نتایج جستجو برای: selflessness and honestly

تعداد نتایج: 16827212  

Journal: :Comput. J. 1999
Ning Zhang Qi Shi Madjid Merabti

This paper presents a novel protocol for achieving secure and fair document exchange among multiparties. The protocol has the following characteristics: it employs no trusted (third) party when a majority of the parties involved behave honestly; it adopts a technique for integrity and originality verification of messages without use of either asymmetric (public key) or symmetric (conventional) ...

2017

This book outlines the underlying pathophysiology of heart failure, summarises standard pharmacological and device therapy, and sets the context of the challenges resulting from an unpredictable course of disease. In easily digestible summaries, this book presents practical advice about how and when to integrate a palliative care approach alongside standard heart failure management, how to comm...

2011
Stefan König Torsten Eymann

The paper identifies trusting problems between autonomous services in the Internet-of-Services (IoS). This scenario vision describes a general computational paradigm, which allows companies to procure computational resources externally. The arising conflicting interests between providers and consumers lead to strategic behaviour of single services. Usually trust and reputation models are propos...

1998
Diomidis Spinellis

oftware organizations began introducing the client–server system architecture in the late 1980s because CSS offered a technology-driven application design that genuinely addresses corporate and user needs. Widely promoted by software and hardware vendors who sought short-term advantages in a competitive market, CSS has always been a haphazard match of disparate, ad hoc technologies that lack th...

1998
Simon Blackburn Simon Blake-Wilson Mike Burmester Steven Galbraith

The paper considers the problem of distributed key generation for shared-control RSA schemes. In particular: how can two parties generate a shared RSA key in such a way that neither party can cheat? The answer to this question would have signi cant applications to, for example, key escrow systems. Cocks has recently proposed protocols to solve this problem in the case when both parties act hone...

2016
W. C. Swayne

on the other those who are of opinion that they should be removed whenever found to be present. Both views are erroneous, but between these two extremes there is a possibility of arriving at a correct conclusion as to the general grounds on which treatment should be based. To take the first contention, that fibroids are innocuous. A short time since a well-known authority asked whether anyone c...

2003
Tim D. Moreton Andrew Twigg

Many peer-to-peer services rely on a cooperative model of interaction among nodes, yet actually provide little incentive for nodes to collaborate. In this paper, we develop a trust and security architecture for a routing and node location service based on Kademlia [1], a distributed hash table. Crucially, rather than ‘routing round’ defective or malicious nodes, we discourage free-riding by req...

2006
Keith J. Crocker

This paper examines managerial compensation in an environment where managers may take a hidden action that affects the actual earnings of the firm. When realized, these earnings constitute hidden information that is privately observed by the manager, who may expend resources to generate an inflated earnings report. We characterize the optimal managerial compensation contract in this setting, an...

2007
Jeffrey R. Stowell Jason M. Nelson

We compared an electronic audience response system (clickers) to standard lecture, hand-raising, and response card methods of student feedback in simulated introductory psychology classes. After hearing the same 30-min psychology lecture, participants in the clicker group had the highest classroom participation, followed by the response card group, both of which were significantly higher than t...

Journal: :Prilozi 2014
Elizabeth Wager Sabine Kleinert

The research being reported should have been conducted in an ethical and responsible manner and should comply with all relevant legislation. Researchers should present their results clearly, honestly, and without fabrication, falsification or inappropriate data manipulation. Researchers should strive to describe their methods clearly and unambiguously so that their findings can be confirmed by ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید