نتایج جستجو برای: alice walker

تعداد نتایج: 19317  

2007
Vinod Prabhakaran Kannan Ramchandran

Alice wants to communicate securely to Bob in the presence of an eavesdropper Eve. There are two resources available to facilitate this. First, Alice, Bob (and Eve) have access to dependent source observations. Secondly, there is a noisy broadcast channel from Alice to Bob and Eve. Under this general source and channel setup, we are interested in three classes of problems. First, what is the se...

Journal: :iranian journal of animal biosystematics 0
a. moeinadini sm madjdzadeh e. pricop

in this paper we present thysanus walker, a genus new to the iranian fauna. only one species has been identified in iran: thysanus ater walker, 1840. we illustrate the species morphology of wings, antennae, head, thorax and abdomen.

2007
Toshiyuki Isshiki Keisuke Tanaka

A bit-commitment protocol involves two party: a sender (say Alice) and a receiver (say Bob). Alice has a classical string in mind, which she wants to communicate to Bob at a later time. In order to guarantee that she will not change her mind in the interim, Alice agrees to lock her commitment in a safe which she sends to Bob, but keeps the key of the safe. At the moment of truth, Alice unveils ...

2017
Dae-Kyo Jeong Insook Kim Dongwoo Kim

This paper presents a price-searching model in which a source node (Alice) seeks friendly jammers that prevent eavesdroppers (Eves) from snooping legitimate communications by generating interference or noise. Unlike existing models, the distributed jammers also have data to send to their respective destinations and are allowed to access Alice's channel if it can transmit sufficient jamming powe...

Journal: :Physical review letters 2015
Christopher Perry Rahul Jain Jonathan Oppenheim

Quantum resources can be more powerful than classical resources-a quantum computer can solve certain problems exponentially faster than a classical computer, and computing a function of two parties' inputs can be done with exponentially less communication with quantum messages than with classical ones. Here we consider a task between two players, Alice and Bob where quantum resources are infini...

Journal: :Chicago J. Theor. Comput. Sci. 2016
André Chailloux Gus Gutoski Jamie Sikora

Oblivious transfer is a fundamental cryptographic primitive in which Bob transfers one of two bits to Alice in such a way that Bob cannot know which of the two bits Alice has learned. We present an optimal security bound for quantum oblivious transfer protocols under a natural and demanding definition of what it means for Alice to cheat. Our lower bound is a smooth tradeoff between the probabil...

2017
Prithvijit Chattopadhyay Deshraj Yadav Viraj Prabhu Arjun Chandrasekaran Abhishek Das Stefan Lee Dhruv Batra Devi Parikh

As AI continues to advance, human-AI teams are inevitable. However, progress in AI is routinely measured in isolation, without a human in the loop. It is crucial to benchmark progress in AI, not just in isolation, but also in terms of how it translates to helping humans perform certain tasks, i.e., the performance of human-AI teams. In this work, we design a cooperative game – GuessWhich – to m...

Journal: :IACR Cryptology ePrint Archive 2011
Daniel R. L. Brown

Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob the resulting ciphertext, which Bob can send to the trusted authority. The trusted authority provides Bob the symmetric key only upon verifying Bob’s identity. 1 Identity-Based Encryption Shamir introduced [7] the notio...

2015
Dan L. Burk

The opinion of the United States Court of Appeals for the Federal Circuit, In re Roslin Institute, rejecting patent claims to mammals cloned from somatic cells, was rendered about a month before the United States Supreme Court's decision in Alice Corp. v. CLS Bank International. The Alice opinion explicitly sets out the standard for determining whether an invention falls within statutory patent...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید