نتایج جستجو برای: exchange property

تعداد نتایج: 344843  

2011
Daron Acemoglu Thierry Verdier Abhijit Banerjee Ricardo Caballero Michael Kremer Thomas Piketty Jim Robinson

We consider an economy where property rights are necessary to ensure sufficient rewards to ex ante investments. Because enforcement of property rights influences the ex post distribution of rents, there is room for corruption. We characterize the optimal organization of the society and optimal degree of property right enforcement subject to incentive constraints of the agents. We find that thre...

2004
Toshinori Takai Hitoshi Ohsaki

ACTAS is a tool set manipulating associative and commutative tree automata (AC-tree automata for short). The system is equipped with various functions for Boolean operations and rewrite descendant computation. This functionality allows to verify safety property in infinite state models, which is helpful in the domain of network security, in particular, for security problems of cryptographic pro...

2010
Ulrich Rührmair Stefan Katzenbeisser Martin Steinebach Sascha Zmudzinski

In this paper we propose an architecture which combines watermarking with traditional cryptographic key agreement protocols to establish an authenticated or encrypted channel in teleconferencing systems. Technically the proposed method embeds messages of the key agreement protocol within an audio or video stream and is based on the assumption that the human communication partners can recognize ...

Journal: :Social Choice and Welfare 2010
Magnus Hoffmann

If property rights to consumption goods are insecure, the incentives to trade in a barter economy are reshaped. In a pure exchange economy, we examine the case where two contestable consumption goods are vital to two agents and initial endowments follow a binary distribution. In line with the existing literature, we examine in a two–stage game how the equilibrium security of claims to property ...

Journal: :JNW 2013
Xin Jin Yaohua Wang

Micro-blog has become very popular way to transmit and exchange information in network. In order to explore network public opinions dissemination mechanism of Micro-blog, this paper discusses characteristics of the Micro-blog social network structure and influence they made on information transmitting and sharing in Microblog through complex network analysis combined with data obtained from Sin...

An Optimistic Fair Exchange (OFE) protocol is a good way for two parties to exchange their digital items in a fair way such that at the end of the protocol execution, both of them receive their items or none of them receive anything. In an OFE protocol there is a semi-trusted third party, named arbitrator, which involves in the protocol if it is necessary. But there is a security problem when a...

1997
Fabrizio Petrini Marco Vanneschi

The total-exchange is one of the most dense communication patterns and is at the heart of numerous applications and programming models in parallel computing. In this paper we present a simple randomized algorithm to eeciently schedule the total-exchange on a toroidal mesh with wormhole switching. This algorithm is based on an important property of the wormhole networks that reach high performan...

Journal: :IJTM 2009
Puay Tang Jordi Molas-Gallart

This article analyses the use of IT tools in the management of Intellectual Property in collaborative projects involving groups of firms and their customer organisations in the design, development, manufacture and maintenance of complex products. Through an in-depth study of IP management practice in collaborative defence projects we identify two contrasting approaches to the implementation of ...

Journal: :Information & Management 2011
Adamantia G. Pateli Spyros Lioukas

We employed a property rights approach to formulate a set of hypotheses explaining the choice between equity and non-equity alliances in the Information and Communication Technology industry. The firm’s need to control knowledge exchange and the resulting innovation makes property rights an important concern permeating partners’ strategic behavior. We showed that equity alliances were preferred...

2005
Nicolás González-Deleito

Kremer and Markowitch introduced in [10] a new property for certified email protocols called no author-based selective receipt, and proposed two new protocols respecting it. In this paper we show that these protocols implicitly require the sender of the email to trust the trusted third party to assure this property. We propose a new protocol in which this trusted third party has only to be trus...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید