نتایج جستجو برای: alice code
تعداد نتایج: 173826 فیلتر نتایج به سال:
The protocol is, however, susceptible to a man-in-the-middle attack [3], in which the adversary (Eve) intercepts a message from Alice and creates a new message to send to Bob (Fig.1). Eve performs the exchange with Alice using the original message, while Bob performs the exchange using the newly created message. At the final stage, Eve has the original message in decrypted form, while Bob has t...
Computer-based instructional interventions are increasingly popular in classroom curricula. For students to benefit from these interventions, it is vital that they are properly trained to use the software. We investigate the effects of using active versus passive training techniques to familiarize users with a graphical programming environment, Alice. We examine the impact using measures of kno...
Bell’s theorem [1, 2] basically states that local hidden variable theory cannot predict the correlations produced by quantum mechanics. It is based on the assumption that Alice and Bob can choose measurements from a measurement set containing more than one element. We establish a new paradigm that departs from Bell’s paradigm by assuming that there are no choices for Alice and Bob and that the ...
“I don’t know what you mean by ‘glory’” Alice said. Humpty Dumpty smiled contemptuously. “Of course you don’t — till I tell you. I meant ‘there’s a nice knock-down argument for you!’” “But glory doesn’t mean ‘a nice knock-down argument,’” Alice objected. “When I use a word,” Humpty Dumpty said, in a rather scornful tone, “it means just what I choose it to mean — neither more nor less.” “The que...
The ALICE experiment is devoted to the study of quark-gluon plasma (QGP) created in heavy-ion collisions at CERN LHC. experimental setup allows for many different observables that contributed characterization properties QGP. went through a major upgrade during LS2 profit from increased LHC luminosity and improve tracking resolution. An additional planned LS3. A new experiment, 3, was proposed a...
Qing-yu Cai Wuhan Institute of Physics and Mathematics, The Chinese Academy of Sciences, Wuhan, 430071, People’s Republic of China Bostr .. om and Felbinger [1] have presented a ping-pong communication protocol which allows the information transferred in a deterministic secure manner. The security of this ping-pong protocol is based on an entangled pair of qubits. And the proof of the case of e...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید