نتایج جستجو برای: minute pirate bug

تعداد نتایج: 66771  

Journal: :Advances in Continuous and Discrete Models 2023

Abstract We study a multi-agent system for the modeling maritime crime. The model involves three interacting populations of ships: commercial ships, pirate and coast guard ships. Commercial ships follow routes, are subject to traffic congestion, repelled by Pirate travel stochastically, attracted Coast controlled. prove well-posedness existence optimal controls that minimize dangerous contacts....

2000
Juan A. Garay Jessica Staddon Avishai Wool

In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged users can recover the content from the encrypted broadcast. Key material is usually held in a “tamperresistant,” replaceable, smartcard. A coalition of users may attack such a system by breaking their smartcards open, extracting the keys, and building “pirate decoders” based on the decryption keys they...

2008
Celine Schulz Stefan Wagner

Recent studies of outlaw communities provide qualitative evidence of their existence and the organisation of the underlying innovation processes. We provide descriptive results from a large scale survey of two online outlaw communities focussing on Microsoft’s XBox. In line with previous findings, we identify two types of participants in outlaw communities user innovators and adopters. Based on...

Journal: :Information Systems Research 2012
Monica Johar Nanda Kumar Vijay S. Mookerjee

W consider a publisher that earns advertising revenue while providing content to serve a heterogeneous population of consumers. The consumers derive benefit from consuming content but suffer from delivery delays. A publisher’s content provision strategy comprises two decisions: (a) the content quality (affecting consumption benefit) and (b) the content distribution delay (affecting consumption ...

Journal: :IACR Cryptology ePrint Archive 2001
Jeff Yan Yongdong Wu

In Crypto’99, Boneh and Franklin proposed a public key traitor tracing scheme [1], which was believed to be able to catch all traitors while not accusing any innocent users (i.e., full-tracing and errorfree). Assuming that Decision Diffie-Hellman problem is unsolvable in Gq, Boneh and Franklin proved that a decoder cannot distinguish valid ciphertexts from invalid ones that are used for tracing...

Journal: :Intersections 2020

Journal: :journal of food biosciences and technology 2015
a. allameh m. kadivar m. shahedi

one of the most important forms of preharvest damage to wheat is caused by sunn pests. the insects insert their mouth parts into the immature grain and while injecting their saliva suck the milky juices. flour from damaged wheat results in low baking performance due to the bug proteolytic enzymes’ injected which cause the breakdown of gluten structure in the dough. in the present study three wh...

2015
Sabine Vogler Agnes Vitry Zaheer Ud-Bin-Babar

Methods Ex-factory prices per unit as for June 2013 of 31 oncology medicines in 16 European countries, Australia and New Zealand were surveyed and compared. Medicine price data for the 16 European countries were provided by the Pharma Price Information (PPI) service, and Australian and New Zealand medicine price data were retrieved from the respective Pharmaceutical Schedules. Official undiscou...

1994
Benny Chor Amos Fiat Moni Naor

We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in the context of pay television, where only paying customers should be able to view certain programs. In this application, the programs are normally encrypted, and then the sensitive data is the decryption keys that are...

Journal: :Softw., Pract. Exper. 1999
Geoffrey Phipps

An experiment was conducted to compare programmer productivity and defect rates for Java and C++. A modified version of the Personal Software Process (PSP) was used to gather defect rate, bug rate, and productivity data on C++ and Java during two real world development projects. A bug is defined to be a problem detected during testing or deployment. A defect is either a bug, or an error detecte...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید