نتایج جستجو برای: bogus metric

تعداد نتایج: 82175  

Journal: :iranian journal of science and technology (sciences) 2008
n. sadegh-zadeh

the main objective of this paper is to find the necessary and sufficient condition of a given finslermetric to be einstein in order to classify the einstein finsler metrics on a compact manifold. the consideredeinstein finsler metric in the study describes all different kinds of einstein metrics which are pointwiseprojective to the given one. this study has resulted in the following theorem tha...

Journal: :iranian journal of science and technology (sciences) 2009
a. tayebi

in this paper, we are going to study the g-natural metrics on the tangent bundle of finslermanifolds. we concentrate on the complex and kählerian and hermitian structures associated with finslermanifolds via g-natural metrics. we prove that the almost complex structure induced by this metric is acomplex structure on tangent bundle if and only if the finsler metric is of scalar flag curvature. t...

2006
Laura Schechter Matthew Rabin Heather Royer

Rural areas of developing countries often lack effective legal enforcement. However, villagers who know each other well and interact repeatedly may use implicit contracts to minimize crime. I construct a dynamic limited-commitment model, in which a thief cannot credibly commit to forego stealing from his fellow villagers, but may be induced to limit his stealing by the promise of future gifts f...

2002
Katrin Höper

The main contribution of this work is to provide solutions for component identification in composite technical systems such as automobiles or airplanes. We focused on the following three goals: (1) piracy protection to identify original parts and detect bogus parts; (2) system protection to monitor a system in order to ensure system integrity; and (3) theft protection to prevent the usage of st...

2009
Brian M. Bowen Shlomo Hershkop Angelos D. Keromytis Salvatore J. Stolfo

The insider threat remains one of the most vexing problems in computer security. A number of approaches have been proposed to detect nefarious insider actions including user modeling and profiling techniques, policy and access enforcement techniques, and misuse detection. In this work we propose trap-based defense mechanisms for the case where insiders attempt to exfiltrate and use sensitive in...

2017
Attilio Fiandrotti Rossano Gaeta Marco Grangetto

We provide a comprehensive characterization of Band Codes (BC) as a resilient-by-design solution to pollution attacks in Network Coding (NC) based peer-to-peer live video streaming. Consider one malicious node injecting bogus coded packets into the network: the recombinations at the nodes generate an avalanche of novel coded bogus packets. Therefore, the malicious node can cripple the communica...

Journal: :iranian journal of fuzzy systems 2010
faycel merghadi abdelkrim aliouche

we prove a related fixed point theorem for n mappings which arenot necessarily continuous in n fuzzy metric spaces using an implicit relationone of them is a sequentially compact fuzzy metric space which generalizeresults of aliouche, et al. [2], rao et al. [14] and [15].

Journal: :international journal of electrical and electronics engineering 0
b. bidabadi m. sedaghat

the time-optimal trajectory for an airplane from some starting point to some final point is studied by many authors. here, we consider the extension of robot planer motion of dubins model in three dimensional spaces. in this model, the system has independent bounded control over both the altitude velocity and the turning rate of airplane movement in a non-obstacle space. here, in this paper a g...

Journal: :iranian journal of fuzzy systems 2014
nabi shobkolaei s. mansour vaezpour shaban sedghi

in this paper, we shall introduce the fuzzyw-distance, then prove a common fixed point theorem with respectto fuzzy w-distance for two mappings under the condition ofweakly compatible in complete fuzzy metric spaces.

Journal: :iranian journal of fuzzy systems 2010
dorel mihet

we provide fuzzy quasi-metric versions of a fixed point theorem ofgregori and sapena for fuzzy contractive mappings in g-complete fuzzy metricspaces and apply the results to obtain fixed points for contractive mappingsin the domain of words.

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید