oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 148 )

2018 ( 221 )

2017 ( 202 )

2016 ( 285 )

Custom range...

Search Results: 1 - 10 of 117901 matches for " T. Fehr "
All listed articles are free for downloading (OA Articles)
Page 1 /117901
Display every page Item
Achim Leube & Morten Hegewisch (eds.), Pr historie und Nationalsozialismus. Die mittelund osteurop ische Ur- und Fru hgeschichtsforschung in den Jahren 1933 – 1945. Studien zur Wissenschafts- und Universit tsgeschichte, Vol. 2. Heidelberg: Synchron 2002.
Hubert Fehr
Bulletin of the History of Archaeology , 2003, DOI: 10.5334/bha.13106
Abstract:
Heinz Gru nert, Gustaf Kossinna (1858–1931). Vom Germanisten zum Pr historiker. Ein Wissenschaftler im Kaiserreich und in der Weimarer Republik. Vorgeschichtliche Forschungen, Vol. 22. Rahden/Westf.: Marie Leidorf, 2002.
Hubert Fehr
Bulletin of the History of Archaeology , 2004, DOI: 10.5334/bha.14105
Abstract:
An Incentive Solution to the Peer Review Problem
Marc Hauser,Ernst Fehr
PLOS Biology , 2012, DOI: 10.1371/journal.pbio.0050107
Abstract:
Conséquences éventuelles sur la qualité des matieres grasses du lait d'une sélection sur les constituants lipidiques et la teneur azotée du lait de chèvre
D Sauvant, PM Fehr
Genetics Selection Evolution , 1974, DOI: 10.1186/1297-9686-6-4-501
Abstract:
Economic valuation of effects on health within Health Impact Assessments
Julia Nowacki,Rainer Fehr
Italian Journal of Public Health , 2007, DOI: 10.2427/5876
Abstract: Public health experts widely agree that policies, programs and projects from numerous sectors have a decided influence on health determinants, hence the surge of interest in prospective “Health Impact Assessments” (HIA). Likewise, economic considerations currently pose a major challenge throughout the field; health economists developed a range of approaches to calculate (in)direct costs of diseases, treatments etc. The question arises then, if and how can economic valuation of health effects within HIAs take place now or in the future. To investigate this issue, the Department of Public Health, University Bielefeld, along with the Institute of Public Health North-Rhine Westphalia (loegd), Germany, conducted an email-survey. The answers of 68 participating experts and practitioners from 16 countries and from international organizations showed that so far, only a small fraction of them (7%) have conducted economic valuations; more than one third (37%), however, at least sometimes discusses this option. The main obstacles seem to be: lack of knowledge about methodological details, existing uncertainties, and various problems in defining economic value for effects on health. Cost-benefit, cost-effectiveness, and cost-utility analysis were nominated most frequently as candidate methods. Participants also provided nearly 300 commentaries concerning potentials and/or risks that these economic valuations might have. This paper is mostly about the basic and quantitative results from the survey; it is planned to publish the qualitative results (with detailed discussion of the range of arguments “pro” and “con”) in a separate paper.
An Incentive Solution to the Peer Review Problem
Marc Hauser ,Ernst Fehr
PLOS Biology , 2007, DOI: 10.1371/journal.pbio.0050107
Abstract:
Composing Quantum Protocols in a Classical Environment
Serge Fehr,Christian Schaffner
Physics , 2008,
Abstract: We propose a general security definition for cryptographic quantum protocols that implement classical non-reactive two-party tasks. The definition is expressed in terms of simple quantum-information-theoretic conditions which must be satisfied by the protocol to be secure. The conditions are uniquely determined by the ideal functionality F defining the cryptographic task to be implemented. We then show the following composition result. If quantum protocols pi_1,...,pi_k securely implement ideal functionalities F_1,...,F_k according to our security definition, then any purely classical two-party protocol, which makes sequential calls to F_1,...,F_k, is equally secure as the protocol obtained by replacing the calls to F_1,...,F_k with the respective quantum protocols pi_1,...,pi_k. Hence, our approach yields the minimal security requirements which are strong enough for the typical use of quantum protocols as subroutines within larger classical schemes. Finally, we show that recently proposed quantum protocols for oblivious transfer and secure identification in the bounded-quantum-storage model satisfy our security definition, and thus compose in the above sense.
Randomness Extraction via Delta-Biased Masking in the Presence of a Quantum Attacker
Serge Fehr,Christian Schaffner
Computer Science , 2007,
Abstract: Randomness extraction is of fundamental importance for information-theoretic cryptography. It allows to transform a raw key about which an attacker has some limited knowledge into a fully secure random key, on which the attacker has essentially no information. Up to date, only very few randomness-extraction techniques are known to work against an attacker holding quantum information on the raw key. This is very much in contrast to the classical (non-quantum) setting, which is much better understood and for which a vast amount of different techniques are known and proven to work. We prove a new randomness-extraction technique, which is known to work in the classical setting, to be secure against a quantum attacker as well. Randomness extraction is done by XOR'ing a so-called delta-biased mask to the raw key. Our result allows to extend the classical applications of this extractor to the quantum setting. We discuss the following two applications. We show how to encrypt a long message with a short key, information-theoretically secure against a quantum attacker, provided that the attacker has enough quantum uncertainty on the message. This generalizes the concept of entropically-secure encryption to the case of a quantum attacker. As second application, we show how to do error-correction without leaking partial information to a quantum attacker. Such a technique is useful in settings where the raw key may contain errors, since standard error-correction techniques may provide the attacker with information on, say, a secret key that was used to obtain the raw key.
Polluter-Pays Principle Applied to Construction and Demolition Debris  [PDF]
M. Fehr, R. B. Marques, A. F. N. Pereira
Journal of Environmental Protection (JEP) , 2011, DOI: 10.4236/jep.2011.22014
Abstract: The research focused on the analysis of construction and demolition debris in a sample Brazilian city with the objective to propose a management scheme tailored to private initiative intervention. The debris was found to be produced at a rate of 1.55 kg per person per day for a total of 5177 tons per month. The composition report showed 75% material reusable for construction purposes, 15% material recyclable through reverse logistics and 10% refuse to be disposed of at landfills. The study developed legal and managerial instruments that stimulate private operators to achieve landfill diversions in the order of 90% of this waste. The arguments were supported by a flow diagram that indicates the correct destination of all waste items and an economic balance of private waste movement. Proactive legal scriptures were sketched out that can assist the local administration in setting the timeframe for reaching the diversion target.
O uso atual do solo e da água na bacia do ribeir?o Pi?arr?o-Araguari-MG-Brasil
Melo, Elizabete Oliveira;Fehr, Manfred;
Investigaciones geográficas , 2010,
Abstract: the agricultural expansion in the basin of the creek pi?arr?o during the period from 1970 to 2005 produced changes in the use of soil and water that heretofore had not been documented. a diagnosis of the present situation was carried out to evaluate the prospect of agricultural activity in the basin. the literature was reviewed, 16 rural producers were interviewed, and the creek and its tributaries were inspected. the results of the study are presented in form of maps and tables. the total area drained by the creek is 388 km2, nine pivots do the agricultural irrigation, and the creek's flow rate varies between 1.5 and 80.0 m3 per second with an annual average of 8.0 m3 per second. the study identified water availability as main limiting factor of agricultural development in the basin.
Page 1 /117901
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.