all individual classifiers in the system.
by Brian A. Kim.
M.Eng.
Chen, Chun-Cheng Richard 1977. « Automated cardiovascular system identification ». Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/81537.
Texte intégralIncludes bibliographical references (p. 64-65).
by Chun-Cheng Chen.
S.B.and M.Eng.
Andrews, Isaiah Smith. « Essays in weak identification ». Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90118.
Texte intégralCataloged from PDF version of thesis.
Includes bibliographical references (pages 219-228).
Economic researchers and policymakers need reliable tools both to estimate economic relationships and to measure the uncertainty surrounding their estimates. Unfortunately, economic data sometimes contains limited information useful for estimating relationships of interest. In such cases, the statistical techniques commonly used in applied economics can break down and fail to accurately reflect the level of uncertainty present in the data. If they rely on such tools, researchers and policymakers may come away with serious misconceptions about the precision and reliability of their estimates. Econometricians refer to models where the lack of information in the data causes common statistical techniques to break down as weakly identified. In this thesis, I examine several questions relating to weak identification. In the first chapter, I introduce the class of conditional linear combination tests. These tests control size under weak identification and have a number of optimality properties in a conditional problem. I suggest using minimax regret conditional linear combination tests and propose a computationally tractable class of tests that plug in an estimator for a nuisance parameter. In the second chapter, I consider the problem of detecting weak identification. When weak identification is a concern researchers frequently calculate confidence sets in two steps, first assessing the strength of identification and then deciding whether to use an identification-robust confidence set. Two-step procedures of this sort may generate highly misleading confidence sets, and I demonstrate that two-step confidence sets based on the first stage F-statistic can have extremely poor coverage in linear instrumental variables models with heteroskedastic errors. I introduce a simple approach to detecting weak identification and constructing two-step confidence sets which controls coverage distortions. In the third chapter, joint with Anna Mikusheva, we consider minimum distance statistics and show that in a broad class of models the problem of testing under weak identification is closely related to the problem of testing a "curved null" in a finite-sample Gaussian model. Using the curvature of the model, we develop new finite-sample bounds on the distribution of minimum-distance statistics, which we show can be used to detect weak identification and to construct tests robust to weak identification.
by Isaiah Smith Andrews.
Ph. D.
Fei, Ran. « Pedestrian detection and identification ». Thesis, Imperial College London, 2014. http://hdl.handle.net/10044/1/24902.
Texte intégralBennia, Abdelhak. « Mimo systems parameters identification ». Thesis, Virginia Tech, 1986. http://hdl.handle.net/10919/41579.
Texte intégralIn this thesis, a presentation of a new canonical representation of multi-input multioutput systems is given. The new characterization covers the full range of practical situations in linear systems according to the structural properties and model of the perturbations which are known. Its direct link to ARMA processes as well as to classical state space representation ls also given.
The importance of the new representation lies in the fact that all unknown parameters and state variables appear linearly multlplied by either external variables (inputs and outputs) that appear in the data record, or by matrices that are only composed of ieroes and ones. This property enables us to perform a joint state and parameters estimation. Moreover, if the noises are gaussian and their statistics are known, an on-line algorithm that involves a standard dlscrete-time time-varying Kalman filter is proposed and used successfully in the estimation of unknown parameters for simulated examples.
Master of Science
Berdai͏̈, Abdellatif. « Identification de mélanges gaussiens ». Toulouse 3, 1994. http://www.theses.fr/1994TOU30190.
Texte intégralProschailo, A., et S. Poltavets. « Personal identification. Fingerprint recognition ». Thesis, Видавництво СумДУ, 2012. http://essuir.sumdu.edu.ua/handle/123456789/26024.
Texte intégralBrandt, Hjertstedt Eleonor. « Cybercrime Using Electronical Identification ». Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26561.
Texte intégralThis thesis investigates the threats against electronical identification, more specifically the danger that comes with the device BankID in Sweden. Today BankID is widely used but electronical identification also comes with certain security risks regarding identity related crimes. In Sweden, the crime type which increased the most last year 2018 measured in reported crimes was fraud mainly committed through information technology. This thesis therefore aim to investigate what the safety risks are using electronical identification, such as BankID and how the police force and Swedish Economic Crime Authority combat cybercrimes in this area. The result show that the main security risk with BankID is the customers that can be deceived. Perpetrators use different methods to get access to another individuals BankID. Regarding how the police force and Swedish Economic Crime Authority combat crimes against electronical identification, the result is partly defective due to that the Swedish Economic Crime Authority not being represented in this thesis. However, from the police perspective, they investigate fraud regarding BankID as all other crimes but it has in general a lower priority within the authority. The police cooperate with different actors and help both with development of the product security and inform customers about safety and risks regarding BankID.
Jaber, Mohamad. « Internet traffic profiling identification ». Nice, 2011. http://www.theses.fr/2011NICE4085.
Texte intégralThe evolution of the Internet in the last few year has been characterized by dramatic changes in the way users behave, interact and utilize the network. This was accompanied by the introduction of new categories of applications such as network games and peer-to-peer services. One of the most important challenges for network administrators and ISPs is then becoming the identification of Internet traffic applications in order to protect their resources from unwanted traffic and to prioritize some major applications. Statistical methods are preferred to port-based ones and deep packet inspection since they donât rely on the port number and they also work for encrypted traffic. Theses methods combine the statistical analysis of the application packet flow parameters, such as packet size and inter-packet time, with machine learning techniques. However, the majority of these statistical methods cannot identify flows early and require reaching the end of flows before taking any decision which is considered as too late for network administrators ; indeed they do not provide means to stop an Internet flow or to give it a special quality of service early in its lifetime. Another important challenge for network administrators is to detect and diagnose key network changes as a long-term congestion, a rerouting, a link failure or any other even causing a shift in network delays. In the literature there is a huge amount of anomaly detection methods but most of them require exhaustive measurements to function properly. Reducing the load of network-wide monitoring is always a vital need for network administrators. In this thesis we present several contributions around Internet traffic identification and network-wide anomaly detection. In the first part we present three methods we have developed in order to identify accurately and on the fly the Internet traffic. The first method is a new online iterative probabilistic method that identifies applications quickly and accurately by only using the size of the first N packets. The second method enhances the first one with the inter-packet time in order to identify Internet traffic, this has required the introduction of a model to isolate the noise due to network conditions and to extract the time generated by the applications themselves. Our third method is a new online method for traffic classification that combines the statistical and host-based approaches in order to construct a robust and precise method for early Internet traffic identification. We use the packet size as the main feature for the classification and we benefit from the traffic profile of the host (i. E. Which application and how much) to decide in favour of this or that application. In the second part of this thesis, we aboard the problem of network-wide anomaly detection. We start by making a study about the stability of Internet coordinate systems (especially Vivaldi). In a first stage we confirm the fact that Vivaldi coordinates are most of the time correlated with each other pointing to a stable cluster of nodes seen from inside the network. In a second stage, we present a new clustering algorithm based on the data mining Hierarchical Grouping method to identify this cluster of stable nodes. Finally, we highlight the utility of such finding with and application that tracks changes in network delays. By changing artificially the network delays in different scenarios, we show that these changes are easily reflected by this body of stable nodes, hence allowing to obtain a global picture about the stability of the underlying network without the need for exhaustive delay measurements
Argoul, Pierre. « Identification des structures vibrantes ». Marne-la-vallée, ENPC, 1990. https://hal-enpc.archives-ouvertes.fr/tel-04010926.
Texte intégralThe study of the identification of mechanical structures under vibration involves a double approach : the search for mechanical models representative of the observed phenomena and the search for identification techniques for these models from adapted vibratory tests. The first part of this work gives the definition of the external and internal representations of the behaviour of structures. If the external representation is based on basic mathematical theorems, which precise the form of the operator of the behaviour, the internal representation is linked to the rules of the continuum media dynamics which are recalled in a continuous form and then discretized within the frame of a variational formulation. The modelization of the linear dissipative effects is then studied using linear viscoelasticity theory. We note that the model with constant quality factor and the hysteretic one can be defined with the basic element of models using fractionnal derivatives. The second part gives an overview of some identification procedures which are classified according to the properties of the model and particularly the distinction made between parametric and non-parametric. The causality of identified systems and the risk of linking the loss of causality for a mechanical system to the possible presence of a non-linearity are amphasized. Two new identification methods are presented and tested on numerical example. The first, suitable for linear strongly damped systems, is based on the property of dynamic ampliciation of a weighted integral transform. Its computation allows an estimation of the poles and zeros of a transfer function without making any assumption on the type of real damping. The second one seeks for the best approximation of the restoring forces as a double sum of Chebyshev polynomials. This technique doesn’t make any « a priori » assumption on the structural behaviour. The proposed improvements of the interpolation and extrapolation procedures in the space yield good results when the expression of the restoring forces contains displacements-velocity or modal coupling terms
Das Studium der vibrierenden mechanischen Strukturen beinhaltet zwei Forschungsrichtungen : Die Suche nachden die beobachteten Phänomene repräsentierenden mechanischen Modellen, und die Suche nach Identifikationstechniken dieser Modelle ausgehend von experimentellen Tests. Im ersten Teil dieser Arbeit werden die externen un internen Repräsentationsformen des Strukturverhaltens definiers. Die externe Darstellung basiers auf mathematischen Grundsätzen, die die Form der Verhaltensfunktion bestimmen : wohingegen sich die interne Darstellund durch die Gesetze der Dynamik kontinuierlicher Système ausdrückt, die im Rahmen der Variationstheorie in diskretisierter Form angewendet werden. Dis Modellisierung der Streuungseffekte wird in der Form von linear Viskoelastizität studiert. Es wird gezeigt, daß hysteretische Modelle und Modelle, die konstante Qualitätsfaktoren benutzen, auf der Basis von Modellen definiert werder können, die gebrochenrationale Ableitungsfunktionen benutzen. Der zweite Teil bietet einen Überblick über die Menge der Identifikationsprozeduren. Die Klassifizierung wird gemäß der Eigenschaften der Modelle und der Unterscheidung zwischen parametrisierten und nicht parametrisierten Modellen vorgenommen. Der Schwerpunkt liegt auf den kausalen Zusammenhängen der identifizierten Systeme und auf dem Risiko der Verbindung eines Kausalitätsverlustes mit einer evtl. Vorhandenen Nichtlinearität. Zwei neue Identifikationsmethoden werden vorgestellt und an numerischen Beispielen getestet. Das erste Beispiel, der Fall eines stark gedämpften linearen Systems, basiert auf der Verstärkungseigenschaft einer integralen gewichteten Transformation. Seine Berechnung ermöglicht die Abschätzung der Pole und Nullstellen einer Übertragungsfunktion, ohne daß eine Hypothese des Dämpfungsmodells der Struktur benötiget wird. Die zweite Methode sucht nach der besten zweidimensionalen Approximation der inneren Kräfte durch Tchebyscheff Polynome. Diese Technik macht keine a priori Annahme über das Verhalten der Struktur. Die vorgeschlagenen Verbesserungen des Glättungsprozesses der inneren Kräfte im Zustandsraum ergeben gute Resultate, wenn die Beschreibung dieser Kräfte Terme enthält, die Geschwindigkeit une Deplazierung verbinden
Oliveira, Marco Alexandre Rodrigues. « Object identification within images ». Master's thesis, Universidade de Aveiro, 2009. http://hdl.handle.net/10773/2142.
Texte intégralO aumento de conteúdo digital armazenado em bases de dados é acompanhado por uma elevada importância atribuída à disponibilização de métodos eficientes para a sua pesquisa. No caso da pesquisa de imagens, esta é, normalmente, realizada através de “keywords”, o que, nem sempre garante resultados satisfatórios, uma vez que as “imagens estão para além das palavras”. Para melhorar este tema é necessário avaliar o conteúdo de cada imagem. Este trabalho propõem-se a divulgar um sistema que, inicialmente, de todas as imagens presentes numa base de dados, obtenha um conjunto de elevada qualidade para posterior processamento. Este método baseia-se na analise do histograma de cada imagem e respectiva distribuição dos contornos de cada objecto presente na mesma. A este conjunto de imagens obtido, para cada instância, são extraídas características que a identifiquem. Este passo, baseia-se na segmentação de imagens e classificação de características através de uma rede neuronal. Para testar a eficiência do método apresentado nesta tese, é feita a comparação entre as características de cada imagem com as restantes, e respectiva devolução de uma lista de imagens, ordenada por ordem decrescente de semelhança. Os nossos resultados provam que o nosso sistema pode produzir melhores resultados do que alguns sistemas existentes. ABSTRACT: The rise of digital content stored in large databases increased the importance of efficient algorithms for information retrieval. These algorithms are, usually, based on keywords which, for image retrieval, do not work properly, since “images are beyond words”. In order to improve image retrieval it is necessary to analyze the contents of each image. This work proposes a system that, firstly, will get a subset of high quality images from the entire database, which will help in further processing. This first method is based in the histogram and edge analysis. In a next method, for each element of the image set obtained, features are extracted. These features will identify each image in the database. In this step, an image segmentation technique and a classification with a neural network are used. This feature extraction process is tested doing comparison between each image features and all the target ones. Each image is associated with a list of images ordered by a similarity level, which allows us to conclude that our system produces better results than some other systems available.
Johansson, Jonathan, et Daniel Wikdahl. « Human identification with radar ». Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-34619.
Texte intégralArmstrong, Kathryn A. « Identification : a way in / ». Thesis, This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-11102009-020041/.
Texte intégral