نتایج جستجو برای: confidential self
تعداد نتایج: 531047 فیلتر نتایج به سال:
This article introduces a method of hiding transaction amounts in the strongly decentralized anonymous cryptocurrency Monero. Similar to Bitcoin, Monero is cryptocurrency which is distributed through a proof of work “mining” process. The original Monero protocol was based on CryptoNote, which uses Ring Signatures and one-time keys to hide the destination and origin of transactions. Recently the...
Abstract— A discrete memoryless generalized multiple access channel (GMAC) with confidential messages is studied, where two users attempt to transmit common information to a destination and each user also has private (confidential) information intended for the destination. This channel generalizes the multiple access channel (MAC) in that the two users also receive channel outputs. It is assume...
While researchers have looked at many aspects of argumentation, an area often neglected is that of argumentation strategies. That is, given multiple possible arguments that an agent can put forth, which should be selected in what circumstances. In this paper, we propose a heuristic that implements one such strategy. The heuristic assigns a utility cost to revealing information, as well as a uti...
Annex 8 to pay TV phase three document This is the non-confidential version. Confidential information has been redacted. Redactions are indicated by []. Annex 8 to pay TV phase three document – Assessment of market power – non-confidential version
abstract the aim of the present study is to explore the impact of the cognitive reading strategy instruction on learners reading self-efficacy and their reading achievement. in order to fulfill this purpose, from 120 participants, 90 intermediate efl learners as an experimental group were chosen from three different educational settings namely, yazd university, yazd science and art un...
T he Confidential Enquiry into Maternal and Child Health (CEMACH) was established in April 2003. It replaces CESDI (the Confidential Enquiry intoStillbirthsandDeathsinInfancy)and CEMD (the Confidential Enquiry into Maternal Deaths); this gives it a truly perinatal focus, but its remit is now wider and includes all childhood death. This paper reviews the history of confidential enquiries, some o...
Purpose The purpose of this paper is to invite comment on the proposed use of the 71-76 GHz and 81-86 GHz bands for wireless point-to-point services including carriage of broadband wireless technology. • whether the proposed coordination arrangements are appropriate for the proposed spectrum use including whether the proposed database recording method, and self-coordination, arrangements are ap...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید