نتایج جستجو برای: party

تعداد نتایج: 34507  

2008
Vipul Goyal Payman Mohassel Adam D. Smith

Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure computation protocols which are efficient enough to be usable in practice. Aumann and Lindell presented an efficient two party computation protocol secure against covert adversaries. They were able to utilize cut and...

2006
Hongbin Li Pak Wai Liu Junsen Zhang Ning Ma Justin Yifu Lin Mark Rosenzweig Yasuyuki Sawada Yasuyuki Todo Xiangdong Wei

Economic Returns to Communist Party Membership: Evidence from Urban Chinese Twins This paper estimates the returns to membership of the Chinese Communist Party using unique twins data we collected from China. Our OLS estimate shows that being a Party member increases earnings by 10%, but the within-twin-pair estimate becomes zero. One interpretation of these results is that the OLS Party premiu...

2008
Peter H. Ditto Andrew J. Mastronarde

Attitudes about political mavericks (politicians who cross party lines to ‘‘vote their conscience”) depend on whether people construe them in general terms or at the level of specific policy proposals. Three studies examined this hypothesis. In Study 1, participants expressed more positive views of political mavericks described generally than when prompted to consider a maverick of their own po...

1998
Masato Ishizaki Tsuneaki Kato

This paper describes novel results on the characteristics of three-party dialogues by quantitatively comparing them with those of two-party. In previous dialogue research, two-party dialogues are mainly focussed because data collection of multi-party dialogues is difficult and there are very few theories handling them, although research on multi-party dialogues is expected to be of much use in ...

2008
S. Cheylan J. Puigdollers H. J. Bolink E. Coronado C. Voz R. Alcubilla G. Badenes

by a molecular nanomagnet S. Cheylan, J. Puigdollers, H. J. Bolink, E. Coronado, C. Voz, R. Alcubilla, and G. Badenes ICFO—Institut de Ciencies Fotoniques, Mediterranean Technology Park, 08860 Barcelona, Spain Departamento de Ingeniería Electrónica, Universidad Politécnica de Cataluña, Campus Nord Edifici C4, c/ Jordi Girona 1-3, 08034 Barcelona, Spain ICMol—Instituto de Ciencia Molecular, Univ...

Journal: :Document Numérique 2007
Mohamed Sidir

This paper deals with two main issues. First, it takes up a critical stance on the bid to modernize the higher education by resorting to the means provided by the open and distance learning. Then it goes back over the difficulties the implementation of this type of learning encounters within the university environment. Leaving aside the techno-pedagogical aspects so often referred to in order t...

2005
Junko Kato

Since 1993, Japan has experienced party breakups, mergers and the formation of new parties that are rare in industrial democracies. As a result, the one-party dominance by the Liberal Democratic Party (LDP), with perennial opposition parties, has evolved into a LDP-centered governing coalition faced with the Democratic Party (DP) contending with it for office. While an electoral system change t...

2004
Wenliang Du Yunghsiang Sam Han Shigang Chen

Multivariate statistical analysis is an important data analysis technique that has found applications in various areas. In this paper, we study some multivariate statistical analysis methods in Secure 2-party Computation (S2C) framework illustrated by the following scenario: two parties, each having a secret data set, want to conduct the statistical analysis on their joint data, but neither par...

1996
Mike Just Serge Vaudenay

We examine multi-party key agreement protocols that provide (i) key authentica-tion, (ii) key connrmation and (iii) forward secrecy. Several minor (repairable) attacks are presented against previous two-party key agreement schemes and a model for key agreement is presented that provably provides the properties listed above. A generalization of the Burmester-Desmedt model (Eurocrypt '94) for mul...

2012
Gil S. Epstein Yosef Mealem Shmuel Nitzan

The Efficacy and Efforts of Interest Groups in Post Elections Policy Formation This paper presents a new model of interest groups and policy formation in the legislature. In our setting, the already given party ideological predispositions and power distribution determine the expected policy outcome. Our analysis applies to the case of un-enforced or enforced party discipline as well as to two-p...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید