نتایج جستجو برای: token

تعداد نتایج: 6257  

Journal: :Journal of Applied Behavior Analysis 1979

Journal: :Information Systems Frontiers 2023

Cyptographic tokens are one of the cornerstones new blockchain world but knowledge about these digital objects is still limited. In this research, we argue that crypto tokens, cryptographically secured connected to DLT systems, form socio-technical systems through their reciprocal relationship with foundational systems. We also today’s token evolved out earlier physical and a transition facilit...

Journal: :IEEE Transactions on Vehicular Technology 2004

2014
Lucjan Hanzlik Kamil Kluczniak

U-Prove is a credential system that allows users to disclose information about themselves in a minimalistic way. Roughly speaking, in the U-Prove system a user obtains certified cryptographic tokens containing a set of attributes and is able to disclose a subset of his attributes to a verifier, while hiding the undisclosed attributes. In U-prove the actual identity of a token holder is hidden f...

Journal: :Journal of the experimental analysis of behavior 2009
Timothy D Hackenberg

Token reinforcement procedures and concepts are reviewed and discussed in relation to general principles of behavior. The paper is divided into four main parts. Part I reviews and discusses previous research on token systems in relation to common behavioral functions--reinforcement, temporal organization, antecedent stimulus functions, and aversive control--emphasizing both the continuities wit...

2005
Christine Mooshammer Pascal Perrier Susanne Fuchs Christian Geng Daniel Pape

The potential role of physical correlates of articulatory variability in vowel production was studied by means of EMMA and EPG. In accordance with Perkell & Nelson (1985), the hypothesis to be tested is that the amount and shape of token-totoken variability is influenced by the amount of palatal contact in such a way that high vowels exhibit different variability patterns than the other vowels....

2011
Colin Cooper

The aim of this article is to discuss some applications of random processes in searching and reaching consensus on finite graphs. The topics covered are: Why random walks?, Speeding up random walks, Random and deterministic walks, Interacting particles and voting, Searching changing graphs. As an introductory example consider the self-stabilizing mutual exclusion algorithm of Israeli and Jalfon...

2018
Daniel Lokshtanov Amer E. Mouawad

We settle the complexity of the Independent Set Reconfiguration problem on bipartite graphs under all three commonly studied reconfiguration models. We show that under the token jumping or token addition/removal model the problem is NP-complete. For the token sliding model, we show that the problem remains PSPACE-complete.

2017
Gaja Jarosz

1.1 Token frequency For completeness, this section demonstrates that relying on token frequency instead of type frequency does not provide a way out for the lexicalist hypothesis. Figure 7 shows the association between accuracy and tokenfrequency measures, analogous to the figures above for the type-frequency measures. The results are similar, albeit less promising: token segmental bigram frequ...

Journal: :IACR Cryptology ePrint Archive 2011
Nico Döttling Thilo Mie Jörn Müller-Quade Tobias Nilges

Code obfuscation is one of the most powerful concepts in cryptography. It could yield functional encryption, digital rights management, and maybe even secure cloud computing. However, general code obfuscation has been proven impossible and the research then focused on obfuscating very specific functions, studying weaker security definitions for obfuscation, and using tamper-proof hardware token...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید