نتایج جستجو برای: commitment

تعداد نتایج: 39978  

2008
Horace P. Yuen

This article describes a quantum bit commitment protocol, QBC3, based on entanglement destruction via forced measurements and proves its unconditional security. Some comments on the current status of the field are also made.

1999
Charles F. Hermann George Bush Robert S. Billings Robert Litchfield

Many public policy problems pose a sequential series of occasions for decision to policy makers. Not infrequently a prior decision results in negative feedback indicating the effects of previous actions are not as expected. How do policy makers respond to indications of a failed course of action? Escalation of Commitment theory suggests that for multiple reasons, the policy makers are often lik...

2016
Koa Whittingham Jeanie Sheffield Roslyn N Boyd

INTRODUCTION Cerebral palsy (CP) impacts on the entire family in a manner that is long-term, complex and multifactorial. In addition, the quality of the parent-child relationship impacts on many and varied child outcomes, making the provision of easily accessible and evidence-based support to parents of children with CP a priority. This paper reports the protocol of a randomised controlled tria...

2002
Daron Acemoglu

Do societies choose inefficient policies and institutions, in contrast to what would be suggested by a reasoning extending the Coase Theorem to politics? Do societies choose inefficient policies and institutions because of differences in the beliefs and ideologies of their peoples or leaders? Or are inefficiencies in politics and economics the outcome of social and distributional conflicts? Thi...

2017
Jamal Ben Mansour André Leclerc

Organizations are becoming increasingly demanding in regard to training cost rationalization and justification, and to the associated result achievement obligation. In practice, these pressures result in the introduction of more or less adequate efficiency indicators in relation to training programs. The goal of this study is to understand the relationship between training and training efficien...

2004
Alvin AuYoung Christopher Tuttle

Internet casinos have become a billion dollar industry [21]. The increasing popularity of online gaming is surprising given its weak guarantees of fairness compared to those offered by physical casinos. We apply a bit commitment protocol to an online blackjack game that provides strong fairness guarantees between the player and casino without compromising the play of the game. We introduce a se...

Journal: :Perspectives on psychological science : a journal of the Association for Psychological Science 2016
Irene Cheung Lorne Campbell Etienne P LeBel Robert A Ackerman Bülent Aykutog˘lu Šteˇpán Bahník Jeffrey D Bowen Carrie A Bredow Christopher Bromberg Peter A Caprariello Rodrigo J Carcedo Kevin J Carson Rebecca J Cobb Nancy L Collins Conrad A Corretti Theresa E DiDonato Chelsea Ellithorpe Noelia Fernández-Rouco Paul T Fuglestad Rebecca M Goldberg Frank D Golom Elçin Gündog˘du-Aktürk Lisa B Hoplock Petr Houdek Heidi S Kane John S Kim Sue Kraus Christopher T Leone Norman P Li Jill M Logan Roanne D Millman Marian M Morry Jennifer C Pink Taylor Ritchey Lindsey M Root Luna H Colleen Sinclair Danu Anthony Stinson Tamara A Sucharyna Natasha D Tidwell Ahmet Uysal Marek Vranka Lauren A Winczewski Jose C Yong

Finkel, Rusbult, Kumashiro, and Hannon (2002, Study 1) demonstrated a causal link between subjective commitment to a relationship and how people responded to hypothetical betrayals of that relationship. Participants primed to think about their commitment to their partner (high commitment) reacted to the betrayals with reduced exit and neglect responses relative to those primed to think about th...

Journal: :JSW 2010
Bo Meng Zimao Li Jun Qin

The secure remote Internet voting protocol play an important role in Internet voting system. The direction of development of remote Internet voting protocol is that implementation of receipt-freeness and coercion-resistance is from with strong physical assumptions to with weak physical assumptions. The final purpose is that receiptfreeness and coercion-resistance is implemented without physical...

Journal: :IEEE Trans. Information Forensics and Security 2007
Jeroen van de Graaf

We present a detailed comparison of the Prêt-àVoter and Punchscan protocols for booth voting. We also describe a simpler variation that keeps the ballot layout of Prêt-àVoter but borrows the cryptography from Punchscan, which is based on any commitment scheme. By using unconditionally hiding commitments we obtain a conceptually very simple voting protocol with unconditional privacy.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید