Дисертації з теми "Bounded theory"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Bounded theory".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Mavra, Boris. "Bounded geometry index theory." Thesis, University of Oxford, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.318820.
Wienhard, Anna Katharina. "Bounded cohomology and geometry." Bonn : Mathematisches Institut der Universität, 2004. http://catalog.hathitrust.org/api/volumes/oclc/62768224.html.
Strömberg, Roland. "Spectral Theory for Bounded Self-adjoint Operators." Thesis, Uppsala University, Department of Mathematics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-121364.
Heckman, Christopher Carl. "Independent sets in bounded degree graphs." Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/29163.
Pallekonda, Seshendra. "Bounded category of an exact category." Diss., Online access via UMI:, 2008.
Seabright, Paul. "Bounded beliefs and Keynesian speculation." Thesis, University of Oxford, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.328011.
Köhler, Jonathan Hugh. "Bounded rationality in savings decisions." Thesis, University of York, 1996. http://etheses.whiterose.ac.uk/10878/.
Reina, Livia. "From Subjective Expected Utility Theory to Bounded Rationality." Doctoral thesis, Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2006. http://nbn-resolving.de/urn:nbn:de:swb:14-1140624885934-50567.
Kneeland, Terri. "Bounded rationality in games : theory, experiments, and applications." Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/44573.
Jones, Matthew Thomas. "Essays on Bounded Rationality in Applied Game Theory." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1337782631.
Yi, Hyun Chang. "Essays in economic theory." Thesis, University of Exeter, 2014. http://hdl.handle.net/10871/15246.
Smith, Justin N. "Computational complexity, bounded rationality and the theory of games." Thesis, University of Oxford, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.365642.
Baker, Joseph O., Christopher D. Bader, and F. Carson Mencken. "A Bounded Affinity Theory of Religion and the Paranormal." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etsu-works/500.
Wu, Dong-Nan. "Active bounded-state vibration control for structural applications." Diss., Georgia Institute of Technology, 1995. http://hdl.handle.net/1853/12326.
Georgiou, Phokion 'Ion' Sotirios. "Dogmatism and bounded rationality : a systemic epistemology for system theory." Thesis, Lancaster University, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.420564.
Chis, Cristina. "Bounded sets in topological groups." Doctoral thesis, Universitat Jaume I, 2010. http://hdl.handle.net/10803/10502.
In the second part of the paper, we apply duality methods in order to obtain estimations of the size of a local base for an important class of groups. This translation, which has been widely exhibited in the Pontryagin-van Kampen duality theory of locally compact abelian groups, is often very relevant and has been extended by many authors to more general classes of topological groups. In this work we follow basically the pattern and terminology given by Vilenkin in 1998.
Dawson, Dan Paul. "Concerning Integral Approximations of Bounded Finitely Additive Set Functions." Thesis, University of North Texas, 1992. https://digital.library.unt.edu/ark:/67531/metadc332650/.
Ilg, Matthias. "An investigation of spatially bounded, time independent quantum systems." Thesis, Georgia Institute of Technology, 1991. http://hdl.handle.net/1853/28046.
Casas, i. Klett Tomas. "K-efficiency theory of entrepreneurship : random payoffs, biases and bounded luck /." [St. Gallen] : [s.n.], 2005. http://www.gbv.de/dms/zbw/503222127.pdf.
Goosen, Gerrit. "Relational representations for bounded lattices with operators." Thesis, Stellenbosch : University of Stellenbosch, 2010. http://hdl.handle.net/10019.1/4343.
ENGLISH ABSTRACT: Within lattice theory, an interesting question asked is whether a given abstract lattice may be represented concretely as subsets of a closure system on a topological space. This is true for boolean algebras, bounded distributive lattices and arbitrary bounded lattices. In particular, there are a multitude of ways to represent bounded lattices. We present some of these ideas, as well as an analysis of the differences between them. We further investigate the attempts that were made to extend the above representations to lattices endowed with operators, in particular the work done on bounded distributive lattices with operators. We then make a new contribution by extending this work to arbitrary bounded lattices with operators. We also show that the so-called sufficiency operator has a relational representation in the bounded lattice case.
AFRIKAANSE OPSOMMING: Binne die raamwerk van tralie teorie word die vraag soms gevra of ’n gegewe tralie konkreet veteenwoordig kan word as subversamelings van ’n afsluitingssisteem op ’n topologiese ruimte. Die voorgenoemde is waar vir, onder andere, boolse algebras, begrensde distributiewe tralies en algemene begrensde tralies. Daar is veral vir begrensde tralies menigte maniere om hul te verteenwoordig. Ons bied sommige van hierdie idees voor, asook ’n analiese van die verskille daarin teenwoordig. Verder ondersoek ons ook sommige van die maniere waarop tralies tesame met operatore verteenwoordig kan word. Ons sal spesiale aandag gee aan distributiewe tralies met operatore, soos gedoen in, met die idee om die voorgenoemde uit te brei na algemene begrensde tralies met operatore. Ons toon dan verder aan dat die sogenoemde voldoende operator ook ’n relasionele verteenwoordiging het in die begrensde tralie geval.
Roomets, Alex Wagner. "Testing and Refining Strategic Decision Theory." Diss., The University of Arizona, 2011. http://hdl.handle.net/10150/202513.
Shan, Xu Yi. "Bounded feedback and structural issues in linear multivariable systems." Thesis, City University London, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.316131.
Rossi, Louis Frank, and Louis Frank Rossi. "A spreading blob vortex method for viscous bounded flows." Diss., The University of Arizona, 1993. http://hdl.handle.net/10150/186562.
Iourtchenko, Daniil V. "Optimal bounded control and relevant response analysis for random vibrations." Link to electronic thesis, 2001. http://www.wpi.edu/Pubs/ETD/Available/etd-0525101-111407.
Keywords: Stochastic optimal control; dynamic programming; Hamilton-Jacobi-Bellman equation; Random vibration. Keywords: Stochastic optimal control; dynamic programming; Hamilton-Jacobi-Bellman equation; Random vibration; energy balance method. Includes bibliographical references (p. 86-89).
Wang, Xin. "Bounded Multiattribute Utility in Behavioral Decision Research: Theory, Estimation and Experimental Tests." University of Cincinnati / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1406821794.
Fukihara, Yoji. "Generalization of Bounded Linear Logic and its Categorical Semantics." Doctoral thesis, Kyoto University, 2021. http://hdl.handle.net/2433/263441.
Merz, Florian [Verfasser], and C. [Akademischer Betreuer] Sinz. "Theory and Implementation of Software Bounded Model Checking / Florian Merz ; Betreuer: C. Sinz." Karlsruhe : KIT-Bibliothek, 2016. http://d-nb.info/1122461615/34.
Turcu, George R. "Hypercyclic Extensions Of Bounded Linear Operators." Bowling Green State University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1386189984.
Allen, Robert Francis. "A class of operators with symbol on the bloch space of a bounded homogeneous domain." Fairfax, VA : George Mason University, 2009. http://hdl.handle.net/1920/4541.
Vita: p. 158. Thesis director: Flavia Colonna. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Mathematics. Title from PDF t.p. (viewed Oct. 11, 2009). Includes bibliographical references (p. 150-157). Also issued in print.
Lee, Penagos Luis Alejandro. "Understanding behaviour through the lens of bounded rationality : experiments with human and artificial agents." Thesis, University of Nottingham, 2017. http://eprints.nottingham.ac.uk/42418/.
HELMICK, MICHAEL T. "EFFICIENT GROUP COMMUNICATION AND THE DEGREE-BOUNDED SHORTEST PATH PROBLEM." University of Cincinnati / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1178810750.
Zhang, Luyao. "Bounded Rationality and Mechanism Design." The Ohio State University, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=osu1532692312980569.
Cao, Cung Economics Australian School of Business UNSW. "Asymmetric and imperfect knowledge: a proposal to replace unbounded rationality with bounded rationality." Awarded by:University of New South Wales. School of Economics, 2007. http://handle.unsw.edu.au/1959.4/27025.
Watson, Philip David. "The theory of cutting and packing of non-interlocking shapes in a bounded region." Thesis, University of Birmingham, 1997. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.752400.
Modarres-Mousavi, Shabnam. "Methodological Foundations for Bounded Rationality as a Primary Framework." Diss., Virginia Tech, 2002. http://hdl.handle.net/10919/30225.
Ph. D.
Lu, Lei 1975. "Essays on asset pricing with heterogeneous beliefs and bounded rational investor." Thesis, McGill University, 2007. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=103267.
Hussein, Amru [Verfasser]. "Spectral theory of differential operators on finite metric graphs and on bounded domains / Amru Hussein." Mainz : Universitätsbibliothek Mainz, 2013. http://d-nb.info/1041292287/34.
Sanjab, Anibal Jean. "Security of Cyber-Physical Systems with Human Actors: Theoretical Foundations, Game Theory, and Bounded Rationality." Diss., Virginia Tech, 2018. http://hdl.handle.net/10919/86204.
Ph. D.
Enhancing the efficiency, sustainability, and resilience of cities, infrastructure, and industrial systems is contingent on their transformation into more interactive and interconnected smart systems. This has led to the emergence of what is known as cyber-physical systems (CPSs). CPSs are widescale distributed and interconnected systems integrating physical components and humans via a cyber layer that enables sensing, connectivity, and data processing. Some of the most prominent examples of CPSs include the smart electric grid, smart cities, intelligent transportation systems, and the Internet of Things. The seamless interconnectivity between the various elements of a CPS introduces a wealth of operational benefits. However, this wide-scale interconnectivity and ubiquitous integration of cyber technologies render CPSs vulnerable to a range of security threats as manifested by recently reported security breaches in a number of CPS application domains. Addressing these culminating security challenges requires the development and implementation of fool-proof defense strategies grounded in solid theoretical foundations. To this end, the central goal of this dissertation is to enhance the security of CPSs by advancing novel analytical frameworks which tightly integrate the cyber, physical, and human elements of a CPS. The developed frameworks and tools enable the derivation of holistic defense strategies by: a) Characterizing the security interdependence between the various elements of a CPS, b) Quantifying the consequences of possible attacks on a CPS and the effectiveness of any implemented defense mechanism, c) Modeling the multi-agent interactions in CPSs, involving humans and automated systems, which have a direct effect on the security state of the system, and d) Capturing the role that human perceptions and decision making processes play in the security of CPSs. The developed tools and performed analyses integrate the engineering principles of CPSs with the mathematical concepts of game theory and human behavioral models and introduce key contributions to a number of CPS application domains such as the smart electric grid and drone systems. The introduced results enable strengthening the security of CPSs, thereby paving the way for their wide-scale adoption in smart cities and critical infrastructure.
Mubeen, Faizalam Junaid. "The bounded H∞ calculus for sectorial, strip-type and half-plane operators." Thesis, University of Oxford, 2011. https://ora.ox.ac.uk/objects/uuid:6bff352d-f858-492a-a00b-3a3dd2049b5c.
Kaye-Blake, William Henry. "Demand for genetically modified food : theory and empirical findings." Phd thesis, Lincoln University. Commerce Division, 2006. http://theses.lincoln.ac.nz/public/adt-NZLIU20060913.102217.
Reinwand, Simon [Verfasser], Jürgen [Gutachter] Appell, Daria [Gutachter] Bugajewska, and Gianluca [Gutachter] Vinti. "Functions of Bounded Variation: Theory, Methods, Applications / Simon Reinwand ; Gutachter: Jürgen Appell, Daria Bugajewska, Gianluca Vinti." Würzburg : Universität Würzburg, 2021. http://d-nb.info/1232647632/34.
Hokamp, Samuel A. "Weak*-Closed Unitarily and Moebius Invariant Spaces of Bounded Measurable Functions on a Sphere." Bowling Green State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1562943150719334.
Ryan, Mark Joseph 1978. "A Satisficing Model of Consumer Behavior." Thesis, University of Oregon, 2011. http://hdl.handle.net/1794/12095.
I develop a model in which a representative consumer selects an affordable consumption bundle, not as a single choice, but as the end result of a series of smaller, incremental purchase decisions. If the array of such incremental choices facing the consumer is sufficiently complex relative to the consumer's computational abilities, then the consumer may choose to employ a simplifying heuristic or rule-of-thumb to guide her behavior. I demonstrate the existence of a simple and well-defined example of such a strategy, based upon a satisficing decision rule. I further show that in the strategic setting defined by the interaction between consumers and firms that compete in prices, this satisficing strategy can form part of a Nash equilibrium, despite being ex ante only boundedly rational. The use of this satisficing demand strategy fundamentally alters the nature of price competition between firms (relative to the standard Bertrand model), changing the shape of the firm best response functions. The use of a satisficing strategy alters the incentives of firms, and these altered firm incentives lead to pricing behavior which has the effect of rationalizing the satisficing consumption strategy, so that a truly novel class of Nash equilibria in price-competing markets can be shown to exist under certain conditions. We explore the nature of this new class of equilibria, and find that equilibrium prices may be higher than those which would be obtained in the standard Bertrand case. In general, demand curves for each distinct good will have a kinked shape, similar to those found in 1939 papers by both Sweezy and Hall & Hitch. The Nash equilibrium profile will involve the kink in each demand curve coinciding with the equilibrium price for the corresponding good. The equilibrium price vector will therefore be robust to "small" fluctuations in cost (since marginal revenue is discontinuous at the equilibrium price), and under certain conditions, we find that prices may be upwardly flexible but downwardly rigid. We make an argument that the main results of the paper generalize from a representative agent setting to one with a population of heterogeneous consumers.
Committee in charge: Dr. Van Kolpin, Chairperson; Dr. Christopher J. Ellis, Member; Dr. Jeremy Piger, Member; Dr. Renee Irvin, Outside Member
Velez, John A. "A Test of Bounded Generalized Reciprocity and Social Identity Theory in a Social Video Game Play Context." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1397671422.
Calhoun, Charles Wesley. "Nonprofit Organizational Sustainability in Bounded Contexts: A Case Study on an Appalachian Arts Organization." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1499258798712498.
Dafnos, Stavros. "Five essays in applied economic theory and times series econometrics with applications to accounting and economics." Thesis, Brunel University, 2017. http://bura.brunel.ac.uk/handle/2438/15618.
Heimberg, Lucas. "Complexity of Normal Forms on Structures of Bounded Degree." Doctoral thesis, Humboldt-Universität zu Berlin, 2018. http://dx.doi.org/10.18452/19205.
Normal forms express semantic properties of logics by means of syntactical restrictions. They allow algorithms to benefit from restrictions of the expressive power of a logic. An example is the locality of first-order logic (FO), which implies that properties like reachability or connectivity cannot be defined in FO. Gaifman's local normal form expresses the satisfaction conditions of an FO-formula by a Boolean combination of local statements. Gaifman normal form serves as a first step in fixed-parameter model-checking algorithms, parameterised by the size of the formula, on sparse graph classes. However, it is known that in general, there are non-elementary lower bounds for the costs involved in transforming a formula into Gaifman normal form. This leads to an enormous parameter-dependency of the aforementioned algorithms. Similar non-elementary lower bounds also hold for Feferman-Vaught decompositions and for the preservation theorems by Lyndon, Łoś, and Tarski. This thesis investigates the complexity of these normal forms when restricting attention to classes of structures of bounded degree, for which the non-elementary lower bounds are known to fail. Under this restriction, the thesis provides algorithms with elementary and even worst-case optimal running time for the construction of Gaifman normal form and Feferman-Vaught decompositions. For the preservation theorems, algorithmic versions with elementary running time and non-matching lower bounds are provided. Crucial for these results is the notion of Hanf normal form. It is shown that an extension of FO by unary counting quantifiers allows Hanf normal forms if, and only if, all quantifiers are ultimately periodic, and furthermore, how Hanf normal form can be computed in elementary and worst-case optimal time in these cases. This leads to model-checking algorithms for such extensions of FO and also allows generalisations of the constructions for Feferman-Vaught decompositions and preservation theorems.
Huygens, David. "Design of survivable networks with bounded-length paths." Doctoral thesis, Universite Libre de Bruxelles, 2005. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/211008.
We first study the particular case where the set of demands D is reduced to a single pair {s,t}. We propose an integer programming formulation for the problem, which consists in the st-cut and trivial inequalities, along with the so-called L-st-path-cut inequalities. We show that these three classes of inequalities completely describe the associated polytope when k=2 and L=2 or 3, and give necessary and sufficient conditions for them to be facet-defining. We also consider the dominant of the associated polytope, and discuss how the previous inequalities can be separated in polynomial time.
We then extend the complete and minimal description obtained above to any number k of required edge-disjoint L-st-paths, but when L=2 only. We devise a cutting plane algorithm to solve the problem, using the previous polynomial separations, and present some computational results.
After that, we consider the case where there is more than one demand in D. We first show that the problem is strongly NP-hard, for all L fixed, even when all the demands in D have one root node in common. For k=2 and L=2,3, we give an integer programming formulation, based on the previous constraints written for all pairs {s,t} in D. We then proceed by giving several new classes of facet-defining inequalities, valid for the problem in general, but more adapted to the rooted case. We propose separation procedures for these inequalities, which are embedded within a Branch-and-Cut algorithm to solve the problem when L=2,3. Extensive computational results from it are given and analyzed for both random and real instances.
Since those results appear less satisfactory in the case of arbitrary demands (non necessarily rooted), we present additional families of valid inequalites in that situation. Again, separation procedures are devised for them, and added to our previous Branch-and-Cut algorithm, in order to see the practical improvement granted by them.
Finally, we study the problem for greater values of L. In particular, when L=4, we propose new families of constraints for the problem of finding a subgraph that contains at least two L-st-paths either node-disjoint, or edge-disjoint. Using these, we obtain an integer programming formulation in the space of the design variables for each case.
------------------------------------------------
Dans cette thèse, nous considérons le problème de conception de réseau k-arete connexe à chemins L-bornés. Etant donné un graphe pondéré G=(N,E), un ensemble D de paires de noeuds terminaux, et deux entiers k,L > 1, ce problème consiste à trouver, dans G, un sous-graphe de cout minimum tel que, entre chaque paire dans D, il existe au moins k chemins arete-disjoints de longueur au plus L. Ce problème est d'un grand intéret dans l'industrie des télécommunications, où des réseaux hautement fiables doivent etre construits.
Nous étudions tout d'abord le cas particulier où l'ensemble des demandes D est réduit à une seule paire de noeuds. Nous proposons une formulation du problème sous forme de programme linéaire en nombres entiers, laquelle consiste en les inégalités triviales et de coupe, ainsi que les inégalités dites de L-chemin-coupe. Nous montrons que ces trois types d'inégalités décrivent complètement le polytope associé lorsque k=2 et L=2,3, et donnons des conditions nécessaires et suffisantes pour que celles-ci en définissent des facettes. Nous considérons également le dominant du polytope associé et discutons de la séparation polynomiale des trois classes précédentes.
Nous étendons alors cette description complète et minimale à tout nombre k de chemins arete-disjoints de longueur au plus 2. De plus, nous proposons un algorithme de plans coupants utilisant les précédentes séparations polynomiales, et en présentons quelques résultats calculatoires, pour tout k>1 et L=2,3.
Nous considérons ensuite le cas où plusieurs demandes se trouvent dans D. Nous montrons d'abord que le problème est fortement NP-dur, pour tout L fixé et ce, meme si les demandes sont toutes enracinées en un noeud. Pour k=2 et L=2,3, nous donnons une formulation du problème sous forme de programme linéaire en nombres entiers. Nous proposons également de nouvelles classes d'inégalités valides, pour lesquelles nous réalisons une étude faciale. Celles-ci sont alors séparées dans le cadre d'un algorithme de coupes et branchements pour résoudre des instances aléatoires et réelles du problème.
Enfin, nous étudions le problème pour de plus grandes valeurs de L. En particulier, lorsque L=4, nous donnons de nouvelles familles de contraintes pour le problème consistant à déterminer un sous-graphe contenant entre deux noeuds fixés au moins deux chemins de longueur au plus 4, que ceux-ci doivent etre arete-disjoints ou noeud-disjoints. Grace à ces dernières, nous parvenons à donner une formulation naturelle du problème dans chacun de ces deux cas.
Doctorat en sciences, Spécialisation Informatique
info:eu-repo/semantics/nonPublished
Kaye-Blake, William. "Demand for genetically modified food : theory and empirical findings." Lincoln University, 2006. http://hdl.handle.net/10182/19.
Tewodrose, David. "Some functional inequalities and spectral properties of metric measure spaces with curvature bounded below." Thesis, Paris Sciences et Lettres (ComUE), 2018. http://www.theses.fr/2018PSLEE076.
The aim of this thesis is to present new results in the analysis of metric measure spaces. We first extend to a certain class of spaces with doubling and Poincaré some weighted Sobolev inequalities introduced by V. Minerbe in 2009 in the context of Riemannian manifolds with non-negative Ricci curvature. In the context of RCD(0,N) spaces, we deduce a weighted Nash inequality and a uniform control of the associated weighted heat kernel. Then we prove Weyl’s law for compact RCD(K,N) spaces thanks to a pointwise convergence theorem for the heat kernels associated with a mGH-convergent sequence of RCD(K,N) spaces. Finally we address in the RCD(K,N) context a theorem from Bérard, Besson and Gallot which provides, by means of the heat kernel, an asymptotically isometric family of embeddings for a closed Riemannian manifold into its space of square integrable functions. We notably introduce the notions of RCD metrics, pull-back metrics, weak/strong convergence of RCD metrics, and we prove a convergence theorem analog to the one of Bérard, Besson and Gallot