نتایج جستجو برای: bob marley
تعداد نتایج: 4072 فیلتر نتایج به سال:
“Extremely direct” is the essence of Bob Muller’s signature style. His journey toward his intensive focused study of place cells was anything but direct, veering from experimental psychology through membrane biophysics and ending in the temporal lobe. Bob was a New Yorker. Born in Queens in 1942, he went through New York City public schools, Stuyvesant High School (where he was classmate of Lyn...
In this work we study the problem of confidential communication when different resources of randomness are available. We start with the relay channel where source observations are available at each terminal. We study the scenario where the transmitter (Alice) sends a private message to the destination (Bob), which is confidential to the relay (Eve). Alice and Bob also want to agree on a secret ...
[1] Intraseasonal variability (ISV) of sea surface height (SSH) over the Bay of Bengal (BoB) is studied using altimetry data and an eddy-resolving ocean model. In both the model hindcast and satellite observations, large SSH ISV is found along the eastern and northern coasts of the BoB, in the western BoB, and in a zonal band across the Bay centered near 5 N. The ISV displays a clear seasonalit...
Consider three players Alice, Bob and Cath who hold a, b and c cards, respectively, from a deck of d = a+ b+ c cards. The cards are all different and players only know their own cards. Suppose Alice and Bob wish to communicate their cards to each other without Cath learning whether Alice or Bob holds a specific card. Considering the cards as consecutive natural numbers 0, 1, ..., we investigate...
Abstract. Lead–lag correlations between the subsurface temperature and salinity anomalies in Bay of Bengal (BoB) Indian Ocean Dipole (IOD) are revealed model results, ocean synthesis, observations. Mechanisms for such further investigated using Hamburg Shelf Model (HAMSOM), mainly relating to variability. It is found that anomaly BoB positively correlates IOD, with a lag 3 months on average, wh...
Qing-yu Cai Wuhan Institute of Physics and Mathematics, The Chinese Academy of Sciences, Wuhan, 430071, People’s Republic of China Bostr .. om and Felbinger [1] have presented a ping-pong communication protocol which allows the information transferred in a deterministic secure manner. The security of this ping-pong protocol is based on an entangled pair of qubits. And the proof of the case of e...
Consider a setting of two mutually distrustful parties Alice and Bob who want to securely evaluate some function on pre-specified inputs. The well studied notion of two-party secure computation allows them to do so in the stand-alone setting. Consider a deterministic function (e.g., 1-out-of-2 bit OT) that Alice and Bob can not evaluate trivially and which allows only Bob to receive the output....
We introduce the concept of a quantum “seal” and investigate its feasibility. We define a seal as a state provided by Alice to Bob along with a set of instructions which Bob can follow in order to “break the seal” and read the classical message stored inside. We define two success criteria for a seal: the probability Bob can successfully read the message if he follows Alice’s instructions witho...
Suppose Alice wants to perform some computation that could be done quickly on a quantum computer, but she cannot do universal quantum computation. Bob can do universal quantum computation and claims he is willing to help, but Alice wants to be sure that Bob cannot learn her input, the result of her calculation, or perhaps even the function she is trying to compute. We describe a simple, efficie...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید