نتایج جستجو برای: cheating
تعداد نتایج: 2423 فیلتر نتایج به سال:
This paper addresses players’ uses of supplemental items during gameplay, how they define what is and is not “cheating” in reference to these items, and then, what actions they ultimately take in accordance with their beliefs and reasoning. To do that, an analysis of the results of in-depth interviews with 24 game players and an open-ended survey of an additional 50 players is conducted to dete...
This study relaxes the assumption of perfect and costless policy enforcement found in traditional agricultural policy analysis and introduces enforcement costs and cheating into the economic analysis of output subsidies. Policy design and implementation is modeled in this paper as a sequential game between the regulator who decides on the level of intervention, an enforcement agency that determ...
1 Trevor S. Harding, Kettering University, Manufacturing Engineering Program, Flint, MI 48504-4898 [email protected] Abstract – The preliminary results of educational research conducted at Kettering University is described in which students in an introductory Engineering Materials course (MFGE-370) were asked to complete a survey on their perceptions of cheating. The overall objective of t...
Visual cryptography (VC) is a technique of encoding a secret image into share images such that stacking a sufficient number of shares reveals the original secret image. Shares are generally presented in transparencies. So each participant holds a transparency. The original secret image is recovered after superimposing the transparencies one to other. Basically, the performance of visual cryptog...
Through a field experiment in Sri Lanka I analyze the role of experimentally-induced memories of 2004 tsunami on behavior in a trust game in which personal notions of cheating are elicited. Micro-finance borrowers were randomly assigned to a treatment (control) group consisting in watching a video about the calamity before (after) playing. Trust game participants were asked how much to receive ...
Because of the characteristic of network topology and application domain, the data transmission in opportunistic network depends on the ‘Store-Transfer’ operation between nodes in it. And there isn’t the fix route or path in it. So the fitness transmitter-node choice is a key for the success of data transmission in network. But the decision-making for transmission is not an easy work. As a smar...
We study the optimal parameters to minimize the cheating probability and communication complexity in protocols for two party computation secure against malicious adversaries. In cut-and-choose protocols for two party computation, we analyze the optimal parameters to keep the probability of undetected cheating minimum. We first study this for a constant number of circuits, and then generalize it...
In online advertising, one of the central questions of ad campaign assessment is whether the ad truly adds values to the advertisers. To measure the incremental effect of ads, the ratio of the success rates of the users who were and who were not exposed to ads is usually calculated to represent ad effectiveness. Many existing campaigns simply target the users with high predicted success (e.g. p...
we propose RACE, a report-based payment scheme for multihop wireless networks to stimulate node cooperation, regulate packet transmission, and enforce fairness. The nodes submit lightweight payment reports (instead of receipts) to the accounting center (AC) and temporarily store undeniable security tokens called Evidences. The reports contain the alleged charges and rewards without security pro...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید