Rozprawy doktorskie na temat „Access sharing”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Access sharing”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Beiter, Bernd Michael. "Secret sharing schemes on general access structures /". Aachen : Shaker, 2008. http://d-nb.info/991819993/04.
Pełny tekst źródłaSleeper, Manya. "Everyday Online Sharing". Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/881.
Pełny tekst źródłaKaskaloglu, Kerem. "Some Generalized Multipartite Access Structures". Phd thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/2/12611965/index.pdf.
Pełny tekst źródłaKayem, Anne Voluntas dei Massah. "Adaptive Cryptographic Access Control for Dynamic Data Sharing Environments". Kingston, Ont. : [s.n.], 2008. http://hdl.handle.net/1974/1557.
Pełny tekst źródłaHe, Kun. "Content privacy and access control in image-sharing platforms". Thesis, CentraleSupélec, 2017. http://www.theses.fr/2017CSUP0007.
Pełny tekst źródłaIn recent years, more and more users prefer to share their photos through image-sharing platforms. Most of platforms allow users to specify who can access to the images, it may result a feeling of safety and privacy. However, the privacy is not guaranteed, since at least the provider of platforms can clearly know the contents of any published images. According to some existing researches, encrypting images before publishing them, and only the authorised users who can decrypt the encrypted image. In this way, user’s privacy can be protected.There are three challenges when proposing an encryption algorithm for the images published on image-sharing platforms: the algorithm has to preserve image format (e.g. JPEG image) after encryption, the algorithm should be secure (i.e. the adversary cannot get any information of plaintext image from the encrypted image), and the algorithm has to be compatible with basic image processing in each platform. In this thesis, our main goal is to propose an encryption algorithm to protect JPEG image privacy on different image-sharing platforms and overcome the three challenges. We first propose an encryption algorithm which can meet the requirements of the first two points. We then implement this algorithm on several widely-used image-sharing platforms. However, the results show that it cannot recover the plaintext image with a high quality after downloading the image from Facebook, Instagram, Weibo and Wechat. Therefore, we add the correcting mechanism to improve this algorithm, which reduces the losses of image information during uploading the encrypted image on each platform and reconstruct the downloaded images with a high quality
Brahma, Swastik Kumar. "Spectrum sharing and service pricing in dynamic spectrum access networks". Doctoral diss., University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4854.
Pełny tekst źródłaID: 030422691; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Thesis (Ph.D.)--University of Central Florida, 2011.; Includes bibliographical references (p. 161-166).
Ph.D.
Doctorate
Electrical Engineering and Computer Science
Engineering and Computer Science
Fu, Kevin E. (Kevin Edward) 1976. "Group sharing and random access in cryptographic storage file systems". Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80534.
Pełny tekst źródłaVita.
Includes bibliographical references (p. 79-83).
by Kevin E. Fu.
M.Eng.
Lee, Haeyoung. "Dynamic spectrum sharing by opportunistic spectrum access with spectrum aggregation". Thesis, University of Surrey, 2015. http://epubs.surrey.ac.uk/807078/.
Pełny tekst źródłaTercero, Vargas Miurel. "Topics in Dynamic Spectrum Access : Market Based Spectrum Sharing and Secondary User Access in Radar Bands". Licentiate thesis, KTH, Kommunikationssystem, CoS, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-33791.
Pełny tekst źródłaQC 20110523
Attia, Tarek. "Band sharing and satellite diversity techniques for CDMA". Thesis, University of Surrey, 2001. http://epubs.surrey.ac.uk/842977/.
Pełny tekst źródłaMacPherson, Lesley. "Grey Level Visual Cryptography for General Access Structures". Thesis, University of Waterloo, 2002. http://hdl.handle.net/10012/1126.
Pełny tekst źródłaMazurek, Michelle L. "A Tag-Based, Logical Access-Control Framework for Personal File Sharing". Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/325.
Pełny tekst źródłaDursun, Mustafa. "Data Sharing And Access With A Corba Data Distribution Service Implementation". Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607681/index.pdf.
Pełny tekst źródłaHultell, Johan. "Cooperative and non-cooperative wireless access : Resource and infrastructure sharing regimes". Doctoral thesis, KTH, Kommunikationssystem, CoS, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-9680.
Pełny tekst źródłaQC 20100812
Gonzalez, Sanchez Dina Pamela. "Resource Sharing and Network Deployment Games : In Open Wireless Access Markets". Licentiate thesis, KTH, Kommunikationssystem, CoS, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-39480.
Pełny tekst źródłaBany, Salameh Haythem Ahmad Mohammed. "Channel Access Mechanisms and Protocols for Opportunistic Cognitive Radio Networks". Diss., The University of Arizona, 2009. http://hdl.handle.net/10150/193865.
Pełny tekst źródłaMorrison, Heather. "The dramatic growth of open access : implications and opportunities for resource sharing". Haworth Press, 2006. http://hdl.handle.net/2429/953.
Pełny tekst źródłaKoppenhafer, Leslie. "Accounting for the Social Element in Access-Based Consumption". Thesis, University of Oregon, 2014. http://hdl.handle.net/1794/18511.
Pełny tekst źródła2015-04-17
Rakshit, Sudipta. "ACCESS GAMES: A GAME THEORETIC FRAMEWORK FOR FAIR BANDWIDTH SHARING IN DISTRIBUTED SYSTEMS". Doctoral diss., University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2444.
Pełny tekst źródłaPh.D.
School of Computer Science
Arts and Sciences
Computer Science
Sacramento, Junior Luiz Claudio Ferreira. "More than words: broader information sharing and access to the formal credit market". reponame:Repositório Institucional do FGV, 2017. http://hdl.handle.net/10438/18293.
Pełny tekst źródłaApproved for entry into archive by ÁUREA CORRÊA DA FONSECA CORRÊA DA FONSECA (aurea.fonseca@fgv.br) on 2017-05-23T19:21:16Z (GMT) No. of bitstreams: 1 Dissertation_final version.docx: 377515 bytes, checksum: c5d360cbf921b7c3982e47f2705d59f4 (MD5)
Made available in DSpace on 2017-05-30T18:56:11Z (GMT). No. of bitstreams: 1 Dissertation_final version.docx: 377515 bytes, checksum: c5d360cbf921b7c3982e47f2705d59f4 (MD5) Previous issue date: 2017-03-28
This paper shows how information sharing mechanisms might enable Micro and Small Enterprises (MSEs) to increase their access to formal credit markets. Using a unique dataset provided by the Brazilian Central Bank and Ministry of Labor, a change is applied in the threshold of loans that must be reported and shared by all active financial institutions as a gradual increase in the available information on MSEs. Results suggest that borrowers that benefited by this change obtained more loans and smaller interest rates, and by building a good client pool ended up receiving smaller maturities. Firms were also less likely to delay repayments and present smaller loan losses. This evidence sheds light on information asymmetry and literature on financial inclusion by showing that information sharing mechanisms can improve the decision to offer credit, and MSEs can become less dependent of relationship lending to obtain loans.
Esse estudo mostra como mecanismos de compartilhamento de informação podem permitir Micro e Pequenas Empresas (MPEs) podem melhorar seu acesso a mercados de crédito formais. Utilizando uma base de dados única obtida junto ao Banco Central do Brasil e Ministério do Trabalho, uma mudança é aplicada no limite do valor de empréstimos que precisam ser reportados e compartilhados por todas as instituições financeiras ativas como uma mudança gradual na informação disponível sobre MPEs. Os resultados indicam que tomadores de empréstimo que se beneficiaram dessa mudança obtiveram mais empréstimos e menores taxas de juros, e por constituir um bom grupo de clientes acabam por receber menores vencimentos. As empresas são ainda menos prováveis de atrasar seus pagamentos e apresentam menores perdas aos bancos. As consequências desse estudo lançam luz sobre a literatura de assimetria de informação e inclusão financeira ao mostrar que mecanismos de compartilhamento de informação podem auxiliar na decisão de oferecer crédito e MPEs podem se tornar menos dependentes de empréstimos de relacionamento para obter empréstimos.
Low, Marie Rose. "Self defence in open systems : protecting and sharing resources in a distributed open environment". Thesis, University of Hertfordshire, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241623.
Pełny tekst źródłaOyediran, David. "Spectrum Sharing: Overview and Challenges of Small Cells Innovation in the Proposed 3.5 GHz Band". International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596402.
Pełny tekst źródłaSpectrum sharing between Federal and commercial users is a technique proposed by the FCC and NTIA to open up the 3.5 GHz band for wireless broadband use and small cell technology is one of the candidates for its' realization. The traffic on small cells is temporal and their chances of interfering with other services in shared spectrum are limited. DoD has a documented requirement of 865 MHz by 2025 to support telemetry but only 445 MHz is presently available. DoD is conducting researches to realize test and evaluation spectrum efficient technology with the aim to develop, demonstrate, and evaluate technology components required to enable flight and ground test telemetry operations. This paper will provide an overview on spectrum sharing using small cell technology for LTE-Advanced and dynamic spectrum access would be briefly described. Research challenges for protocols and algorithms would be addressed for future studies.
Bennis, M. (Mehdi). "Spectrum sharing for future mobile cellular systems". Doctoral thesis, University of Oulu, 2009. http://urn.fi/urn:isbn:9789514260582.
Pełny tekst źródłaSohul, Munawwar Mahmud. "Spectrum Opportunity Duration Assurance: A Primary-Secondary Cooperation Approach for Spectrum Sharing Systems". Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/88018.
Pełny tekst źródłaPHD
Padaki, Aditya V. "Fundamentals of Efficient Spectrum Access and Co-existence with Receiver Nonlinearity". Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/81958.
Pełny tekst źródłaPh. D.
Bhattarai, Sudeep. "Spectrum Efficiency and Security in Dynamic Spectrum Sharing". Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/82872.
Pełny tekst źródłaPh. D.
Johansson, Klas. "Cost efficient provisioning of wireless access : infrastructure cost modeling and multi-operator resource sharing". Licentiate thesis, KTH, Skolan för elektro- och systemteknik (EES), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-580.
Pełny tekst źródłaZhang, Jie. "Impact of disk access on the performance of load sharing policies in distributed systems". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq36882.pdf.
Pełny tekst źródłaChennells, Roger Scarlin. "Equitable access to human biological resources in developing countries : benefit sharing without undue inducement". Thesis, University of Central Lancashire, 2014. http://clok.uclan.ac.uk/10634/.
Pełny tekst źródłaYu, Shucheng. "Data Sharing on Untrusted Storage with Attribute-Based Encryption". Digital WPI, 2010. https://digitalcommons.wpi.edu/etd-dissertations/321.
Pełny tekst źródłaJiang, Xueyuan. "Dynamic spectrum sharing for future wireless communications". Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:d0ce0b24-9f97-476a-bf87-dc34f1a8154e.
Pełny tekst źródłaMorelli, Vincenzo. "APostrophe WiFi Sharing". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14419/.
Pełny tekst źródłaLawrence-Kuether, Maureen Anne. "Beyond the Paywall: Examining Open Access and Data Sharing Practices Among Faculty at Virginia Tech Through the Lens of Social Exchange". Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/78236.
Pełny tekst źródłaMaster of Arts
Farhat, Soha. "Access Selection and Pricing in Multi-operator Wireless Networks". Thesis, Rennes 1, 2016. http://www.theses.fr/2016REN1S029/document.
Pełny tekst źródłaWe consider a roaming-based infrastructure sharing system, where multiple operators share their radio access in a multi-operator environment. Indeed, when the home operator of a user is unable to satisfy its constraints, because of lack of resources or QoS, a transaction event is triggered. It consists in transferring the considered user to another operator in order to access the service. Moreover, when there are more than two operators sharing their access, the user transfer process includes an access selection decision in order to choose the best operator for service. Furthermore, when a user is transferred, its home operator must pay some transaction cost as cooperation fees for the new service operator. This transaction is seamless to the user. Therefore, the inter-operators sharing agreement set for cooperation must include three important issues: the selection decision algorithm, the transaction cost pricing scenario, and the percentage of resources shared by each operator. In the first part, we introduce our selection decision algorithm in a multi-operator environment, NP-BPA (Nearest Performance and Best Profit Algorithm). It is based on a multi-criteria cost function which groups the different parameters that enable a satisfying selection decision, for the operators and users. In the second part, we study the transaction cost. We find rational that an operator sets its transaction cost as a function of its service price. We consider a sharing system of three partners, interacting to decide the best transaction cost. Taking into account that the service of a guest user may affect the probability of acceptance of a client, an operator looks for preserving the expected revenue from its client. Therefore, we propose the first pricing scenario, ACAG (As Client As Guest) that aims to set the transaction cost of an operator equal to its service price. However, every operator seeks to maximize its revenue; therefore it is expected to set a higher transaction cost. How much higher? This must respect the sharing agreement between different partners and the service prices they adopt. To be optimistic, we propose a second pricing scenario MIWC (Max In When Cooperating). With this scenario all partners agree to have a transaction cost equal to the highest service price announced in the system. But, this scenario may cause losses in some cases where an operator setting a low service price performs a lot of transactions. To be fair, we propose a third pricing scenario MCWC (Min Cost When Cooperating). With this scenario all partners agree to have a transaction cost equal to the lowest service price announced in the system. In order to decide the best pricing scenario to adopt in the sharing system, a two stage Stackelberg game, TPA (Transaction Pricing and Access Selection) game, is formulated. In this game, the operators are the players; the service operators are the leaders and the home operator of a transferred user is a follower. In the third part, we consider a three operator sharing system with hybrid access mode. In this system partners decide to share a restricted amount of their capacity. We show how the sharing factor affects the blocking rates and affect the global profits. Further, the achieved profit does not depend only on the sharing factor, but also on the adopted pricing scenario. Therefore an economic framework based on game theoretical analysis is proposed. It models the interaction between the sharing system operators for resource sharing and pricing, in addition to the access selection. A sequential game is formulated, where the players are the operators. In the first stage, the sharing partners decide the proportion of resources they will share and the transaction pricing scenario in order to maximize their own profits. In the second stage, the home operator of a transferred user selects the suitable service operator. A bi-level optimization problem is solved and equilibrium is found
Gao, Bo. "Coexistence of Wireless Networks for Shared Spectrum Access". Diss., Virginia Tech, 2014. http://hdl.handle.net/10919/50525.
Pełny tekst źródłaPh. D.
Furuskär, Anders. "Radio resource sharing and bearer service allocation for multi-bearer service, multi-access wireless networks". Doctoral thesis, KTH, Signals, Sensors and Systems, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-3502.
Pełny tekst źródłaTwo expected characteristics of future wireless networks aresupport for multiple bearer services, which in turn enablemultiple end-user services, and the parallel use of multipleradio access technologies. This dissertation discusses radioresource management principles to improve capacity for suchmulti-bearer service, multi-access networks.
More specifically, it is first focused on how to mostefficiently share the radio resource between bearer servicegroups within one access technology. A general principle forsharing resources in interference limited systems is proposed,and its expected performance estimated. The proposedinterference balancing principle maximizes capacity byadjusting the power budgets per bearer service group so thatthe maximum tolerable interference levels are equal for allbearer services. To verify its validity, the interferencebalancing principle is applied to the 3rd generation cellularsystems GSM/EDGE and WCDMA in a set of multi-bearer servicecase studies. It is seen that interference balancing maystraightforwardly be introduced in these systems, and thatsignificant capacity gains over non-balanced scenarios can beachieved.
Secondly, how to best share traffic load between thedifferent sub-systems in a multi-access scenario isinvestigated. The capability to handle bearer services, andthereby also end-user services, typically differs betweensub-systems. The overall multi-access system capacity istherefore affected by the allocation of bearer services on tosub-systems. Based on this, a simple principle for findingfavorable, under certain constraints near-optimum, sub-systembearer service allocations is derived. It is seen that for agiven service mix combined capacities beyond the sum of thesub-system capacities may be achieved by using the favorablebearer service allocations. Significant capacity gains are alsoseen in a case study in which the bearer service allocationprinciple is applied to a combined GSM/EDGE and WCDMAmulti-access system. The bearer service type may be said toreflect an expected radio resource cost for supporting a userin each sub-system. By taking into account the actual radioresource cost, which may differ from the expected cost, whenassigning users to subsystems, further capacity gains areachievable.
Bian, Kaigui. "Medium Access Control in Cognitive Radio Networks". Diss., Virginia Tech, 2011. http://hdl.handle.net/10919/37591.
Pełny tekst źródłaPh. D.
Srinivas, Preethi. "Private Key Allocation based Access Control Scheme for Social Networks". Miami University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=miami1281839737.
Pełny tekst źródłaKatsouraki, Athanasia. "Sharing and Usage Control of Personal Information". Thesis, Université Paris-Saclay (ComUE), 2016. http://www.theses.fr/2016SACLV089/document.
Pełny tekst źródłaWe are recently experiencing an unprecedented explosion of available personal data from sensors, web, social networks, etc. and so people feel exposed while they share and publish their data. There is a clear need for tools and methods to control how their data is collected managed and shared. The challenges are mainly focused on the lack of either applications or technical solutions that provide security on how to collect, manage and share personal data. The main challenge is to provide a secure and adaptable tool that can be used by any user, without technical background. This thesis makes three important contributions to the field of privacy: (i) a prototype implementation of the UCONABC model, a usage control model, applied to an online social networks scenario, (ii) an algebraic extension to UCON to control the complex sharing of data (by transforming personal data into sharable and publishable data) and (iii) the design, implementation and field testing of a secure platform to manage sensitive data collected through online forms
Hermansson, Rickard, i Johan Hellström. "Discretionary Version Control : Access Control for Versionable Documents". Thesis, KTH, Skolan för teknik och hälsa (STH), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-152815.
Pełny tekst źródłaAtt enkelt dela dokument med arbetskollegor är något alla företag har ett behov utav.Ofta är dessa dokument interna och skall hållas inom företaget. Även inom företagetkan det finnas behov av att styra vem som har rätt att läsa ellerrevidera dokumenten.Denna examensarbetesrapport beskriver olika tekniker ochmodeller för accesskon-troll, versionshantering och distribution som kan användas för att implementera ettsystem som kan lösa de nämnda problemen.Ett av kraven för systemet var ett användargränssnitt där användare kan ladda upp ochned sina dokument. Ytterligare krav var att systemet skulleversionshantera dokumenetenoch att användare skall kunna komma åt de olika versionerna.Systemet skulle ocksåkunna hantera åtkomstkontroll på dokumentnivå, något denna examensrapport definerarsom "fine grained access control".För att designa ett sådant system så utredes och utvärderades olika tekniker kringåtkomstkontroll och versionshantering samt distributionav dokumenten. För att testasystemet så utvecklads en prototyp baserad på de valda lösningsmetoderna.Den resulterande prototypen uppfyllde de mål som Nordicstation satte för projektet,dock endast med grundläggande funktionalitet. Stöd för atthämta olika versioner avdokument, kontrollera access till dokumentet nere på dokument nivå och ett webbaseratgränssnitt för att administrera dokumenten.
Houghton, David Michael. "To Have or to Hold: The Role of Psychological Ownership in the Perceived Value of Owned and Accessed Goods". OpenSIUC, 2016. https://opensiuc.lib.siu.edu/dissertations/1155.
Pełny tekst źródłaKelly, Justin. "On the Benefit of Cooperation of Secondary Users in Dynamic Spectrum Access". Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/76835.
Pełny tekst źródłaMaster of Science
Short, Patricia Margaret. "Association, reciprocity, sharing and dependency : conditions of access and forms of inequality beyond the market state /". [St. Lucia, Qld.], 2005. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe18178.pdf.
Pełny tekst źródłaAlemu, Getaneh Agegn. "The Role of Open Access in Fostering Knowledge Sharing and Collaboration in Ethiopia: a case study". Thesis, Tallinn University, 2009. http://hdl.handle.net/10919/71501.
Pełny tekst źródłaLowman, Michael. "The effectiveness of access and benefit-sharing legislation in South Africa: practical considerations for national regimes". Master's thesis, University of Cape Town, 2012. http://hdl.handle.net/11427/12090.
Pełny tekst źródłaIncludes bibliographical references.
The Convention on Biological Diversity provides an international regulatory framework for countries to develop their own access and benefit-sharing (ABS) legislation. This international convention governs the utilization of a country's genetic resources and associated traditional knowledge. Due to increased capabilities and demand from industry for these resources, a market is created over which ABS legislation is to govern. This is based on the realization of the objectives of the convention that provide for state sovereignty over a country's indigenous biological resources. This dissertation presents the results from an evaluation of ABS legislation and its implementation within South Africa. Key objectives are to analyze the implementation of regulations and procedures governing access to indigenous biological resources and traditional knowledge, and associated institutional arrangements.
Changyan, Yi. "Auction-based Spectrum Sharing in Multi-Channel Cognitive Radio Networks with Heterogeneous Users". IEEE Transactions on Vehicular Technology, 2014. http://hdl.handle.net/1993/23943.
Pełny tekst źródłaÖrn, Sagrelius Lizzie. "Fair and Equitable Participation? : A case study of access and benefit sharing processes in India and Samoa". Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-305362.
Pełny tekst źródłaPopov, Aleko Ivaylov, i Yashaswini Ravi. "Conceptualization of service loyalty in access-based services in micromobility : A case of e-scooter sharing services". Thesis, Linköpings universitet, Företagsekonomi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-166570.
Pełny tekst źródłaGiang, Truong Minh Triet, i trietgiang@yahoo com. "Efficient Admission Control Schemes in Cellular IP Networks". RMIT University. Electrical and Computer Engineering, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20060829.113000.
Pełny tekst źródłaBahrak, Behnam. "Ex Ante Approaches for Security, Privacy, and Enforcement in Spectrum Sharing". Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/24720.
Pełny tekst źródłaPh. D.