نتایج جستجو برای: bogus metric

تعداد نتایج: 82175  

Journal: :mathematics interdisciplinary research 0
arsla hojat ansari department of mathematics, karaj branch, islamic azad university, karaj, iran, diana dolicanin-dekic faculty of technical science, 38000 kosovska mitrovica, feng gu institute of applied mathematics and department of mathematics, hangzhou normal university, hangzhou, zhejiang 310036, branislav popovic 4faculty of science, university of kragujevac, radoja domanovica 12, 34000 kragujevac, serbia, stojan n radenovic faculty of mechanical engineering, university of belgrade, kraljice marije 16, 11120 beograd, serbia

banach contraction principle has been generalized in different spaces by mathematicians over the years. mustafa and sims [18] proposed a new class of generalized metric spaces, which are called as g-metric spaces. in this type of spaces a non-negative real number is assigned to every triplet of elements. many mathematicians studied extensively various results on g-metric spaces by using the con...

Journal: :european labour law journal 2021

To protect the so-called self-employed, a multilevel solution is needed. Requalification first step and to do this, broad definition of employment agreement presumption an in some situations, useful. But even then, clear distinction between bogus self-employed real entrepreneurs sometimes difficult make requalification for who work individuals problematic. Working on base service contract gives...

2005
EDWARD E. JONES HAROLD SIGALL

If subjects can be convinced that a physiological monitoring device is able to measure both the amplitude and direction of emotional response, their subsequent attempts to predict what the machine says about their attitudes should be uncontaminated by many of the biases that obscure paper-and-pencil measures. This assumes that subjects do not want to be second-guessed by a machine. Four experim...

2012
Fred Karlsson

The claim is not just that one finds questionable examples in linguistics papers, but that lax data-collection standards have led to the growth of theories that are based upon bogus data. If these charges stick, then we face a genuine crisis. In order for there to be a crisis, however, it would need to be the case that (i) Intuitive judgments have led to generalizations that are widely accepted...

2004
Fan Ye Haiyun Luo Songwu Lu Lixia Zhang

In a large-scale sensor network individual sensors are subject to security compromises. A compromised node can inject bogus sensing reports into the network. If undetected, these bogus reports would be forwarded to the data collection point (i.e. the sink). Such attacks by compromised sensors can cause not only false alarms but also the depletion of the finite amount of energy in a battery powe...

2016
Michael K. Marquardt Ana P. Gantman Peter M. Gollwitzer Gabriele Oettingen

Article history: Received 9 April 2015 Revised 26 February 2016 Accepted 11 March 2016 Available online 17 March 2016 According to self-completion theory (SCT; Wicklund & Gollwitzer, 1982), people committed to identity goals (e.g., being a lawyer or a business manager) strive for goal attainment by collecting indicators of completeness (e.g., relevant achievements).When the completeness of an i...

2012
Yves Igor Jerschow Martin Mauve

Denial of Service (DoS) attacks pose a fast-growing threat to network services in the Internet, but also corporate Intranets and public local area networks like Wi-Fi hotspots may be affected. Especially protocols that perform authentication and key exchange relying on expensive public key cryptography are likely to be preferred targets. A well-known countermeasure against resource depletion at...

2017
Fabian Gieseke Steven Bloemen Cas van den Bogaard Tom Heskes Jonas Kindler Richard A. Scalzo Valério A. R. M. Ribeiro Jan van Roestel Paul J. Groot Fang Yuan Anais Möller Brad E. Tucker

Current synoptic sky surveys monitor large areas of the sky to find variable and transient astronomical sources. As the number of detections per night at a single telescope easily exceeds several thousand, current detection pipelines make intensive use of machine learning algorithms to classify the detected objects and to filter out the most interesting candidates. A number of upcoming surveys ...

2008
Dinh Nguyen Tran Bonan Min Jinyang Li Lakshminarayanan Subramanian

Obtaining user feedback (using votes) is essential in ranking user-generated online content. However, any online voting system is susceptible to the Sybil attack where adversaries can out-vote real users by creating several Sybil identities. In this paper, we present SumUp, a Sybilresilient online content rating system that leverages trust networks among users to defend against Sybil attacks wi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید