نتایج جستجو برای: unsecured existence
تعداد نتایج: 179118 فیلتر نتایج به سال:
tennessee williams (1911-1983), the modern american dramatist, had his own unique school of dramaturgy. the dramas which he depicted are populated by characters who are lonely, desperate, in anxiety, alienated and in one word lost. they face challenges which they may overcome or not, through the choices they make. all these moods and conditions are clearly seen and explained in the theory of ex...
Varieties with log terminal and log canonical singularities are considered in the Minimal Model Program, see [KMM] for introduction. In [SH2] it was conjectured that many of the interesting sets, associated with these varieties have something in common: they satisfy the ascending chain condition, which means that every increasing chain of elements terminates (in [SH2] it was called the upper se...
We establish the dichotomy property of [7] for multi-conclusion stable canonical rules of [1]. This yields an alternative proof of existence of bases of admissible rules for such well-known systems as IPC, S4, and K4.
In [I] we introduced the notion of transfer from a group over a local field to an associated endoscopic group, but did not prove its existence, nor do we do so in the present paper. Nonetheless we carry out what is probably an unavoidable step in any proof of existence: reduction to a local statement at the identity in the centralizer of a semisimple element, a favorite procedure of Harish Chan...
In this note, we prove the existence of Nash equilibria in infinite normal form games with compact sets of strategies and continuous payoffs by constructing Nash mappings. © 2010 Elsevier Ltd. All rights reserved.
We prove existence of a competitive equilibrium in a version of a Ramsey model in which leisure enters the utility function. The analysis is carried out by means of a direct and technically simple approach that allows us to obtain detailed results concerning the behavior of equilibrium allocations and prices.
There are many distributed and centralized data mining techniques often used for various applications. Privacy and security issues of these techniques are recently investigated with a conclusion that they reveal information or data to each other clients involved to find global valid results. But because of privacy issues, involving clients do not want to share such type of data. Recently many c...
In this paper we highlight the fact that a huge amount of information is sent unsecured via satellite broadcast data channels (here: encapsulated in DVB-s). By applying straightforward data analysis it is possible for any attacker equipped with a digital satellite dish and a DVB card PC to derive extensive confidential information on single users (e.g., legal name, banking details, monthly inco...
In the 1980s, the Thai government tried to legalize squatters living in certain geographical areas by issuing special titles that allowed for cultivation but restricted the sale and rental of the land. Using data from 2,874 farming households collected in 1997 and a differences-in-differences empirical strategy, we compare the differential rental rates between secured and unsecured plots in ref...
In this paper we highlight the fact that a huge amount of information is sent unsecured via satellite broadcast data channels (here: encapsulated in DVB-s). By applying straightforward data analysis it is possible for any attacker equipped with a digital satellite dish and a DVB card PC to derive extensive confidential information on single users (e.g., legal name, banking details, monthly inco...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید