Return to Sender

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Return to Sender: Finding Fault with the Court’s No-fault Gvr Practice in “confession of Error” Cases

When considering the ability of this nation’s highest court to control its docket, the first procedure to leap to mind is most likely the Writ of Certiorari. By denying certiorari review, the Court promptly removes a case from its docket without ever speaking on the issues it presents. However, while it might be the most familiar, denying cert is not the only method available to the Court for p...

متن کامل

Sender-Based Message Logging

Sender based message logging is a new low overhead mech anism for providing transparent fault tolerance in dis tributed systems It di ers from conventional message log ging mechanisms in that each message is logged in volatile memory on the machine from which the message is sent Keeping the message log in the sender s local memory allows us to recover from a single failure at a time with out th...

متن کامل

Dynamic sender-receiver games

We consider a dynamic version of sender–receiver games, where the sequence of states follows an irreducible Markov chain observed by the sender. Under mild assumptions, we provide a simple characterization of the limit set of equilibrium payoffs, as players become very patient. Under these assumptions, the limit set depends on the Markov chain only through its invariant measure. The (limit) equ...

متن کامل

Provably sender-deniable encryption scheme

The use of the well known provably secure public-key cryptoscheme by Rabin is extended for the case of the deniable encryption. In the proposed new sender-deniable encryption scheme the cryptogram is computed as coefficients of quadratic congruence, the roots of which are two simultaneously encrypted texts. One of the texts is a fake message and the other one is a ciphertext produced by public-...

متن کامل

Communication without sender or receiver?

A communication process can be described in terms of a sender transmitting information to a receiver. What happens if one of the two subject roles in this process is virtualised, i.e. substituted by a machine? Is it still appropriate to refer to this as an information transfer even if its source or target is missing? Can information originate from an unknown sender or be transmitted to a (compl...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Tessera

سال: 1990

ISSN: 1923-9408,0840-4631

DOI: 10.25071/1923-9408.23640