نتایج جستجو برای: unsecured existence

تعداد نتایج: 179118  

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شیراز - دانشکده علوم انسانی 1391

tennessee williams (1911-1983), the modern american dramatist, had his own unique school of dramaturgy. the dramas which he depicted are populated by characters who are lonely, desperate, in anxiety, alienated and in one word lost. they face challenges which they may overcome or not, through the choices they make. all these moods and conditions are clearly seen and explained in the theory of ex...

1993
Valery Alexeev

Varieties with log terminal and log canonical singularities are considered in the Minimal Model Program, see [KMM] for introduction. In [SH2] it was conjectured that many of the interesting sets, associated with these varieties have something in common: they satisfy the ascending chain condition, which means that every increasing chain of elements terminates (in [SH2] it was called the upper se...

Journal: :Studia Logica 2016
Nick Bezhanishvili David Gabelaia Silvio Ghilardi Mamuka Jibladze

We establish the dichotomy property of [7] for multi-conclusion stable canonical rules of [1]. This yields an alternative proof of existence of bases of admissible rules for such well-known systems as IPC, S4, and K4.

2001
Harish Chandra

In [I] we introduced the notion of transfer from a group over a local field to an associated endoscopic group, but did not prove its existence, nor do we do so in the present paper. Nonetheless we carry out what is probably an unavoidable step in any proof of existence: reduction to a local statement at the identity in the centralizer of a semisimple element, a favorite procedure of Harish Chan...

Journal: :Appl. Math. Lett. 2011
Y. H. Zhou J. Yu L. Wang

In this note, we prove the existence of Nash equilibria in infinite normal form games with compact sets of strategies and continuous payoffs by constructing Nash mappings. © 2010 Elsevier Ltd. All rights reserved.

2004
Yiannis Vailakis

We prove existence of a competitive equilibrium in a version of a Ramsey model in which leisure enters the utility function. The analysis is carried out by means of a direct and technically simple approach that allows us to obtain detailed results concerning the behavior of equilibrium allocations and prices.

2014
Krunal K Patel Risha Tiwari

There are many distributed and centralized data mining techniques often used for various applications. Privacy and security issues of these techniques are recently investigated with a conclusion that they reveal information or data to each other clients involved to find global valid results. But because of privacy issues, involving clients do not want to share such type of data. Recently many c...

2005
André Adelsbach Ulrich Greveler

In this paper we highlight the fact that a huge amount of information is sent unsecured via satellite broadcast data channels (here: encapsulated in DVB-s). By applying straightforward data analysis it is possible for any attacker equipped with a digital satellite dish and a DVB card PC to derive extensive confidential information on single users (e.g., legal name, banking details, monthly inco...

2005
Xavier Giné

In the 1980s, the Thai government tried to legalize squatters living in certain geographical areas by issuing special titles that allowed for cultivation but restricted the sale and rental of the land. Using data from 2,874 farming households collected in 1997 and a differences-in-differences empirical strategy, we compare the differential rental rates between secured and unsecured plots in ref...

2006
Ulrich Greveler

In this paper we highlight the fact that a huge amount of information is sent unsecured via satellite broadcast data channels (here: encapsulated in DVB-s). By applying straightforward data analysis it is possible for any attacker equipped with a digital satellite dish and a DVB card PC to derive extensive confidential information on single users (e.g., legal name, banking details, monthly inco...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید