Search
Now showing items 111-118 of 118
What’s in a name?: Revealing the function of the criminal pseudonym through a content analysis of ten characters in twelve films
(2015-05-01)
At times, individuals articulate their criminal identity with the construction of a pseudonym derived from within their subculture. This study assumes there is a value and/or purpose in the construction, cultivation and ...
Examining the utility of pre-charge youth diversion programs: a Canadian context
(2015-05-01)
Despite the perceived benefits of pre-charge diversion programs, some researchers contend that programs based on police selection may suffer from selection bias. Critics have also argued that diversion programs are being ...
Analysis of resistance nodulation division efflux pumps in Acinetobacter baumannii
(2015-01-01)
Strains from Canadian hospitals were classified as A. baumannii, A. pitti, or A. osocomialis and the most commonly expressed resistance nodulation division (RND) efflux pump was adeFGH. A collection of A. baumannii isolates ...
Can participation in drug treatment courts reduce emergency department use? An evaluation.
(2015-08-01)
Drug treatment court evaluations often measure criminal recidivism. Further research is required to reflect any additional social benefits that may transpire from participation in this diversion program. To expand drug ...
Towards measuring privacy
(2015-04-01)
The acceptable threshold for privacy is an individual choice, informed by culture, tradition and experience. That it is important, conversely, is self-evident. We use it to moderate personal information disclosure, how ...
Dynamic square patterns in two dimensional neural fields
(2015-07-29)
The goal of this thesis is to study the emergence of spatiotemporal waves in neural field models. Neural field models aim to describe the activity of populations of neurons at a mesoscopic scale, considering averaged ...
CORE: a framework for the automatic repair of concurrency bugs
(2015-01-01)
Desktop computers now contain 2, 4 or even 8 processors. To benefit from them programs must be written to work in parallel. If writing good code is hard, writing good parallel code is much harder. Parallelization adds ...
Dynamic probabilistic network protection in large-scale failure scenarios
(2015-01-01)
Large-scale failure resulting from natural disasters or intentional attacks is now considered a serious risk for communication network infrastructure. In these events, simultaneous damages in several links and nodes may ...