نتایج جستجو برای: theoretically and practically

تعداد نتایج: 16828404  

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 2016
Gregory Valiant Paul Valiant

We introduce the notion of a database system that is information theoretically secure in between accesses—a database system with the properties that 1) users can efficiently access their data, and 2) while a user is not accessing their data, the user’s information is information theoretically secure to malicious agents, provided that certain requirements on the maintenance of the database are r...

2012
Tom Christensen Ljiljana Radovic

Purpose – The purpose of this paper is to present a theoretically based analysis and evaluation of the Norwegian quality assurance scheme (QA1 and QA2) for major public projects (MPPs), drawing on a number of different perspectives from organization theory and decision-making theory, but also from insight from two major public reform waves – new public management (NPM) and post-NPM. The purpose...

Journal: :THE JOURNAL OF JAPAN SOCIETY FOR LASER SURGERY AND MEDICINE 1984

Journal: :CIRIEC-España, revista de economía pública, social y cooperativa 2019

2000
L. L. Lai T. Motshegwa H. Subasinghe N. Rajkumar R. Blach

The electric power industry is undergoing rapid and significant change with the advent of deregulation. In a networked environment, it is desirable that the agent be mobile. In the envisaged market scenario, the customer’s agent (load) attempts to get the best value for money and minimize costs and the seller’s (generator) agent attempts to maximize profit and minimize costs. The success of the...

2007
Amitanand S. Aiyer Lorenzo Alvisi Allen Clement Harry C. Li

We present Information Theoretically secure Byzantine Paxos (IT ByzPaxos), the first deterministic asynchronous Byzantine consensus protocol that is provably secure despite a computationally unbounded adversary. Previous deterministic asynchronous algorithms for Byzantine consensus rely on unproven number theoretic assumptions (i.e., digital signatures) to maintain agreement. IT ByzPaxos instea...

2011
Nick Collins Bob L. Sturm

Dictionary-based methods (DBMs) provide rich possibilities for new sound transformations; as the analysis dual to granular synthesis, audio signals are decomposed into ‘atoms’, allowing interesting manipulations. We present various approaches to audio signal cross-synthesis and crossanalysis via atomic decomposition using scale-time-frequency dictionaries. DBMs naturally provide high-level desc...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید