Commentary: Deserved honor, or honor among thieves?

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Honor among thieves: collusion in multi-unit auctions

We consider collusion in multi-unit auctions where the allocation and payments are determined using the VCG mechanism. We show how collusion can increase the utility of the colluders, characterize the optimal collusion and show it can easily be computed in polynomial time. We then analyze the colluders’ coalition from a cooperative game theoretic perspective. We show that the collusion game is ...

متن کامل

Honor Among Thieves: Some Reflections on Professional Codes of Ethics’

As complicated an affair as it may be to give a fully acceptable general characterization of professional codes of ethics that will capture every nuance, one theme that has attracted widespread attention portrays them as contrivances whose primary function is to secure certain obligations of professionals to clients, or to the external community.2 In contrast to such an “externalist” characteri...

متن کامل

Honor among Tax Havens

This note presents a simple, partial equilibrium model of the supply of offshore tax havens, when multinationals are capable of sheltering some of their worldwide income. It provides a few contrasting predictions to those in “Tax Competition with Parasitic Tax Havens” by Slemrod and Wilson. Slemrod and Wilson model tax sheltering as a production process which uses up scarce resources in the tax...

متن کامل

Honor Among Thieves — A Source Coding Based Sharing Mechanism for the BitThief Client

In this thesis, the implementation of a peer-to-peer data distribution system called T4T is discussed. T4T is based on a truly fair tit-for-tat exchange of data blocks between peers. To circumvent the inherent problems of strict tit-for-tat, source coding of the original data is employed. As only linear combinations of blocks are ever transmitted, the block diversity in the network is greatly i...

متن کامل

No Honor Among Thieves: A Large-Scale Analysis of Malicious Web Shells

Web shells are malicious scripts that attackers upload to a compromised web server in order to remotely execute arbitrary commands, maintain their access, and elevate their privileges. Despite their high prevalence in practice and heavy involvement in security breaches, web shells have never been the direct subject of any study. In contrast, web shells have been treated as malicious blackboxes ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Thoracic and Cardiovascular Surgery

سال: 2021

ISSN: 0022-5223

DOI: 10.1016/j.jtcvs.2019.12.071