On Cheating

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cheating Cheating Detectors

In this paper we present a new cheating technique that is successful at defeating cheating detectors and could become popular with students. The idea is to use obfuscating code transformations (such as those found in the SANDMARK tool) to apply a sequence of minor code transformations to a copied programming assignment. This purpose is to produce a copy that will defeat detection. We show that ...

متن کامل

Cheating on the Edge

We present the results of an individual agent-based model of antibiotic resistance in bacteria. Our model examines antibiotic resistance when two strategies exist: "producers"--who secrete a substance that breaks down antibiotics--and nonproducers ("cheats") who do not secrete, or carry the machinery associated with secretion. The model allows for populations of up to 10,000, in which bacteria ...

متن کامل

Trust and Cheating Trust and Cheating

When we take a cab we may feel cheated if the driver takes an unnecessarily long route despite the lack of a contract or promise to take the shortest possible path. Is our decision to take the cab affected by our belief that we may end up feeling cheated? Is the behavior of the driver affected by his beliefs about what we consider cheating? We address these questions in the context of a trust g...

متن کامل

On Cheating Immune Secret Sharing

This work addresses the problem of cheating prevention in secret sharing. The scheme is said to be k-cheating immune if any group of k cheaters has no advantage over honest participants. In this paper we study the constraints of cheating immune secret sharing schemes. We give a necessary and sufficient condition for SSSs to be cheating immune. Then, we improve the upper bound of D’Arco et. al o...

متن کامل

On Cheating Immune Secret Sharing

The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong boolean functions. In particular, we prove that for given secret sharing, the average cheating probability over all cheating vectors and all origin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Science and Engineering Ethics

سال: 2013

ISSN: 1353-3452,1471-5546

DOI: 10.1007/s11948-013-9445-4