On Cheating
نویسندگان
چکیده
منابع مشابه
Cheating Cheating Detectors
In this paper we present a new cheating technique that is successful at defeating cheating detectors and could become popular with students. The idea is to use obfuscating code transformations (such as those found in the SANDMARK tool) to apply a sequence of minor code transformations to a copied programming assignment. This purpose is to produce a copy that will defeat detection. We show that ...
متن کاملCheating on the Edge
We present the results of an individual agent-based model of antibiotic resistance in bacteria. Our model examines antibiotic resistance when two strategies exist: "producers"--who secrete a substance that breaks down antibiotics--and nonproducers ("cheats") who do not secrete, or carry the machinery associated with secretion. The model allows for populations of up to 10,000, in which bacteria ...
متن کاملTrust and Cheating Trust and Cheating
When we take a cab we may feel cheated if the driver takes an unnecessarily long route despite the lack of a contract or promise to take the shortest possible path. Is our decision to take the cab affected by our belief that we may end up feeling cheated? Is the behavior of the driver affected by his beliefs about what we consider cheating? We address these questions in the context of a trust g...
متن کاملOn Cheating Immune Secret Sharing
This work addresses the problem of cheating prevention in secret sharing. The scheme is said to be k-cheating immune if any group of k cheaters has no advantage over honest participants. In this paper we study the constraints of cheating immune secret sharing schemes. We give a necessary and sufficient condition for SSSs to be cheating immune. Then, we improve the upper bound of D’Arco et. al o...
متن کاملOn Cheating Immune Secret Sharing
The paper addresses the cheating prevention in secret sharing. We consider secret sharing with binary shares. The secret also is binary. This model allows us to use results and constructions from the well developed theory of cryptographically strong boolean functions. In particular, we prove that for given secret sharing, the average cheating probability over all cheating vectors and all origin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science and Engineering Ethics
سال: 2013
ISSN: 1353-3452,1471-5546
DOI: 10.1007/s11948-013-9445-4