References of "2007"
     in
Bookmark and Share    
See detailAnbilden/Umbilden – lesbar/schreibbar. Bewegte Texte bei Friedrich Schlegel, Roland Barthes u.a.
Dembeck, Till UL

in Buschmeier, Matthias; Dembeck, Till (Eds.) Textbewegungen 1800/1900 (2007)

Detailed reference viewed: 137 (1 UL)
Full Text
Peer Reviewed
See detailCommon Foundations for Belief Revision, Belief Merging and Voting
Gabbay, Dov M. UL; Pigozzi, Gabriella UL; Rodrigues, Odinaldo

in Formal Models of Belief Change in Rational Agents (2007)

In this paper, we consider a number of different ways of reasoning about voting as a problem of conciliating contradictory interests. The mechanisms that do the reconciliation are belief revision and be ... [more ▼]

In this paper, we consider a number of different ways of reasoning about voting as a problem of conciliating contradictory interests. The mechanisms that do the reconciliation are belief revision and be- lief merging. By investigating the relationship between different voting strategies and their associated counterparts in revision theory, we find that whereas the counting mechanism of the voting process is more easily done at the meta-level in belief merging, it can be brought to the object level in base revision. In the former case, the counting can b e tweaked according to the aggregation procedure used, whereas in base revision, we can only rely on the notion of minimal change and hence the syntactical representation of the voters’ preferences plays a crucial part in the process. This highlights the similarities between the revi sion approaches on the one hand and voting on the other, but also opens up a numb er of interesting questions. [less ▲]

Detailed reference viewed: 68 (0 UL)
See detailProceedings of the XXVI Workshop on Geometrical Methods in Physics AIP Conference Proceedings / Mathematical and Statistical Phsyics
Kielanowski, Piotr; Odzijewicz, Anatol; Schlichenmaier, Martin UL et al

Book published by American Institute of Physics (2007)

Detailed reference viewed: 73 (0 UL)
Full Text
See detailKrieg in der Antiken Welt
Mandl, Gerfried; Steffelbauer, Ilja; Kolnberger, Thomas UL

Book published by Mangus Verlag (2007)

Detailed reference viewed: 76 (4 UL)
See detailComment fontionne le système scolaire luxembourgeois? PISA 2006
Martin, Romain UL; Brunner, Martin UL; Keller, Ulrich UL et al

in Rapport National Luxembourg (2007)

Detailed reference viewed: 143 (2 UL)
See detailHegel und der Empirismus
Heidemann, Dietmar UL

in Heidemann, Dietmar (Ed.) Hegel und die Geschichte der Philosophie (2007)

Detailed reference viewed: 169 (0 UL)
See detailSchriftkultur und Schwellenkunde
Geisenhanslüke, Achim; Mein, Georg UL

Book published by Transcript (2007)

Detailed reference viewed: 208 (0 UL)
Full Text
Peer Reviewed
See detailCollaborative Filtering in Artefact-based m-Learning Environments
Hoff, Christian; Gratz, Patrick UL; Rothkugel, Steffen UL

in International Workshop on Mobile and Ubiquitous Learning Environments (MULE 2007) held in conjunction with 15th International Conference on Computers in Education (ICCE 2007) (2007)

Detailed reference viewed: 72 (5 UL)
Peer Reviewed
See detailCryptographie à Clef Publique
Dumas, J.-G.; Leprévost, Franck UL; Roch, Jean-Louis et al

in Ebrahimi, Touradj; Leprévost, Franck; Warusfel, Bertrand (Eds.) Cryptographie et sécurité des systèmes et réseaux, 2 (2007)

Les briques de construction des systèmes sécurisés d'information font appel aux notions de cryptologie, qui recouvre la cryptographie (la construction de cryptosystèmes) et la cryptanalyse (la recherche ... [more ▼]

Les briques de construction des systèmes sécurisés d'information font appel aux notions de cryptologie, qui recouvre la cryptographie (la construction de cryptosystèmes) et la cryptanalyse (la recherche de failles dans les cryptosystèmes). Les cryptosystèmes reposent sur le principe de Kerckhoff, qui affirme que la sécurité d'un cryptosystème ne doit pas reposer sur l'ignorance de l'algorithme pour sa mise en œuvre, mais sur l'ignorance que l'attaquant a d'une information secrète. Ce volume, organisé en chapitres indépendants, traite de la cryptographie à clef secrète, en particulier de l'AES, et des méthodes de cryptanalyse linéaire et différentielle , de la cryptographie à clef publique, en particulier de RSA, du protocole d'échange de clefs de Diffie-Hellman, et des signatures électroniques. Il assemble ces briques de construction dans le cadre des architectures à clef publique (X.509, PGP, DNSSEC) et traite de la sécurité des systèmes (essentiellement Unix), et des réseaux. [less ▲]

Detailed reference viewed: 289 (1 UL)
See detailKapitel 25: Kommunikation zwischen Zellen: Extrazelluläre Signalmoleküle, Rezeptoren und Signaltransduktion
Heinrich, Peter C.; Haan, Serge UL; Hermanns, Heike M. et al

in Löffler, Georg; Petrides, P. E.; Heinrich, Peter C. (Eds.) Biochemie und Pathobiochemie (2007)

Detailed reference viewed: 157 (2 UL)
Full Text
Peer Reviewed
See detailNatural dualities for varieties generated by a set of subalgebras of a semi-primal algebra
Mathonet, Pierre UL; Niederkorn, Philippe; Teheux, Bruno UL

in Algebra and Discrete Mathematics (2007), (1), 67--85

Detailed reference viewed: 216 (15 UL)
See detailAspekte männlicher Kindheit: Ein visuelles Experiment
Priem, Karin UL

in PÄD-Forum (2007), 35/26(3), 155-157

Detailed reference viewed: 97 (0 UL)
Full Text
Peer Reviewed
See detailDealing with requirements: Influences on Idea Generation in the Early Stages of Product Development
Gericke, Kilian UL; Schmidt-Kretschmer, Michael; Blessing, Lucienne UL

in Proceedings of DTRS7: Design Meeting Protocols (2007)

This paper aims at identifying factors which influence the number of ideas generated during a brainstorming meeting as part of an industrial mechanical engineering design project. A framework for ... [more ▼]

This paper aims at identifying factors which influence the number of ideas generated during a brainstorming meeting as part of an industrial mechanical engineering design project. A framework for describing groups of influencing factors and their relationships is used. As a result of an explorative, comparative protocol analysis of two design meetings the influence of some factors is described e.g. the formulation of the design task description and the sequence of the process steps. [less ▲]

Detailed reference viewed: 178 (1 UL)