نتایج جستجو برای: minute pirate bug
تعداد نتایج: 66771 فیلتر نتایج به سال:
Abstract We study a multi-agent system for the modeling maritime crime. The model involves three interacting populations of ships: commercial ships, pirate and coast guard ships. Commercial ships follow routes, are subject to traffic congestion, repelled by Pirate travel stochastically, attracted Coast controlled. prove well-posedness existence optimal controls that minimize dangerous contacts....
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually held in a “tamperresistant,” replaceable, smartcard. A coalition of users may attack such a system by breaking their smartcards open, extracting the keys, and building “pirate decoders” based on the decryption keys they...
Recent studies of outlaw communities provide qualitative evidence of their existence and the organisation of the underlying innovation processes. We provide descriptive results from a large scale survey of two online outlaw communities focussing on Microsoft’s XBox. In line with previous findings, we identify two types of participants in outlaw communities user innovators and adopters. Based on...
W consider a publisher that earns advertising revenue while providing content to serve a heterogeneous population of consumers. The consumers derive benefit from consuming content but suffer from delivery delays. A publisher’s content provision strategy comprises two decisions: (a) the content quality (affecting consumption benefit) and (b) the content distribution delay (affecting consumption ...
In Crypto’99, Boneh and Franklin proposed a public key traitor tracing scheme [1], which was believed to be able to catch all traitors while not accusing any innocent users (i.e., full-tracing and errorfree). Assuming that Decision Diffie-Hellman problem is unsolvable in Gq, Boneh and Franklin proved that a decoder cannot distinguish valid ciphertexts from invalid ones that are used for tracing...
one of the most important forms of preharvest damage to wheat is caused by sunn pests. the insects insert their mouth parts into the immature grain and while injecting their saliva suck the milky juices. flour from damaged wheat results in low baking performance due to the bug proteolytic enzymes’ injected which cause the breakdown of gluten structure in the dough. in the present study three wh...
Methods Ex-factory prices per unit as for June 2013 of 31 oncology medicines in 16 European countries, Australia and New Zealand were surveyed and compared. Medicine price data for the 16 European countries were provided by the Pharma Price Information (PPI) service, and Australian and New Zealand medicine price data were retrieved from the respective Pharmaceutical Schedules. Official undiscou...
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in the context of pay television, where only paying customers should be able to view certain programs. In this application, the programs are normally encrypted, and then the sensitive data is the decryption keys that are...
An experiment was conducted to compare programmer productivity and defect rates for Java and C++. A modified version of the Personal Software Process (PSP) was used to gather defect rate, bug rate, and productivity data on C++ and Java during two real world development projects. A bug is defined to be a problem detected during testing or deployment. A defect is either a bug, or an error detecte...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید