منابع مشابه
Can Two-Way Direct Communication Protocols Be Considered Secure?
We consider attacks on two-way quantum key distribution protocols in which an undetectable eavesdropper copies all messages in the message mode. We show that under the attacks, there is no disturbance in the message mode and that the mutual information between the sender and the receiver is always constant and equal to one. It follows that recent proofs of security for two-way protocols cannot ...
متن کاملWhen Should Two Minds Be Considered Versions of One Another?
What does it mean for one mind to be a different version of another one, or a natural continuation of another one? Or put differently: when can two minds sensibly be considered versions of one another? This question occurs in relation to mind uploading, where one wants to be able to assess whether an approximate upload constitutes a genuine continuation of the uploaded mind or not. It also occu...
متن کاملFurther Combinatorial Properties of Two Fibonacci Lattices
In an earlier paper on differential posets, two lattices Fib(r) and Z(r) were defined for each positive integer r, and were shown to have some interesting combinatorial properties. In this paper the investigation of Fib(r) and Z(r) is continued. A bijection 1Jf: Fib(r)--+ Z(r) is shown to preserve many properties of the lattices, though IJf is not an isomorphism. As a consequence we give an exp...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Contemporary Buddhism
سال: 2003
ISSN: 1463-9947,1476-7953
DOI: 10.1080/1463994032000140185