نتایج جستجو برای: it discourages non
تعداد نتایج: 3816769 فیلتر نتایج به سال:
Given the present diversity of architectures for intelligent agents it is important that we start identifying those environmental characteristics that impact architecture design. This would benefit architecture designers and those trying to understand and evaluate existing architectures. Unfortunately. the “Turing Tarpit” discourages precise characterizations. Nonetheless, we attempt here to ma...
We study how the imposition of a redemption fee affects runs on financial institutions when investors are asymmetrically informed about fundamentals. Although the fee eliminates the first-mover advantage by internalizing the payoff externality and, therefore, discourages runs by informed investors, it also alters the information externality by influencing uninformed investors’ learning and may,...
[email protected] ABSTRACT Watermarking is a technique of embedding a secret message in a cover message. When media is watermarked the secret message is usually a copyright notice. Watermarking thus discourages intellectual property theft and helps us to prove ownership when such a theft occurs. This survey paper describes Digital Watermarking in detail and explains theory, techniques and its ...
We pursue the study of the embedding of the-calculus into the-calculus. Various lambda calculi with parallel and convergence testing facilities are examined and their expressiveness compared; j-a lazy calculus augmented with a non-deterministic choice operator and a convergence testing combinator, emerges as a suitable language to be encoded in. Through the use of closures for variables and abs...
Niederreiter is a candidate post-quantum cryptosystem. Its large public key size currently discourages its use in practice. We demonstrate and evaluate how Niederreiter can be used for quantum-secure key exchanges by implementing it in OpenVPN. We contribute an analysis of how much Grover’s algorithm can speed up existing attacks on Niederreiter and McEliece and what code parameters can protect...
P2P file sharing systems are distributed systems consisting of interconnected nodes able to self-organize in networks, with the purpose of sharing content. Recent empirical studies have shown that they suffer from freeloaders, that is, peers that consume many more resources or content than they contribute. In this paper we propose a coalition formation based incentive mechanism for P2P file sha...
Mobile ad hoc networks are a new and challenging topic on mobile computing. A particular characteristic of ad hoc networks is their self-organization, what makes them highly dependable of the participants. Until recently, it was assumed that these networks would be composed of cooperative hosts, where their owners share a common goal. However, this assumption will probably be dropped due to the...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید