Rozprawy doktorskie na temat „Threshold”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Threshold”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Amankonah, Frank O. "Thresholds for peak-over-threshold theory". abstract and full text PDF (free order & download UNR users only), 2005. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1433281.
Pełny tekst źródłaMonti, Oliver A. L. "Crossing thresholds : Rydberg-tagging and near-threshold photodissociation". Thesis, University of Oxford, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.365747.
Pełny tekst źródłaFinos, Marisa. "THRESHOLD". VCU Scholars Compass, 2014. http://scholarscompass.vcu.edu/etd/3374.
Pełny tekst źródłaDolan, Halil Ramazan. "Urban Threshold". Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/34372.
Pełny tekst źródłaMaster of Architecture
Saito, Ryohei. "Inhabitants Within Threshold (Threshold as Antidote for Urban Density)". Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/30976.
Pełny tekst źródłaMaster of Architecture
Carruthers, David Robert James. "Quantal threshold ionisation". Thesis, Queen's University Belfast, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.333786.
Pełny tekst źródłaJarecki, StanisÅ aw (StanisÅ aw Michal) 1971. "Efficient threshold cryptosystems". Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/8370.
Pełny tekst źródłaIncludes bibliographical references (p. 181-189).
A threshold signature or decryption scheme is a distributed implementation of a cryptosystem, in which the secret key is secret-shared among a group of servers. These servers can then sign or decrypt messages by following a distributed protocol. The goal of a threshold scheme is to protect the secret key in a highly fault-tolerant way. Namely, the key remains secret, and correct signatures or decryptions are always computed, even if the adversary corrupts less than a fixed threshold of the participating servers. We show that threshold schemes can be constructed by putting together several simple distributed protocols that implement arithmetic operations, like multiplication or exponentiation, in a threshold setting. We exemplify this approach with two discrete-log based threshold schemes, a threshold DSS signature scheme and a threshold Cramer-Shoup cryptosystem. Our methodology leads to threshold schemes which are more efficient than those implied by general secure multi-party computation protocols. Our schemes take a constant number of communication rounds, and the computation cost per server grows by a factor linear in the number of the participating servers compared to the cost of the underlying secret-key operation. We consider three adversarial models of increasing strength. We first present distributed protocols for constructing threshold cryptosystems secure in the static adversarial model, where the players are corrupted before the protocol starts. Then, under the assumption that the servers can reliably erase their local data, we show how to modify these protocols to extend the security of threshold schemes to an adaptive adversarial model,
(cont.) where the adversary is allowed to choose which servers to corrupt during the protocol execution. Finally we show how to remove the reliable erasure assumption. All our schemes withstand optimal thresholds of a minority of malicious faults in a realistic partially-synchronous insecure-channels communication model with broadcast. Our work introduces several techniques that can be of interest to other research on secure multi-party protocols, e.g. the inconsistent player simulation technique which we use to construct efficient schemes secure in the adaptive model, and the novel primitive of a simultaneously secure encryption which provides an efficient implementation of private channels in an adaptive and erasure-free model for a wide class of multi-party protocols. We include extensions of the above results to: (1) RSA-based threshold cryptosystems; and (2) stronger adversarial models than a threshold adversary, namely to proactive and creeping adversaries, who, under certain assumptions regarding the speed and detectability of corruptions, are allowed to compromise all or almost all of the participating servers.
by StanisÅaw Jarecki.
Ph.D.
Scofield, Sarah. "Threshold: intermediary place". Thesis, Virginia Polytechnic Institute and State University, 1998. http://hdl.handle.net/10919/53448.
Pełny tekst źródłaMaster of Architecture
Park, Sangyoon. "Threshold of Refuge". Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/85105.
Pełny tekst źródłaMaster of Architecture
Roth, Hillary Grace. "Sensing the Threshold". Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/24427.
Pełny tekst źródłaMaster of Architecture
KONG, CHERN CHIAT. "Memorializing the Threshold". University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1212170967.
Pełny tekst źródłaWeihrer, Sylvia J. "Changes in blood lactate concentration during active recovery at sub-lactate threshold, lactate threshold, and supra-lactate threshold exercise intensities". Thesis, University of Ottawa (Canada), 1991. http://hdl.handle.net/10393/7892.
Pełny tekst źródłaHejduk, Jason Thomas. "A Threshold of Order". Thesis, Virginia Tech, 2000. http://hdl.handle.net/10919/35780.
Pełny tekst źródłaA building that acts as a boundary becomes a type of wall, having two very pragmatic sides. Therefore, in this case, these elements must also function as a filter. The challenge is to design a boundary or an edge condition which defines the site, in addition to framing the views and allowing people to pass through these thresholds.
Likewise, circulation also helps to structure the site. The designed buildings allow for persons to pass along as well as to pass through. The elements placed onto the site allow for both formal and direct paths through the site, as well as more general and autonomous approaches to the stadium, located on the edge of the site.
Master of Architecture
Hameed, Rabeea. "Threshold to the Sacred". Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/42872.
Pełny tekst źródłaMaster of Architecture
Huggins, Jeremy James. "Definition of a threshold". Thesis, Virginia Polytechnic Institute and State University, 1990. http://hdl.handle.net/10919/52100.
Pełny tekst źródłaMaster of Architecture
Kwok, Frankie Ho Yin 1969 Carleton University Dissertation Computer Science. "Threshold designated confirmer signature". Ottawa.:, 1996.
Znajdź pełny tekst źródłaClark, Carol Lea. "Crossing the writing threshold". CSUSB ScholarWorks, 1991. https://scholarworks.lib.csusb.edu/etd-project/840.
Pełny tekst źródłaGonzaga, Paul Vincent. "Sacred Threshold: An Examination of the Threshold in a Catholic Church for Hispanic Immigrants". Thesis, Virginia Tech, 1998. http://hdl.handle.net/10919/29181.
Pełny tekst źródłaThe spiritual journey made concrete is the concern of this project. The Christian life, grossly simplified, is a passage from one place to another. The believer is constantly passing through the threshold from this life to the next, from an old, limited understanding of the divine to a new understanding.
In the Catholic Church, this process of passage is ritualized in the journey of the believer to the church each Sunday. Upon entering the church building, the believer passes from the secular and mundane to the sacred and holy.
Where does the secular end and the sacred begin? How does one delimit a boundary between the two? How does one cross the threshold from the profane to the sacred? That is the focus of this project.
Master of Architecture
Gao, Yong. "Threshold phenomena in NK landscapes". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ60428.pdf.
Pełny tekst źródłaZeineh, Rami. "Adaptive threshold Monte Carlo localization". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ61962.pdf.
Pełny tekst źródłaGubatan, Portia Lynn. "Cinematic Threshold-Peachtree Center Mall". Thesis, Georgia Institute of Technology, 1993. http://hdl.handle.net/1853/23458.
Pełny tekst źródłaYeung, Miu Han Iris. "Continuous time threshold autoregressive model". Thesis, University of Kent, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.328661.
Pełny tekst źródłaHall, Amanda Jane. "Otoacoustic emissions and hearing threshold". Thesis, University of Southampton, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.415231.
Pełny tekst źródłaShinners-Kennedy, Dermot. "Threshold concepts and teaching programming". Thesis, University of Kent, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.652021.
Pełny tekst źródłaHopkins, John-Mark. "Compact, low-threshold femtosecond lasers". Thesis, University of St Andrews, 1999. http://hdl.handle.net/10023/14314.
Pełny tekst źródłaJohansson, Håkan. "Secret Sharing with Threshold Schemes". Thesis, Linnéuniversitetet, Institutionen för matematik (MA), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97619.
Pełny tekst źródłaMiller, Jeffrey Rush. "Barrier and Threshold in Architecture". Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/35007.
Pełny tekst źródłaMaster of Architecture
Huang, Zhibin. "Threshold Phenomena in Soft Matter". Case Western Reserve University School of Graduate Studies / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=case1203960292.
Pełny tekst źródłaStettler, John. "The Discrete Threshold Regression Model". The Ohio State University, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=osu1440369876.
Pełny tekst źródłaOsmond, J. "Identifying threshold concepts in design". Thesis, Coventry University, 2014. http://curve.coventry.ac.uk/open/items/725e09d0-de02-4ef6-be34-da7909983438/1.
Pełny tekst źródłaHuber, Florian, i Thomas Zörner. "Threshold cointegration and adaptive shrinkage". WU Vienna University of Economics and Business, 2017. http://epub.wu.ac.at/5577/1/wp250.pdf.
Pełny tekst źródłaSeries: Department of Economics Working Paper Series
Kasprowicz, Tomasz. "Threshold Theory--modelling risk attitude /". Available to subscribers only, 2008. http://proquest.umi.com/pqdweb?did=1650506301&sid=11&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Pełny tekst źródłaVolkan, Ani Kristine. "The Door in the Threshold". Digital Commons @ East Tennessee State University, 2010. https://dc.etsu.edu/etd/1675.
Pełny tekst źródłaLEPORATI, ALBERTO OTTAVIO. "Threshold Circuits and Quantum Gates". Doctoral thesis, Università degli Studi di Milano, 2003. http://hdl.handle.net/10281/43616.
Pełny tekst źródłaRobison, Heidi Joan. "Phonation Threshold Pressure and Phonation Threshold Flow in Rabbits Treated With Inhaled Corticosteroids Versus Controls". BYU ScholarsArchive, 2021. https://scholarsarchive.byu.edu/etd/8936.
Pełny tekst źródłaBilodeau, René Claude. "Single- and multiphoton studies of atomic negative ions : electron affinities, threshold laws, and near-threshold structure /". *McMaster only, 2001.
Znajdź pełny tekst źródłaChoi, Chiu Yee. "A multivariate threshold stochastic volatility model /". View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?MATH%202005%20CHOI.
Pełny tekst źródłaCarroll, Michael. "Paper threshold, the drawings of Michelangelo". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ50683.pdf.
Pełny tekst źródłaBanschbach, David C. "Optimizing systems of threshold detection sensors". Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FBanschbach.pdf.
Pełny tekst źródłaThesis Advisor(s): Fricker, Ronald D. "March 2008." Description based on title screen as viewed on April 28, 2008. Includes bibliographical references (p. 59-62). Also available in print.
Maciel, Alexis. "Threshold circuits of small majority-depth". Thesis, McGill University, 1995. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=28830.
Pełny tekst źródłaThese circuits are usually studied by measuring their efficiency in terms of their total depth. Using this point of view, the best division and iterated multiplication circuits have depth three and four, respectively.
In this thesis, we propose a different approach. Since threshold gates are much more powerful than AND-OR gates, we allow the explicit use of AND-OR gates and consider the main measure of complexity to be the majority-depth of the circuit, i.e. the maximum number of threshold gates on any path in the circuit. Using this approach, we obtain division and iterated multiplication circuits of total depth four and five, but of majority-depth two and three.
The technique used is called Chinese remaindering. We present this technique as a general tool for computing functions with integer values and use it to obtain depth-four threshold circuits of majority-depth two for other arithmetic problems such as the logarithm and power series approximation. We also consider the iterated multiplication problem for integers modulo q and for finite fields.
The notion of majority-depth naturally leads to a hierarchy of subclasses of TC$ sp0$. We investigate this hierarchy and show that it is closely related to the usual depth hierarchy.
Carroll, Michael 1964. "Paper threshold : the drawings of Michelangelo". Thesis, McGill University, 1998. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=21338.
Pełny tekst źródłaTeh, Yih-Choung. "Threshold routing strategies for queueing networks". Thesis, University of Oxford, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.302108.
Pełny tekst źródłaMaggs, A. C. "Critical dynamics at the percolation threshold". Thesis, University of Oxford, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.355762.
Pełny tekst źródłaMaurer, Christopher L. "Iran: the next nuclear threshold state?" Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/43952.
Pełny tekst źródłaA nuclear threshold state is one that could quickly operationalize its peaceful nuclear program into one capable of producing a nuclear weapon. This thesis compares two known threshold states, Japan and Brazil, with Iran to determine if the Islamic Republic could also be labeled a threshold state. Furthermore, it highlights the implications such a status could have on U.S. nonproliferation policy. Although Iran's nuclear program is mired in controversy, it relates to those of Japan and Brazil. While not maintaining as robust of a program and often conflicting with the international community, Iran has the capabilities to produce weapons grade material and could be considered a nuclear threshold state. Dozens of countries in the world have similar nuclear capabilities and maintain the Nuclear Non-Proliferation Treaty rights to advance their nuclear programs so long as they are peacefully applied. Unfortunately for nonproliferation advocates, these capabilities make fuel for both energy and weapons. To prevent proliferation and eliminate the world’s nuclear weapons arsenal, the United States will need to alter its policy and convince the world that nuclear weapons should be abolished. Although this task includes a multitude of variables, incremental steps can be taken toward the administration’s final goal.
Loughan, Arlene M. "Above and below the Wannier threshold". Thesis, Queen's University Belfast, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268183.
Pełny tekst źródłaKheradmandnia, Manouchehr. "Aspects of Bayesian threshold autoregressive modelling". Thesis, University of Kent, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.303040.
Pełny tekst źródłaMooney, Jean. "Diurnal variation of threshold skin sensation". Thesis, University College London (University of London), 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.392364.
Pełny tekst źródłaFarmani, Mohammad. "Threshold Implementations of the Present Cipher". Digital WPI, 2017. https://digitalcommons.wpi.edu/etd-theses/1024.
Pełny tekst źródłaAdam, Elie M. "On threshold models over finite networks". Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/74899.
Pełny tekst źródłaCataloged from PDF version of thesis.
Includes bibliographical references (p. 109-110).
We study a model for cascade effects over finite networks based on a deterministic binary linear threshold model. Our starting point is a networked coordination game where each agent's payoff is the sum of the payoffs coming from pairwise interaction with each of the neighbors. We first establish that the best response dynamics in this networked game is equivalent to the linear threshold dynamics with heterogeneous thresholds over the agents. While the previous literature has studied such linear threshold models under the assumption that each agent may change actions at most once, a study of best response dynamics in such networked games necessitates an analysis that allows for multiple switches in actions. In this thesis, we develop such an analysis and construct a combinatorial framework to understand the behavior of the model. To this end, we establish that the agents behavior cycles among different actions in the limit and provide three sets of results. We first characterize the limiting behavioral properties of the dynamics. We determine the length of the limit cycles and reveal bounds on the time steps required to reach such cycles for different network structures. We then study the complexity of decision/counting problems that arise within the context. Specifically, we consider the tractability of counting the number of limit cycles and fixed-points, and deciding the reachability of action profiles. We finally propose a measure of network resilience that captures the nature of the involved dynamics. We prove bounds and investigate the resilience of different network structures under this measure.
by Elie M. Adam.
S.M.
Mota, Pedro José dos Santos Palhinhas. "Brownian motion with drift threshold model". Doctoral thesis, FCT - UNL, 2008. http://hdl.handle.net/10362/1766.
Pełny tekst źródłaEuropean Community's Human Po-tential Programme under contract HPRN-CT-2000-00100, DYNSTOCH and by PRODEP III (medida 5 - Acção 5.3)