نتایج جستجو برای: compromise ratio method

تعداد نتایج: 2072202  

Journal: :Games and Economic Behavior 2012
T. Renee Bowen Zaki Zahran

What prevents majorities from extracting surplus from minorities in legislatures? We study an infinite horizon game where a legislative body votes to determine distributive policy each period. Proposals accepted by a simple majority are implemented, otherwise the status quo allocation prevails. We construct symmetric Markov perfect equilibria that exhibit compromise in the following sense: if t...

2016
Jiangshan Yu

Cryptosystems rely on the assumption that the computer end-points can securely store and use cryptographic keys. Yet, this assumption is rather hard to justify in practice. New software vulnerabilities are discovered every day, and malware is pervasive on mobile devices and desktop PCs. This thesis provides research on how to mitigate private key compromise in three different cases. The first c...

2016
Rick Hofstede

Brute-force attacks are omnipresent and manyfold on the Internet, and aim at compromising user accounts by issuing large numbers of authentication attempts on applications and daemons. Widespread targets of such attacks are Secure SHell (SSH) and Web applications, for example. The impact of brute-force attacks and compromises resulting thereof is often severe: Once compromised, attackers gain a...

2005
Andrew D. Gordon Alan Jeffrey

A realistic threat model for cryptographic protocols or for languagebased security should include a dynamically growing population of principals (or security levels), some of which may be compromised, that is, come under the control of the adversary. We explore such a threat model within a pi-calculus. A new process construct records the ordering between security levels, including the possibili...

Utilizing renewable energies is identified as one of significant issues for economical and social significance in future human life. Thus, choosing the best renewable energy among renewable energy candidates is more important. To address the issue, multi-criteria group decision making (MCGDM) methods with imprecise information could be employed to solve these problems. The aim of this paper is ...

Journal: :Perspectives on Politics 2010

Journal: :IEEE Sensors Journal 2021

This paper presents a position sensor based on novel configuration of linear variable differential transformer. Design and optimization the using finite element method are presented. The measurements also conducted to validate experimentally performance. has short air core coils long magnetic armatures. axis rectangular excitation coil two antiserially connected pick up is perpendicular motion ...

2011

This paper proposes the method to the solution of multi objective linear programming problems in fuzzy environment. Here attention has been paid to the study of optimal compromise solution for multi objective fuzzy linear programming problems. Two algorithms have been presented to gives efficient solutions as well as an optimal compromise solution. An illustrative example is given to describe o...

2013
S. Mohanaselvi K. Ganesan

In this paper, we have proposed an algorithm to solve bi-level linear programming problems with fuzzy parameters without converting it to crisp equivalent problem and obtained a fuzzy compromise solution. Since the decision variables and objective functions are represented as fuzzy membership functions, the proposed fuzzy compromise solution will be more practical and reasonable. A numerical ex...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید