Sökresultat
Filtrera
Filtyp
Din sökning på "*" gav 535043 sökträffar
Användandet av förflyttningshjälpmedel bland äldre personer i fem Europeiska länder.
The EEM (European Excellence Model) - an Excellent Model for Management Control?
Dagens män längtar efter andra världskrigets mansideal
The Dendritic Formation of Aerosol Particles on a Single Fibre: Experiments and Simulations
Leveranssäkra distributionsnät - Vad driver utvecklingen och vem ska betala?
Financial factors and cross-border investments – An OLI perspective
IKEA - A transnational retailer. Paper accepted for AMS Retail Conference
A New Approach to Hand-eye Calibration
Territorialising Brussels: From Solving to Paralysing Belgian State Reform
Patriot Missiles
The charge state distribution of carbon beam for N2 and Ar gas stripper with terminal pumping
Education, Work and Parenthood: The Experience of Young Men and Women in Post-War Sweden
No title
Rätt svar på fel fråga. Typ III-fel vid användningen av expertkunskap
Mytiska odjur livnär sig på vår rädsla
Teaching the Classical Languages in a Changing Europe: Aims and Methods Part II
Design and Implementation of a Hybrid Control Strategy
Is anticorruption neoliberal plot? Assessming the anticorruption project in Southeast Europe
The consolidation of a global anticorruption regime can be seen has a combination of international policy instruments, ideologies about good and bad governance, and a whole set of promises, programmes and practices all intended to reduce corruption. After nearly two decades, we can give this assemblage a name: Anticorruptionism. This paper reviews the history of anticorruptionism and the current s
Some Notes on Code-Based Cryptography
This thesis presents new cryptanalytic results in several areas of coding-based cryptography. In addition, we also investigate the possibility of using convolutional codes in code-based public-key cryptography. The first algorithm that we present is an information-set decoding algorithm, aiming towards the problem of decoding random linear codes. We apply the generalized birthday technique to inf