(1) In recent years nine arts-related departments at Glasgow University have been successful in winning funds for the creation of large databases. Although these data are being extensively exploited for research, the great potential they offer for undergraduate teaching remains largely untapped due to the lack of suitably tailored software and hardware provision. (2) Our objective is to give arts-based students access to these complex highly structured data in the classroom without requiring them to master difficult operating systems. In this way they would gain valuable transferable skills in information technology. These will enhance the historians' traditional skills of evaluating, interpreting and presenting evidence, long re...
This study investigates aspects of the cognitive development in Australian Aborigines which are rela...
A study is presented of the forces involved in adsorption from solution with particular reference to...
Public key cryptography is a relatively new branch of cryptography, with the first cryptosystems pub...
The research study reported in this thesis examines Otto Rank's concept (1930) of Symbolic Immortal...
The initial aim of the present studies was to determine whether information processing rates could ...
The work described had the main purpose of gaining a better understanding of the mechanism by which ...
This thesis traces the development of the notion of 'moral sense' from the midseventeenth century to...
The first section of the thesis is concerned with adsorption by chitin. Lobster-shell chitin, prepar...
Due to the current mass incorporation of ICT in the society it is necessary to reflect on some state...
A large literature is now devoted to the demographic crises, experienced by the USSR between 1920 an...
Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at the M...
Background. Ankle sprains are very common injuries. Although recovery can occur within weeks, around...
It is often sensible, coherent and true to deny that certain things exist. When talking about ficti...
The thesis sets as its task an examination of both the use and effect of mythological figures in the...
This second edition of "A Key to the Stromateoid Fishes" is a partially up-dated version of the ori...
This study investigates aspects of the cognitive development in Australian Aborigines which are rela...
A study is presented of the forces involved in adsorption from solution with particular reference to...
Public key cryptography is a relatively new branch of cryptography, with the first cryptosystems pub...
The research study reported in this thesis examines Otto Rank's concept (1930) of Symbolic Immortal...
The initial aim of the present studies was to determine whether information processing rates could ...
The work described had the main purpose of gaining a better understanding of the mechanism by which ...
This thesis traces the development of the notion of 'moral sense' from the midseventeenth century to...
The first section of the thesis is concerned with adsorption by chitin. Lobster-shell chitin, prepar...
Due to the current mass incorporation of ICT in the society it is necessary to reflect on some state...
A large literature is now devoted to the demographic crises, experienced by the USSR between 1920 an...
Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at the M...
Background. Ankle sprains are very common injuries. Although recovery can occur within weeks, around...
It is often sensible, coherent and true to deny that certain things exist. When talking about ficti...
The thesis sets as its task an examination of both the use and effect of mythological figures in the...
This second edition of "A Key to the Stromateoid Fishes" is a partially up-dated version of the ori...
This study investigates aspects of the cognitive development in Australian Aborigines which are rela...
A study is presented of the forces involved in adsorption from solution with particular reference to...
Public key cryptography is a relatively new branch of cryptography, with the first cryptosystems pub...