نتایج جستجو برای: bob marley

تعداد نتایج: 4072  

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2006
Andreas Jakoby Maciej Liskiewicz Aleksander Madry

It is well known that unconditionally secure bit commitment is impossible even in the quantum world. In this paper a weak variant of quantum bit commitment, introduced independently by Aharonov et al. [2] and Hardy and Kent [8] is investigated. In this variant, the parties require some nonzero probability of detecting a cheating, i.e. if Bob, who commits a bit b to Alice, changes his mind durin...

Journal: :Physical Review Letters 2007

2011
V. Sreekanth K. Krishna Moorthy S. K. Satheesh S. Suresh Babu Vijayakumar S. Nair

Realizing the importance of aerosol characterization and addressing its spatio-temporal heterogeneities over Bay of Bengal (BoB), campaign mode observations of aerosol parameters were carried out using simultaneous cruise, aircraft and land-based measurements during the Winter Integrated Campaign for Aerosols gases and Radiation Budget (W ICARB). Under this, airborne measurements of total and h...

Journal: :Dalton transactions 2008
Warwick J Belcher Michael C Hodgson Kenji Sumida Ana Torvisco Karin Ruhlandt-Senge D C Ware P D W Boyd P J Brothers

The reactions of boron halides with free base porphyrins under conditions where partial hydrolysis of the boron halides can occur give diboron porphyrin complexes containing BOB moieties in which each boron is bonded to two porphyrin nitrogen atoms. BF(3).OEt(2) with H(2)(por) gives B(2)OF(2)(por) (por = tpp, ttp, tpClpp, oep) which has an asymmetric structure in which one boron lies in the por...

Journal: :Deep-sea Research Part I-oceanographic Research Papers 2022

The excess of freshwater from rivers and precipitation delivered to the Bay Bengal (BoB) must be exported neighboring ocean in order establish a quasi-steady state salinity field. BoB's sea surface is approximately 3 PSU less than that Arabian Sea, which experiences net evaporation, difference reflecting efficiency exchange between two embayments (Gordon et al., 2019). Using Argo profiles 2003 ...

2011
Dana Moshkovitz

Alice gets a k-bit message x to send to Bob. Unfortunately, the communication channel is corrupted, and some number of bits may flip. For conceretness, say twenty percent of all bits sent on the channel may flip. Which bits are flipped is unknown, and different bits may flip for different messages sent on the channel. Can Alice still send a message that can be reliably received by Bob? We allow...

Journal: :IEEE Trans. Wireless Communications 2016
Boulat A. Bash Dennis Goeckel Donald F. Towsley

Unlike standard security methods (e.g. encryption), low probability of detection (LPD) communication does not merely protect the information contained in a transmission from unauthorized access, but prevents the detection of a transmission in the first place. In this work we study the impact of secretly prearranging the time of communication. We prove that if Alice has AWGN channels to Bob and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید