نتایج جستجو برای: and third

تعداد نتایج: 16842781  

2006
R. Harlander P. Kant L. Mihaila M. Steinhauser

Dimensional Reduction is applied to QCD in order to compute various renor-malization constants in the DR scheme at higher orders in perturbation theory. In particular, the β function and the anomalous dimension of the quark masses are derived to three-loop order. Special emphasis is put on the proper treatment of the so-called ε-scalars and the additional couplings which have to be considered.

2013
Qiong Huang Duncan S. Wong Willy Susilo

How to sign an electronic contract online between two parties (say Alice and Bob) in a fair manner is an interesting problem, and has been studied for a long time. Optimistic Fair Exchange (OFE) is an efficient solution to this problem, in which a semi-trusted third party named arbitrator is called in to resolve a dispute if there is one during an exchange between Alice and Bob. Recently, sever...

2015
Miguel A. Faria

American bioethicists have been providing persuasive arguments for rationing medical care via the theory of the necessary "rational allocation of finite health care resources." Anticipating the need for the drastic rationing of medical care in the U.S. with the implementation of ObamaCare and assisted by various sectors of organized medicine in league with the State, bioethicists have deduced t...

Journal: :Computer Communications 2002
Steve Kremer Olivier Markowitch Jianying Zhou

With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Nonrepudiation services must ensure that when Alice sends some information to Bob over a network, neither Alice nor Bob can deny having participated in a part or the whole of this communication. Therefore a fair non-repudiation protocol has to...

2000
Spas D. Kolev Willem E. van der Linden

An exact solution of the convective-dlffuslon equation for fully developed parallel plate lammar flow was obtamed It allows the denvatlon of theoretical relatlonshps for calculating the Peclet number m the axmlly dispersed plug flow model and the concentration dlstrlbutlon perpendicular to the direction of the flow, provided that the correspondmg solution of this model IS known. The convective-...

2010
Brian Dawson Kelly Carter Kori Brewer Luan Lawson

OBJECTIVE The healthcare chart is becoming ever more complex, serving clinicians, patients, third party payers, regulators, and even medicolegal parties. The purpose of this study was to identify our emergency medicine (EM) resident and attending physicians' current knowledge and attitudes about billing and documentation practices. We hypothesized that resident and attending physicians would id...

2002
Steve Kremer Olivier Markowitch Jianying Zhou

With the phenomenal growth of the Internet and open networks in general, security services, such as non-repudiation, become crucial to many applications. Non-repudiation services must ensure that when Alice sends some information to Bob over a network, neither Alice nor Bob can deny having participated in a part or the whole of this communication. Therefore a non-repudiation protocol has to gen...

Journal: :Computer Networks 2003
Ning Zhang Qi Shi Madjid Merabti

Fairness in document exchange has been well studied, while anonymity in the exchange, which protects the privacy of personal information such as identities and locations, has been either ignored or handled with partial or inappropriate considerations. In this paper we propose a new protocol for anonymous and fair document exchange between two parties with the assistance of an off-line trusted t...

Journal: :TPLP 2002
Ahmed Bouajjani Agathe Merceron

We address the problem of verifying clique avoidance in the TTP protocol. TTP allows several stations embedded in a car to communicate. It has many mechanisms to ensure robustness to faults. In particular, it has an algorithm that allows a station to recognize itself as faulty and leave the communication. This algorithm must satisfy the crucial ’non-clique’ property: it is impossible to have tw...

2003
Heike Neumann Thomas Schwarzpaul

We examine the interference of fairness and observers in digital coin systems. Since copying of coins cannot be prevented cryptographically in anonymous off-line coin systems, double-spending detection is one of the major tasks. An observer is a tamper resistant device that prevents double-spending physically. While privacy protection is a desirable property of cash systems, perfect anonymity i...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید