نتایج جستجو برای: eve

تعداد نتایج: 2609  

2018
Tatsuya Tomaru

Information-theoretically secure communications are possible when channel noise is usable and when the channel has an intrinsic characteristic that a legitimate receiver (Bob) can use the noise more advantageously than an eavesdropper (Eve). This report deals with the case in which the channel does not have such an intrinsic characteristic. Here, we use a pre-shared common key as a tool that ex...

1997
Amy J. Lee Anisoara Nica Elke A. Rundensteiner

The maintenance of materialized views in large-scale environments composed of numerous heterogeneous information sources (ISs), such as the WWW, has importance for the new breed of information service providers. These applications face the problem that such large-scale environments are plagued with ISs not only continuously modifying their contents, but also their schemas and query capabilities...

2001
Valeri Korjik Guillermo Morales-Luna Vladimir B. Balakirsky

Secret key agreement protocol between legal parties based on reconciliation and privacy amplification procedure has been considered in [2]. The so called privacy amplification theorem is used to estimate the amount of Shannon’s information leaking to an illegal party (passive eavesdropper) about the final key. We consider a particular case where one of the legal parties (Alice) sends to another...

2005
Elizabetti Donaldson Alistair Cooke

"This is a true story," Leaning against the seats in a seemingly empty theater, journalist Alistair Cooke stands in front of a blank screen and introduces the plot of Ttie Three Faces of Eve (1957), Cooke functions as a surrogate spokesman for Drs, Thigpen and Cleckley, the two psychiatrists who originally authored this case study. Much of the film's dialogue, Cooke reassures us, is taken direc...

2016
Reino Niskanen Igor Potapov Julien Reichert

Robot game is a two-player vector addition game played on the integer lattice Z. Both players have sets of vectors and in each turn the vector chosen by a player is added to the current configuration vector of the game. One of the players, called Eve, tries to play the game from the initial configuration to the origin while the other player, Adam, tries to avoid the origin. The problem is to de...

2013
Marcus Carter

This Doctoral Consortium paper overviews the author’s PhD thesis which aims to explore the phenomenon, affect and appeal of ruthless play through examining three ruthless games; EVE Online (2003), DayZ (2012) and Warhammer 40,000 (1989).

2010
Nicholas Bloom John Van Reenen

This paper has been prepared for a chapter in the Handbook of Labor Economics Volume IV edited by David Card and Orley Ashenfelter. We would like to thank the Economic and Social Research Council for their financial support through the Center for Economic Performance. This survey draws substantially on joint work with Daron Acemoglu, Philippe Aghion, Eve Caroli, Luis Garicano, Christos Genakos,...

Journal: :Science 1987
R Lewin

Your use of the JSTOR archive indicates your acceptance of JSTOR's Terms and Conditions of Use, available at http://www.jstor.org/about/terms.html. JSTOR's Terms and Conditions of Use provides, in part, that unless you have obtained prior permission, you may not download an entire issue of a journal or multiple copies of articles, and you may use content in the JSTOR archive only for your perso...

Journal: :Experimental Economics 2023

Abstract We propose a novel approach to check whether individual behaviour in binary-choice participation games is consistent with the restrictions imposed by symmetric models. This allows particular an assessment of how much cluster-heterogeneity model can tolerate remain its behavioural restrictions. assess our data from market-entry experiments which we analyse through lens ‘Exploration vers...

2016
BURTON ROSENBERG

Claude Shannon introduced an entropy model for information, and applied it to secrecy in communications. It supposes a source of information, Alice, which chooses among a set of possible messages. There is associated with this choice a likelihood that Alice would chose a particular message. Symbols are then sent across a channel to Bob. These symbols should refine Bob’s likelihood function, emp...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید