Joan Mary Thompson

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Joan Lane

The death of Dr Joan Lane after a short illness in May of this year is a great and sad loss to her colleagues and friends and to the history of medicine community. Joan was about to take retirement from the University of Warwick, where she had taught for the past twenty-two years. Although she had no intention of ceasing with her research activities, she was planning to spend more time with her...

متن کامل

Mary Ainsworth

Saul McLeod John Bowlby (1969) believed that attachment was an all or nothing process. However, research has shown that there are individual differences in attachment quality. Indeed, one of the primary paradigms in attachment theory is that of the security of an individual’s attachment (Ainsworth & Bell, 1970). Much research in psychology has focused on how forms of attachment differ among inf...

متن کامل

Mary Miller

This article summarizes a study of classroom television use. It describes the study methodology as "eclectic, drawing on traditions of action research ... ethnography ... history ... and constructivism..." (Ellipses in quote represent omitted citations.) The article is not particularly well organized. The author quotes extensively from the findings of earlier research studies, but does not alwa...

متن کامل

Joan Silk

Joan Silk is Professor of Anthropology at the University of California, Los Angeles. She earned her Ph.D. at the University of California, Davis, did postdoctoral research at the University of Chicago, and taught briefly at Emory University before joining the faculty at UCLA in 1986. Her work has mainly focused on the evolutionary basis of behavior in nonhuman primates, with a special emphasis ...

متن کامل

Willard Thompson

Complexity theory has a profound influence on the field of cryptology. The time complexity of breaking a cipher system must be significant enough to thwart any adversary from succeeding. However, with the emergence of quantum computers an adversary may have no difficulty in breaking known cipher systems. If quantum computers would exist today new mechanisms for security would need to be built. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of the Institute of Actuaries

سال: 1984

ISSN: 0020-2681,2058-1009

DOI: 10.1017/s0020268100041688